Date: 03/20/2025
Vendor: RPost
Technology/Topic: Insider Threats, Leaks & Third-Party Risks – A Guide to Counter with AI Agents
URL: https://rpost.com
______________________________________________
Welcome to the Technical Exchange Meeting (TEM)!
This session delves into today’s most sophisticated insider threats, leaks, and cybercriminal eavesdropping tactics, plus demonstrates AI-infused tools to counter. Why relevant? CIOs wonder, why and how, with all one’s current security in place, we/our peers are still being breached and information is still being leaked. Considering business-disrupting objectives of today’s GenAI powered-up cybercriminals and the strategic consequence of sensitive information leaks, this session showcases a unique technical approach and overlooked risk vectors that if plugged can save the day
.
See the Unseen™. Information is leaking at third parties that have lesser technical resources (and, arguably, internally). Today, you have no way to see these unseen information leaks. We will demonstrate RPost Eavesdropping™ AI that can detect when a cybercriminal or threat actor is actively eavesdropping on communications, transactions, or documents (a) in a compromised email account internal or at a third-party, (b) being sent to an impersonator receiving replies to lookalike domain email, and/or (c) being sent from an insider that has either accidentally or maliciously leaked sensitive information.
Un-leak Leaks™. Content in sensitive documents are leaked accidentally (careless misclassification or through breaches at third parties, for example) or maliciously (screen photos of sensitive information and ‘anonymously’ shared). We will demonstrate RPost AI Security Agents that can automatically sense when an unauthorized person is attempting to view sensitive information even if this occurs at a third party, and pre-emptively automatically lock the content (like having a remote control), wherever that document content may reside; and further, provide a record that the leaked content was not seen and therefore there is no reportable breach (the art of the un-leak). We will showcase how this RPost technology uses an AI risk model, AI assistants, and AI agents to accomplish this. There are many additional capabilities, such as techniques to psychologically deter insider leakers and identifying leakers, being able to remotely control content after delivery and KILL live content that may have been put on a USB or other device, or mis-sent accidentally.
______________________________________________
To join the DISA TEM mailing list, please contact: disa.tem@mail.mil
______________________________________________
Disclaimer:
— TEMs do not serve as a marketing venue or request for proposal actions.
— TEMs shall not be interpreted as a commitment by the Government to issue a solicitation or ultimately award a contract.
— TEMs do not serve as an endorsement of any presented technologies or capabilities
— Presentations will not be considered as proposals nor will any awards be made as a result of a TEM session.
— TEMs are public open forums – no proprietary or sensitive information should be presented during TEM sessions. Only publicly facing content is permissible in DISA TEM sessions.