Security Program Maturity
Level 2 (Intermediate)
Documented program, but still largely reactive in execution.
Invitation-only · Trust-based membership
An operator-led consortium of security leaders, practitioners, vendors, and researchers building practical standards to prevent confidential data leakage through browser-based AI tools.
About
A private community where security professionals discuss breach prevention, AI governance, supply chain security, and incident response.
Based on IBM's finding that organizations face $2.9M+ in preventable costs from skills shortages, shadow AI, and missing security fundamentals. See the IBM Cost of a Data Breach Report for underlying research.
Members share only what they're comfortable with. No obligation to disclose organizational vulnerabilities.
Signal is a free, nonprofit messaging app for private chats and small groups—not a public social network. We use it for consortium intake and private working discussions because it is built for confidential peer communication.
End-to-end encryption. Minimal metadata collection. No corporate infrastructure to breach. Members control their privacy and data. New to Signal? Download here and consider usernames and phone-number privacy settings before you reach out to join.
The consortium is designed for candid discussion of real security challenges. Members use pseudonymous usernames and share context (industry, org size, challenges) without revealing identifying information. That enables honest conversations about vulnerabilities, failures, and lessons learned without personal or organizational exposure. Your sponsor knows your identity for accountability, but the broader community doesn't need to—giving you both trust and privacy.
Membership
This consortium operates on trust networks. Members vouch for people they know professionally.
Option 1: Referral (Primary Path)
Ask a current member to vouch for you.
Option 2: Direct Request (Limited)
Message @soodonym70 on Signal.
Include:
You'll receive a response within 2–3 business days.
After initial vetting conversation
Invitations are selective to maintain trust and quality.
The Stats That Matter
Evidence-forward metrics to guide where consortium effort should focus first.
6 metrics
Sources include: IBM Cost of a Data Breach Report
The Average Company (IBM-Derived Snapshot)
This is an aggregated reference model, not a universal truth. Use it to pressure-test assumptions, compare your current posture, and identify where control quality and response readiness are most likely to fail.
Security Program Maturity
Level 2 (Intermediate)
Documented program, but still largely reactive in execution.
Expected Breach Cost
$6.68M
Base breach cost plus commonly cited shadow AI and skills-shortage premiums.
Detection and Containment Time
241 days
Extended attacker dwell time remains a core risk multiplier.
Recovery Window
100+ days
Most organizations report prolonged disruption after major incidents.
24 profile signals
Showing 1–6 of 24 signals
Mission and Scope
We define browser-layer controls, telemetry standards, and governance frameworks so organizations can unlock AI productivity without leaking regulated or confidential data.
What We Do
Publish practical patterns for prompt, copy/paste, and upload controls; define telemetry fields that quantify risk; and ship adoption playbooks with measured outcomes.
What We Do Not Do
We are not a product marketplace, legal authority, or a guarantee against incidents. We focus on operator-tested guidance and implementation rigor.
Consortium Charter
The consortium exists to solve a hard, unresolved security problem. We commit to disciplined collaboration, practical evidence, and transparent decision-making, while acknowledging that success is not guaranteed.
Framework Workstreams
Develop and test practical control patterns that reduce avoidable leakage response burden without claiming fixed financial outcomes.
Define enforceable governance baselines for prompts, uploads, and extensions so unmanaged AI usage can be identified and addressed.
Coordinate member learning around third-party and SaaS-linked leakage paths with common assessment and response practices.
Build operator depth through shared exercises, implementation reviews, and cross-functional learning loops.
Improve containment and recovery readiness through tested playbooks and repeatable workflows.
Reduce governance fragmentation by aligning telemetry, standards, and control integration practices across member environments.
Built for security professionals with organizational responsibility.
Built for security professionals with organizational responsibility—CISOs, security directors, IT leadership, compliance officers, and incident responders. Default anonymity in the consortium helps you share lessons without unnecessary exposure.
Security leaders and IT owners
Benchmark control effectiveness, compare governance approaches, and reduce exposure without stalling AI adoption.
Operators and platform teams
Pressure-test controls in peer environments and contribute practical implementation patterns.
Practitioners and researchers
Help define measurable telemetry and methods that close browser-layer blind spots.
Vendors and ecosystem contributors
Participate in a vendor-neutral forum to align real-world requirements with practical capabilities.
Contributions are most valuable when they are implementation-focused, anonymized where needed, and tied to measurable outcomes.
Consortium FAQs
How membership works, default anonymity, confidentiality, and what to expect before you commit. Screening details and operational security measures are not spelled out on this public page.
17 questions
A private community where security professionals discuss breach prevention, AI governance, supply chain security, and incident response.
IBM Cost of a Data Breach Report (2025)
Based on findings from IBM's 2025 Cost of a Data Breach Report showing organizations face $2.9M+ in preventable costs from skills shortages, shadow AI, and missing security fundamentals.
Operational security. Members discuss active vulnerabilities and breach details that require confidentiality. Publishing member lists, security frameworks, or internal processes creates attack surface.
Signal is a free, nonprofit messaging app for private chats and small groups—not a public social network. The consortium uses it for intake and working discussions because it is built for confidential peer communication.
Download here (Signal)Usernames and phone-number privacy settings (Signal)What is Signal? (signal.org)
End-to-end encryption. Minimal metadata collection. No corporate infrastructure to breach. Members control their privacy and data. New to Signal? Download here and consider usernames and phone-number privacy settings before you reach out to join.
No. The consortium is free to join and participate in.
Security professionals with organizational responsibility: CISOs, security directors, IT leadership, compliance officers, incident responders.
The consortium operates on default anonymity with layered privacy:
Recommended practice
Why anonymity matters
Privacy layers
Privacy principle: Default to anonymity. Share strategically. Protect yourself and your organization while contributing meaningfully.
We strongly recommend default anonymity:
Share (valuable context)
Don't share (unnecessary exposure)
Why: Even in trusted communities, anonymity protects you from competitive intelligence, vendor targeting, legal discovery, and career risks. You can contribute meaningful insights while protecting yourself and your organization.
Yes. Chatham House Rule applies—information can be used for learning, never attributed to individuals or organizations without permission. Signal provides end-to-end encryption. Anonymous usernames are strongly recommended. Phone numbers remain private. Member lists are not disclosed publicly.
Chatham House: the Chatham House RuleSignal: phone number privacy & usernames
All members agree to confidentiality requirements. Information sharing is for defensive purposes only. You control what you disclose. Default anonymity means competitors won't know which anonymous contributions are yours. Note competitor conflicts during your application if concerned.
General principles include:
Specific requirements are explained during the screening process.
Technical discussions on security challenges, sharing of governance frameworks and assessment templates (when members choose to share), analysis of IBM report findings, anonymous case studies, and collaborative problem-solving. Members control what they share. Participation can be as passive (listening/learning) or active (contributing) as you prefer.
No minimum participation requirement. Engage when you have questions, information to share, or time to contribute. Observing without posting is acceptable.
Yes. Each person applies and is vetted individually.
The invitation-only vouching model provides natural protection. Members vouch for people they know professionally and remain accountable for their invitees.
We have additional vetting procedures that aren't publicly disclosed for security reasons.
Leave the Signal channel at any time. No exit process required.
Invitations are selective to maintain trust and quality. If not approved, you'll receive brief feedback. You may reapply after addressing concerns.
This FAQ is a public overview. The operating framework, confidentiality expectations, and member rules you accept after screening are authoritative. Default to anonymity in discussions; when in doubt, share less.