RPost Logo

Date: 03/20/2025

Vendor: RPost

Technology/Topic: Insider Threats, Leaks & Third-Party Risks – A Guide to Counter with AI Agents

URL: https://rpost.com

______________________________________________

Welcome to the Technical Exchange Meeting (TEM)!

This session delves into today’s most sophisticated insider threats, leaks, and cybercriminal eavesdropping tactics, plus demonstrates AI-infused tools to counter. Why relevant? CIOs wonder, why and how, with all one’s current security in place, we/our peers are still being breached and information is still being leaked. Considering business-disrupting objectives of today’s GenAI powered-up cybercriminals and the strategic consequence of sensitive information leaks, this session showcases a unique technical approach and overlooked risk vectors that if plugged can save the day

.

See the Unseen™. Information is leaking at third parties that have lesser technical resources (and, arguably, internally). Today, you have no way to see these unseen information leaks. We will demonstrate RPost  Eavesdropping™ AI that can detect when a cybercriminal or threat actor is actively eavesdropping on communications, transactions, or documents (a) in a compromised email account internal or at a third-party, (b) being sent to an impersonator receiving replies to lookalike domain email, and/or (c) being sent from an insider that has either accidentally or maliciously leaked sensitive information.

Un-leak Leaks™. Content in sensitive documents are leaked accidentally (careless misclassification or through breaches at third parties, for example) or maliciously (screen photos of sensitive information and ‘anonymously’ shared). We will demonstrate RPost AI Security Agents that can automatically sense when an unauthorized person is attempting to view sensitive information even if this occurs at a third party, and pre-emptively automatically lock the content (like having a remote control), wherever that document content may reside; and further, provide a record that the leaked content was not seen and therefore there is no reportable breach (the art of the un-leak). We will showcase how this RPost technology uses an AI risk model, AI assistants, and AI agents to accomplish this. There are many additional capabilities, such as techniques to psychologically deter insider leakers and identifying leakers, being able to remotely control content after delivery and KILL live content that may have been put on a USB or other device, or mis-sent accidentally.

______________________________________________

To join the DISA TEM mailing list, please contact: disa.tem@mail.mil

______________________________________________

Disclaimer:

— TEMs do not serve as a marketing venue or request for proposal actions.

— TEMs shall not be interpreted as a commitment by the Government to issue a solicitation or ultimately award a contract.

— TEMs do not serve as an endorsement of any presented technologies or capabilities

— Presentations will not be considered as proposals nor will any awards be made as a result of a TEM session.

— TEMs are public open forums – no proprietary or sensitive information should be presented during TEM sessions. Only publicly facing content is permissible in DISA TEM sessions. 

The owner of this website has made a commitment to accessibility and inclusion, please report any problems that you encounter using the contact form on this website. This site uses the WP ADA Compliance Check plugin to enhance accessibility.