75%
of global knowledge workers now use AI tools regularly
(Worklytics 2025)
Closed Community Initiative
A dedicated consortium of individuals, companies, and experts solving one of the hardest enterprise AI problems: confidential data leakage through browser-based AI tools.
Apply in under two minutes. We review each submission for fit.
Work with peers focused on getting organizations to 0-1% data leakage risk confidence with stronger controls and fewer unknowns.
Complete the form below to apply. We will follow up with next steps after review so you can help reduce business risk and close the growing control gap.
Having trouble with the embedded form? Open signup in a new tab.
Why This Matters Now
Only 17% of companies have controls in place to prevent employees from uploading and sending confidential data with an AI tool in a browser.
Browser-based AI adoption is outpacing governance. Security teams can estimate risk, but most cannot measure leakage confidence with precision across workflows, users, and tools.
Risk Signals
75%
of global knowledge workers now use AI tools regularly
(Worklytics 2025)
57%
of employees using shadow AI tools input sensitive data into them
(Menlo Security 2025)
AI adoption is accelerating faster than enforceable controls. That gap is exactly why this consortium exists.
Even growth-stage and late-stage companies implementing controls still report major blind spots. They often estimate their safeguards work only part of the time and lack dependable leakage measurement.
Build a practical, operator-led playbook that helps companies close control gaps, benchmark efficacy, and move toward high confidence in near-zero leakage outcomes.
Should I join?
If you're trying to reduce data leakage and help people stay safer online, this community is for you. Frankly, anyone can join: security experts, leaders, managers, students, operators, and builders.
You do not need to be a deep technical specialist to contribute. Practical insight, cross-functional perspective, and commitment to safer systems are all valuable here.
Cost of Data Leakage
Average global breach cost benchmark (IBM 2024).
Recovery expenses include forensics, legal work, customer notification, and support. Ransomware demands can exceed $1.1M, and regulatory fines can reach 4% of global turnover under strict regimes.
Breaches trigger churn, weaken brand confidence, and can reduce long-term demand. Negative experiences spread quickly and make acquiring new customers harder.
Investigations and containment can force downtime, disrupt workflows, and reduce productivity for weeks as teams adapt to emergency controls.
Leaked product plans, trade secrets, or proprietary data can erase years of R&D advantage and create long-term revenue drag.
Exposure incidents often lead to class-action claims, partner disputes, and compliance penalties, creating ongoing legal and contractual obligations.
Reducing these risks requires proactive controls, practical playbooks, and cross-team collaboration. That is the purpose of this consortium.