How Third-Party Leaks Boomerang Back: Cybersecurity Lessons for Businesses

How Third-Party Leaks Boomerang Back: Cybersecurity Lessons for Businesses

February 28, 2025 / in Blog / by Zafar Khan, RPost CEO

See the Unseen + Un-leak Leaks = (Security) Results

Armand here, RPost’s armadillo product evangelist. Our CEO has been touring the East and West coasts, and soon Europe, as an expert speaker at the Gartner CIO Leadership forums.

(My proud armadillo side) Since we at RPost won Content Security Innovator of the Year awarded by Aragon Research, we’ve been touring, educating on these innovations, speaking on, “Insider Threats, Leaks, and Third-Party Risk, Countering with Agentic AI”. This topic has been resonating among the folks we’ve met at these Gartner CIO sessions AND our CEO's session on this Cybersecurity AI topic was the top in interest score among CIOs at the recent Gartner CIO Leadership session.

Speaking at a round table with health care organization CIOs, top of mind was identifying how cybercriminals were using information leaks at third parties to boomerang attack the health care provider and payer. Sitting with a round table of bank CIOs, this same third party risk and dealing with insider information leaks was top of mind.

And now what we’re doing for you -- for those Tech Essentials readers or their friends/colleagues interested in this, we invite you to join Friday’s web session. Our CEO will present on this topic especially for you. 

Register Here: Friday 11am PT / 2pm ET

(Note, if you cannot make this session time, register and you can watch the post-session recording.)

While this session covers the points below, if it does not go into sufficient detail for you, we can schedule a more detailed briefing for you or your team.

  • See the Unseen. Today’s threat actors operate a reconnaissance phase outside of your network. They have effectively deployed ‘sleeper cells’ on third party devices that are leaking; then they analyze your content harvested from these less secure third parties. In this session, the RPost team will demonstrate how to siphon mass external metadata for AI-derived security insights; using analytical AI to identify when your information is leaking at these less secure third parties, and how to use agentic AI to un-leak these leaks before contextual information is seen. Contextual leaks, when seen by the nefarious, provide the data needed for an AI-powered-up hyper-contextual hyper-targeted attack or impersonation lure. We will review use cases that dissect bad actor patterns invisible today with your Zero Trust initiatives using current endpoint and network monitoring and detection tools. 
  • Un-Leak Leaks. Insiders leak information. There are two types of leakers – those who are naively, seemingly innocently leaking, and those who are maliciously leaking. We will review use cases on how to most importantly, psychologically deter leakers to pre-empt insider leaks of both kinds (naïve and malicious) and in the alternative, forensically identify leakers of document content. We will review use cases that your Zero Trust initiatives using current rights management and data leak prevention tools have not contemplated, and how to solve with new technology innovations. 
  • Results. The takeaway from this session is to inspire faster, more responsive cyber defense and mediation of adversarial attacks, whether insider threats or leaks originating at less secure third parties. Further, always-on automated / AI enabled security creates an environment for significant reduction in human needs to not only support cyber missions, but also today’s efficiency mission, delivering a more rapid realization of ROI with better, more effective and "knowable" security.