SERVICE PLANS

We offer four plans suitable for different risk profiles that you can combine to cover multiple employee groups.

Picnic CEO Protection

Ultimate privacy and digital risk protection for high-profile individuals and families. Best for C-suite, board members, and ultra-high-risk individuals.
CEO

Picnic Executive Protection

Frictionless digital risk protection for executives and leadership. Designed for executives, high-risk individuals, and key decision-makers.
Executive

Picnic Advanced Protection

Enhanced coverage for professionals and key personnel. Suitable for employees handling sensitive information or public-facing roles.
Advanced

Picnic Essential Protection

Zero touch privacy protection for all employees. Covers essential data broker takedown services to continuously remove exposed PII.
Essential

Per user pricing. No platform fees. Premium support included.

From Ultimate Protection to Essential Coverage

What's Included
CEO PROTECTION
EXECUTIVE PROTECTION
ADVANCED PROTECTION
ESSENTIAL PROTECTION
Data Broker Takedowns
Yes
Yes
Yes
Yes
Dark Web Monitoring for Exposed Passwords
Yes
Yes
Yes
Yes
Real-time Notifications
Yes
Yes
Yes
Yes
Individual Privacy Report
Yes
Yes
Yes
-
Family Members Included
25
5
1
-
Full Scope Digital Footprint Hunt
Yes
Yes
-
-
Global Coverage
Yes
Yes
-
-
1:1 Privacy Briefing
Yes
Yes
-
-
Personal Device Protection
Yes
Yes
-
-
Social Media Security & Impersonation Protection
Yes
Yes
-
-
Red Team Assessment
Yes
-
-
-
Secure Home Network(s)
Yes
-
-
-

Descriptions of What's Included

Picnic’s tech-enabled turnkey managed service continuously and automatically takes down data broker profiles on hundreds of websites.

Why it matters: Data brokers are a primary source of information on people that threat actors use to find family members, postal addresses, phone numbers, and other sensitive data. This information helps them identify, locate, and engage targets. 93% of C-Suite executives in the USA have their home addresses exposed on these sites. To make matters worse, data brokers are notoriously bad at preventing data leaks and breaches.

Picnic continuously and automatically monitors the dark web and data breach repositories for compromised personal and work credentials of the people it protects.

Why it matters: Most people reuse passwords, which makes them and their employers vulnerable to credential stuffing attacks and account takeover. Every executive in the USA has been caught in at least one data breach, with the average being 43 data breaches per executive. 94% of these executives have plaintext credentials exposed from those breaches, 84% of which correspond to personal accounts. Therefore, organizations must gain visibility on exposed personal and work passwords as a precursor to implementing preventative countermeasures.

Picnic automates what to communicate, to whom, and under what circumstances to alert admins and/or users about critical risks detected during the ongoing Picnic scans.

Why it matters: Defending against situations you are unaware of is challenging, if not impossible. Real-time alerts enhance the situational awareness of the organization and enable preventative measures around impacted users.

Picnic offers easy-to-digest privacy reports for protected individuals, measuring past and current levels of exposure and showcasing the preventative remediations Picnic performed during the previous cycle to neutralize risks.

Why it matters: Feeling safe and secure is not the same as being safe and secure. Individual privacy reports enhance users’ trust in security teams and their programs, making corporate security a personal matter. Reports show users’ individualized exposure, list the remediations performed on their behalf, and tailor recommendations and guidance to address any remaining risks that only a user can remediate.

Most of Picnic’s managed services plans offer coverage for family members of protected individuals. The number of family members covered varies per plan.

Why it matters: Harassment, coercion, impersonation, extortion, and fraud often target family members and close associates of executives and other employees with privileged technical and financial access. Family information is “cross-pollinated” between data broker records, causing personal details (home address, phone number, email addresses) to appear on family members’ data broker profiles. Family members are more exposed, less aware, and vulnerable to psychological manipulation and are considered softer targets by attackers looking to compromise executives and their organizations.

The highest tiers of Picnic’s managed services plans offer a full-scope digital footprint hunt, which involves open-source intelligence (OSINT) specialists conducting deep manual searches and investigations in the open, deep, and dark web.

Why it matters: Automation cannot always identify exposed personally identifiable information (PII) at a 100% success rate, and this is where humans in the loop go the extra mile to ensure no stone has been left unturned. This service includes meticulous reviews and optimization of social media privacy settings, ensuring comprehensive protection of personal information. This service is most suitable for the CEO, the C-Suite, board members, and other individuals in the organization who are more likely to be targeted by an advanced and persistent threat actor.

The highest tiers of Picnic’s managed services plans offer reporting on worldwide digital footprints and data broker takedowns outside the USA.

Why it matters: Global corporations and their executives are exposed around the globe and not just in America. Global commerce, international business processes, and business travel pose additional cyber and physical security risks that can be exacerbated by exposed data commercialized by data brokers registered in foreign countries. Therefore, it is critical to go the extra mile to reduce exposure on a global scale.

The highest tiers of Picnic’s managed service plans offer a 1:1 privacy briefing to protected individuals to share personalized and risk-informed best practices and recommendations and to answer questions. This tailored coaching adds a personal touch to an otherwise zero-touch managed service that doesn’t require the user and security teams to do any extra work.

Why it matters: Compromised privacy leads to compromised cyber and physical security. Personalized privacy briefings not only help to drive awareness and understanding of these risks but also peace of mind that there’s a whole team of subject matter experts dedicated to monitoring, assessing, remediating exposure, and neutralizing risks.

The highest tiers of Picnic’s managed service plans offer an enterprise-grade endpoint protection solution for personal devices.

Why it matters: Personal unmanaged devices can be compromised via social engineering attacks, leading to account takeover, ransomware, spyware, and other consequences that can disrupt business operations, impact personal finances, and harm reputations. High-profile individuals are encouraged to protect their personal and their families’ personal devices with a best-in-class enterprise solution that protects, detects, and responds to intrusions that violate their privacy and compromise their security.

The highest tiers of Picnic’s managed service plans offer continuous protection against impersonation on social media, detecting impersonated profiles and processing takedowns.

Why it matters: Recent reports suggest that the impersonation of high-ranking executives on social media and via Business Email Compromise (BEC) surpassed brand impersonation. Impersonation on social media and via BEC harms executives, impacting their families, close associates, and organizations. Detecting and remediating impersonation is not solely about protecting personal reputations but also preventing harassment and social engineering attacks that can quickly grow from noise to a severe security breach.

In the top tier of Picnic’s managed service plans, Picnic applies real-world security and intelligence operations experience for the benefit of executive protection and cyber security teams seeking to challenge internal protection planning and potential cognitive biases that naturally develop over time. By providing an unbiased view of how threat actors could target the protectee, family, and close peers with physical and digital threats, Picnic extends a security team’s vantage point and helps improve the security posture.

Why it matters: An ounce of prevention is worth a pound of cure. When it comes to protecting highly visible executives and their families from being targeted, harassed, blackmailed, and exploited by criminals and hacktivists, it is critical to challenge existing thinking and methods, improve situational awareness, and adopt a proactive approach against digital threats and physical attacks.

The top tier of all Picnic’s managed service plans offers a home network privacy and security package to prevent snooping and intrusions.

Why it matters: Highly visible top-ranking executives are top targets for advanced and persistent threat actors. Once the home address is identified, it becomes a potential target for espionage and other more consequential cyber and physical threats. Protecting the home network(s), especially in environments with complex home automation and Internet of Things (IoT) devices, is critical for a comprehensive security posture.

Request Pricing

Let's connect to find out which plans are right for your different employee groups. Submit the form, and we'll reply within 24 hours to schedule a meeting.

Scroll to Top