Jericho Security
Overview
Problem Social Engineering still accounts for 98% of all cyber attacks, AI makes these attacks more effective.
Solution Our solution uses detection models to stop or flag social engineering attempts, and our models work with email, sms, or voice personas. Our offensive models can hold conversations, continue to pry for information or deliver a payload, and can communicate with other personas to share information to adapt.
Field Validation We are working with the Air Force Academy to validate multi-lingual models, and mission partners in the DoD.
Technology Maturity (TRL) TRL 6 - We are commercially available today, with a prototype on DoD networks.
Strategic Advantage Our models continuously improve through red-team vs blue-team simulation loops, and the only platform that using darkweb data to utilize the same data that malicious actors use.
Go-to-Market Access We currently are finishing up a Phase 2 STTR and TACFI with AFWERX.
Dual-Use Potential Jericho provides defensive models and training to customers in the financial, health, and insurance sectors.
Team CEO: Sage Wohns - Former CEO of Agolo CTO: Dan Chyan - CSSP, seasoned CTO PM: Keith Perez - Former CIO at Naval Health Clinic Charleston Fed Tech Lead: Tony Giaimo - Former Cyber Warfare Officer (17S)
Competitive Landscape Microsoft and proof-point provide some level of email security, but they don't cover sms, voice, and deepfake attack avenues.
Primary User Defense models used by comm squadron technicians at base comms and air operations centers. Offensive models used by initial access cyber mission teams and information warfare officers
User-Critical Problem CMT operators don't have the resources to carry out successful multi-channel campaigns, especially not in adversaries native languages.