Insight Cyber Group
See the whole digital world
Spring 2025
The Growing Cyber Security Crisis: From Vulnerabilities to Impact

1

Gap Between Vulnerability and Exploit
Only 2% of disclosed vulnerabilities are weaponized, but this small fraction alone has driven a huge impact. There is a lot of room for continued exploitation and the growth of damages.

2

Growing Exploitation
38% of intrusions gained access through mechanical attacks / vulnerability exploitation in 2023 - a 6% increase from previous year. And 97 new zero-day vulnerabilities were exploited in the wild, marking a 56% surge from 2022.

3

Attack Vectors Diversification
Beyond vulnerabilities, credential theft through info-stealers and social engineering remains a primary attack vector, creating multiple paths for breaches and growing in capability.

4

Devastating Financial Impact
  • $4.88MM: Average cost per data breach incident in 2024
  • $9.5T: Worldwide cybercrime damages projected for 2024
  • $2.73 - $5MM: Average ransomware payouts for 2024
This crisis is further amplified by an increasing number of systems being pushed into production through AI automation and thus a greater number of vulnerabilities to be exploited. Couple these trends with the emerging use of AI in cyber attacks and you are left with a perfect storm of cyber insecurity.
ICG: Disrupting The Cyber Kill Chain
Next Generation Cyber Threat Detection: Agent Nautilus™ delivers unmatched speed, outperforming outdated threat detection tools reliant on heuristics or legacy ML models that act only after obvious impact. Its deep behavioral analysis identifies and neutralizes sophisticated threats by detecting subtle anomalies, exposing even the stealthiest actors — including those leveraging legitimate tools and credentials to live off the land.
Total Addressable Market (TAM)
  • The digital security market is just getting bigger and bigger: the global cybersecurity market is expected to reach $345.4 billion by 2026.
  • Rising digital transformation drives demand for robust security solutions.
  • Agent Nautilus addresses growing cybersecurity vulnerabilities across multiple industries and domains.
  • Identification and actionable capabilities based on threat detection across time series data poses a nearly limitless opportunity.
Agent Nautilus: Confronting Growing Cyber Threats

1

The Challenge
As existing solutions fall short of driving meaningful impact, cyber threats are advancing at an unprecedented pace. Data breaches and ransomware attacks are multiplying, fueled by the relentless expansion of the threat landscape and rapid advancements in AI technologies.

2

The Innovation
Enter Agent Nautilus: The first cyber transformer trained exclusively on cyber and time series data, deployed in 2020. Agent Nautilus employs an auto-regressive model pre-trained on cyber data. This advanced system is designed after biological structures, assigning genomes to digital actors and mapping behavior-forming genes.

3

The Approach
Through identification of disease markers and environmental variables, Agent Nautilus creates a multi-dimensional picture of your digital world. The transformer analyzes context of each datapoint, differentiating between critical and non-essential information and highlighting anomalies.

4

The Solution
Continuously trained on operational and network data, Agent Nautilus leverages advanced AI to create actionable intelligence, ensuring precise threat detection and secure and prompt delivery for rapid response.
Operational Impact & Business Value
Agent Nautilus delivers transformative value across the enterprise security landscape, enabling organizations to detect and respond to threats with unprecedented precision and speed.

Enhanced Threat Detection
Reduces false positives by up to 90% while increasing detection rates across sophisticated attack vectors, including zero-day threats and advanced persistent threats (APTs).

Operational Efficiency
Streamlines security operations by automating complex analysis tasks and providing actionable insights, reducing mean time to detect (MTTD) and respond (MTTR) to incidents.

Scalable Protection
Seamlessly adapts to growing infrastructure needs while maintaining consistent performance across distributed environments and diverse technology stacks.
By leveraging its advanced capabilities, organizations can significantly strengthen their security posture while optimizing resource utilization and operational costs.
Pilot Project Results

1

Deployment
Place and activate the sensor.

2

Threat Detection
Known disease markers are detectable immediately.

3

Learning Phase I
24-48 hours to learn what normal looks like.

4

Learning Phase II RLHF
Targeting 99.9% coverage, the system learns every actor and reinforces new observations.

5

Expand the Perimeter
Broaden protection to all key assets.
Go-to-Market Strategy & Business Model
Multi-channel approach enabling integrators and super integrators from the top of the market all the way through large scale, massive distribution.
ICG leverages a multi-channel strategy, reaching a wide audience with tailored approaches.
The Cyber AI Landscape
CrowdStrike
Endpoint security and threat intelligence, known for its cloud-native platform and rapid detection and response capabilities.
Darktrace
Autonomous cybersecurity, leveraging AI to identify and respond to threats in real-time, particularly adept at detecting zero-day attacks.
Cylance
Preventative security, using AI-powered machine learning to anticipate and block threats before they can compromise systems.
Palo Alto Networks
Next-generation firewall and security platform, leveraging AI for threat detection and prevention across networks and cloud environments.
Traction and Validation

1

Pilot Projects
Several reference customers including critical infrastructure, power generation and a forward deployment in an active military zone.

2

Customer Feedback
Trials always convert, customer almost always grow. Customer time spent on system is growing at an exponential rate.

3

Growing User Base
Five channels for user adoption in play an healthy activity across every front.
Team of Experts
Roland Cozzolino
Francis Cianfrocca
Casey Potenzone
John Sherrod
Wayne Yammamoto
Curtis Blount
Financial Projections (2025-2027)
Enterprise/Direct
2025: $1.2MM
2026: $2.1MM
2027: $2.4MM
Integrator/VAR
2025: $1.6MM
2026: $6.7MM
2027: $7.8MM
Government
2025: $0.2MM
2026: $12MM
2027: $14MM
Microsoft
2025: $1.1MM
2026: $4.2MM
2027: $4.9MM
Investment Opportunity
Investment Amount
Total investment of $10 million.
Valuation
Post-money valuation of $50 million.
Investment Schedule
Investment in four tranches of $2.5 million each, first tranche in 30-45 days
Milestone-Based Funding
Each subsequent tranche released upon achieving key milestones.
Market Opportunity
1
Booming Market
The AI market is rapidly expanding, with significant growth potential across various industries.
2
Strong Demand
Businesses are increasingly seeking AI solutions to optimize operations and gain a competitive edge.
3
First-mover Advantage
Our early entry into the market provides us with a significant competitive advantage.
Contact Information
Casey S. Potenzone
cp@insightcyber.com
Phone Numbers
+33 (0)7 69 26 43 53
949-468-9636
Reach Out
Agent Bartok via Teams
Disclaimer:
This presentation is for informational purposes only and does not constitute an offer to sell or a solicitation of an offer to buy any securities, nor shall it form the basis of any contract or commitment. The information contained herein is provided as of the date of this presentation and is subject to change without notice. Past performance is not indicative of future results. Any forward-looking statements or projections in this presentation are based on assumptions that are subject to risks and uncertainties, which could cause actual results to differ materially. Investors should conduct their own independent evaluation and due diligence before making any investment decisions. This presentation may contain confidential information and is intended solely for the recipient; unauthorized distribution or use is strictly prohibited.