Agent Nautilus
See the Whole Digital World
Spring 2025
The Growing Cyber Security Crisis: From Vulnerabilities to Impact

1

Gap Between Vulnerability and Exploit
Only 2% of disclosed vulnerabilities are exploited, yet this small fraction has caused significant impact. This leaves considerable room for further exploitation and an escalation in damage.

2

Growing Exploitation
Last year, 38% of intrusions stemmed from mechanical attacks (vulnerability exploitation), a 6% rise compared to the previous year. This was accompanied by a dramatic 56% increase in exploited zero-day vulnerabilities, with 97 new cases reported in the wild.

3

Attack Vector Diversification
Beyond vulnerabilities, credential theft through info-stealers and social engineering remains a primary attack vector, creating multiple paths for breaches and growing in sophistication.

4

Devastating Financial Impact
  • $9.5T: Worldwide cybercrime damages projected for 2024
  • $4.88MM: Average cost per data breach incident in 2024
  • $100Ks - $5MM: Average ransomware payouts for 2024
This crisis is further amplified by the increasing number of systems being pushed into production through AI automation, resulting in a greater number of vulnerabilities to be exploited. Combined with the emerging use of AI in cyberattacks, it creates a perfect storm of cyber insecurity.
Introducing Agent Nautilus™
High Dimensional Cyber Transformer
Agent Nautilus, first deployed in 2020, employs an auto-regressive transformer model pre-trained on cyber data. This advanced model is designed after biological structures, assigning genomes to digital actors and mapping the genes that form their behaviours.
Through the identification and assignment of disease markers and environmental variables, Agent Nautilus enriches the genome and forms a high dimensional picture of your digital world. The transformer analyses the context of each datapoint and differentiates between critical and non-essential, bypassing irrelevant information for unparalleled efficiency and speed in threat detection.
Tailored for cybersecurity, and continuously trained on operational and network data from IT to OT, critical infrastructure, public institutions and even deployments in war-zones, the Agent Nautilus transformer can leverage nearly any time-series data to identify and focus on actionable intelligence, ensuring precise detection of cyber threats.
Precision through High Dimensionality
High Dimensions of Intelligence
At the heart of our system lies an advanced ICG transformer with hundreds to thousands of distinct dimensions of data analysis. The ability to learn and formulate these models forms the foundation of the most sophisticated threat detection engine in cybersecurity, powered by our revolutionary ICG Genome framework.
High-Dimensional Analysis
Each dimension captures specific data including telemetry and device behaviors, time-series interactions, communication patterns, and environmental anomalies. This multi-layered approach enables deep understanding of relationships between entities and events across IT, OT, and IoT systems.
Advanced Pattern Recognition
Moving beyond traditional linear heuristics, Agent Nautilus processes multiple behavioral dimensions simultaneously. This comprehensive analysis detects even the most subtle patterns that conventional solutions miss: from account compromise and encrypted C2 channels to stealthy lateral movement tactics.
Agent Nautilus' Key Features
Going Beyond Vulnerability Management
Agent Nautilus utilizes a historic perspective of data to identify potential attack vectors by mapping cyber genes and disease markers that indicate predispositions to threats.
Real-Time Learning & Almost No Setup
From novel self-attention features to its to its ability to intelligently prioritize data in parallel, the system learns your operations through observation and optimises. No setup, no whitelists.
See Everything & Unify IT/OT/IoT
By analyzing everything from packet telemetry to system behavior, the model detects the slightest deviations indicative of cybersecurity breaches.
Expand the Perimeter
Threat detection requires visibility. Seamlessly expand the perimeter without support burden or significant cost. Expand into supply chain partners, remote contractors and service providers.
AI Powered Analytics & Nearly Limitless Publishing Options
AI to AI, or AI to Human, the ICG LLM enables publishing from low-code & no-code frameworks to rapidly deploy everything from Teams Agents to Syntesia talking avatars.. in minutes. Start with our chatbot, Agent Bartok.
Disrupting The Cyber Kill Chain
Agent Nautilus™ delivers unmatched speed, outperforming outdated threat detection tools reliant on heuristics or legacy ML models that act only after obvious impact. Its deep behavioral analysis identifies and neutralizes sophisticated threats by detecting subtle anomalies, exposing even the stealthiest actors — including those leveraging legitimate tools and credentials to live off the land.
Operational Impact & Business Value
Agent Nautilus delivers transformative value across the enterprise security landscape, enabling organizations to detect and respond to threats with unprecedented precision and speed.
Enhanced Threat Detection
Reduces false positives by up to 90% while increasing detection rates across sophisticated attack vectors, including zero-day threats and APTs.
Operational Efficiency
Streamlines security operations by automating complex tasks and providing actionable insights, reducing mean time to detect (MTTD) and respond (MTTR) to incidents.
Scalable Protection
Adapts effectively to growing infrastructure needs while maintaining consistent performance across distributed environments and diverse technology stacks.
Immediate Value
Delivers immediate value without disrupting your existing operations: fully customizable to integrate with your current stack or operate independently.
Phases to Deployment

1

Deployment
Place and activate the sensor.

2

Threat Detection
Known disease markers are detectable immediately.

3

Learning Phase I
24-48 hours to learn what normal looks like.

4

Learning Phase II RLHF
First 30 days, targeting 99.9% coverage, the system learns every actor and reinforces new observations.

5

Expand the Perimeter
Broaden protection to all key assets.
Summary: A Powerful Approach to Cyber Security

1

Data Ingestion & Normalization
All data is ingested and normalized for consistent processing across the system.

2

AI & Heuristic Detection
AI and heuristic models work together to detect anomalies and known threats.

3

Orchestrator Coordination
The orchestrator coordinates agents to correlate, respond, and update stakeholders.

4

Communication & Transparency
Dashboards and reports provide real-time visibility for security teams and executives.

5

Continuous Improvement
The system continuously learns and adapts, ensuring ongoing protection against new threats.
Thank-you
Spring 2025
Part II
Powering Cyber Agentic Architectures
Speed, Resilience and Efficient Access to Data
An agent is software or a system that uses an LLM for control and/or orchestration. They can be single agents designed to execute particular tasks, or they can a series of agents deployed in a network, hierarchical or similar control structure to achieve more complicated roles, processes or complete systems.

1

Scalability & Flexibility
Agents can be scaled and customized to meet specific needs and adapt to changing environments.

2

Modularity & Integration
Extensible and specialized agents operate as discrete entities within a cohesive system.

3

Holistic Intelligence
The behaviour engine contextualizes activities and provides agents an orchestrated intelligence.

4

Continuous Evolution
Models evolve over time, achieving greater accuracy while testing new forecasts.

5

Governance & Compliance
Comprehensive orchestration logs capture an end-to-end record of every decision.
Cyber Agent Architecture: Models & Implementation
Behavioral Models

Response & Goal-Based Agents
Autonomous agents executing threat responses and planning goal-oriented actions.

Utility & Reflex Models
Combines simple reflexes with utility optimization for balanced decision-making.

Model-Based & Hierarchical
Internal environment modeling within multi-level decision hierarchies.
Super-Agent Implementation

Core Detection & Integration
Agent Nautilus™ for threat detection and Data Tapestry™ for cross-platform integration.

Orchestration & Defense
Orchestrator Super Agent coordinates workflow while Cyber Defender provides automated response.

Security Validation
Cyber Red Team Level 1 conducts automated penetration testing and security validation.
Communication and Publishing Layer
AI to AI, and AI to Human
GenAI and publishing tools have enabled constant evolving publishing platforms. Our LLM bridges the gap, easing integration with nearly any visualization or reporting tool as well as rich workflow enablement. The system also bridges the AI-to-Machine divide via the same channels. Agent Bartok regularly exchanges with Co-Pilot, Gemini, Mistral and more. Facilitate the technical integration and write the scripts for avatars, all within Agent Bartok the ICG LLM.
Agent Bartok via Teams
Agent Barok via Web
Talking Avatars

synthesia.io

Like people, agents need a home. They can be run within the ICG LLM framework, the ICG SaaS Platform & SOA, or within any environment you prefer. The LLM will facilitation integration with via nearly any web standard into SIEMs, BIs, dashboard solutions, automation or any other publishing tool.
Data Pipelines & Compatibility

1

Time Series Models
Analyzes historical security data for trending anomalies or suspicious spikes.

2

Compatibility Framework
Ensures seamless integration with diverse security tools, logs, and endpoints.

3

CTI & Benchmark Partners
Ingests curated threat intelligence feeds or industry benchmarks, like CVE databases and ISACs.
Attribution Engines
Tracking the impact of threats and the value of our work.
Training Attribution Engine
Trainings and agents developed within the system are attributed to their authors and derivatives are tagged downstream.
Threat Attribution Engine
Traces threats and their impact back to their origins, identifying responsible actors and their motivations.
Agent Marketplace
Offers a centralized marketplace for AI models and agents, facilitating discovery, deployment, and monetization.
AI Workflow with Data Management
Getting Alerts Where they Need to Go and RLHF
Data Science Management & Training
Builds and updates the ML models behind threat detection, anomaly identification, and other security tasks.
Workflow & Inference
Operational layer that runs inference in real-time, connecting to live traffic logs, EDR, or SIEM systems.
Governance & Orchestration
Enforces access control and entitlement, compliance requirements, orchestrates agent actions, and logs activities for auditing.
Part III: Agent Nautilus Data Flows
Cyber Agentic Architecture
Agent Nautilus & ICG Dataflows: A Closer Look

1

Data Sources & Initial Collection

2

Compatibility Framework

3

Data Pipelines & Trend Analysis

4

AI Workflow & Behavioral Context Engine

5

Agentic Workflow Orchestrator

6

Communication & Publishing Layer

7

Continuous Feedback & Enhancement

8

Storage & Long-Term Archives

Can live in the customer-ICG private cloud

ICG private network
1. Data Sources & Initial Collection
Sensor Observations
Network traffic logs, security events, endpoint activity, and other sensor data.
Raw Security Logs / SIEM
Logs from firewalls, intrusion detection systems (IDS), endpoint protection (EDR), and other security devices.
Any Time Series Data Source
Agent Nautilus can disambiguate and de-noise any time series dataset. The contextual analysis capabilities enable the rapid identification and correlation of actors via the ICG Genome, quickly and efficiently cutting through data that provides no value to the targeted outcome.
2. Compatibility Framework: Normalization & Disambiguation

1

Schema Alignment
Maps varying fields into a consistent format for seamless processing by downstream modules.

2

Disambiguation
Resolves conflicting identifiers, ensuring that all events refer to the same entities.

3

Metadata Tagging
Assigns standardized labels to events, providing clear context for downstream analytics.
3. Data Pipelines & Trend Analysis: Heuristic Models & Threat Intel
Heuristic Models
Analyze historical data to establish baselines and identify suspicious patterns.
Threat Intel Integration
Cross-references ingested data with known IoCs and threat intelligence feeds to identify potential threats.
4. AI Workflow & Behavioral Context Engine (Agent Nautilus)
Behavioral Context Engine (Agent Nautilus)
Proprietary AI models that continuously learns from data, identifying normal behavior and flagging anomalies. This forms the depth and environment for the systems to learn and understand relationships.
Workflow & Inference
Interprets anomaly signals in real-time, deciding whether to escalate, log, or correlate further. This forms the core of the threat detection capabilities and data analysis engine.

5. Agentic Workflow Orchestrator: Central Coordination & C2 Channels

1

Receiving Alerts
Monitors the system for suspicious activity, receiving alerts from the behavioral context engine and heuristic models.

2

Task Routing
Dispatches tasks to specialized agents based on the nature of the alert and the required response actions.

3

Feedback Loop
Receives status updates from agents, enabling continuous learning and adaptation to new threats.
6. Communication & Publishing Layer: Transparent Visibility for All Stakeholders
The agentic publishing layer is addressable via an endless array of options.. Agent Bartok, our LLM powered chatbot, can create just about any API, interface or connection necessary to facilitate data interaction and visibility. From talking avatars and security orchestration to scoreboards and operational dashboards, define your publishing and human interactions via natural language configurations.

1

Security Posture Report
Provides up-to-date insights on an organization's security posture, enabling informed decision-making.

2

Incident Response Playbooks
Auto-updates with recommended remediation steps, guided by active incidents identified by the orchestrator.

3

Real-Time Threat Scoreboard
Displays ongoing threats, newly detected anomalies, and their current status in real-time dashboards.

4

Agent Bartok
Llama powered chatbot for interacting with your network dataset. Ask it everything and anything an LLM can do, with immediate and direct access to your proprietary information. Query everything from security alerts to response procedures and configuration processes. Direct, natural language interactions currently available in English, French, Spanish, Italian and German.
7. Continuous Feedback & Enhancement: Learning from Experience
Incident Outcomes
Learns from confirmed alerts and false positives, enhancing future anomaly detection.
Model Refresh
Periodically retrains AI models with new data, ensuring they stay current with evolving threats and self-learning capabilities.
Self-attention enables the model to capture context and extract meaningful features, enabling better understanding of data and more accurate threat detection.
8. Storage & Long-Term Archives: Data Retention and Compliance

1

Model Repository
Stores all active ML models and past versions for rollback or compliance checks.

2

Compliance Logs & Records
Logs every action taken for regulatory audits, ensuring compliance with relevant standards.

3

Forensic Data Archives
Retains high-detail event traces for in-depth investigations and legal evidence.
Part IV
Powering the Cyber Agentic Framework
AI is rapidly powering a shift in how we manage our infrastructure and cyber world. ICG Agent Nautilus enables agents to work in harmony to protect, detect, and respond to threats across your entire ecosystem by empowering C2 and incident response. See your whole digital world.
Functional, Detection & Monitoring Agents

1

Scanning & Asset Discovery
Maps threat surfaces, discovers assets, and continuously monitors network activity for comprehensive visibility.

2

Data Processing & Analysis
Ingests and normalizes logs, processes data, and performs analysis to support informed decision-making.

3

Risk Assessment
Evaluates potential business impact of threats and provides risk mitigation strategies based on NIST 2.0 and MITRE ATT&CK frameworks.

4

Correlation & Intelligence
Combines signals from multiple sources and maintains continuous learning feedback loops for improved threat detection.
Behavarioual Agents

1

Alert & Communication
Manages the alerting pipeline and facilitates system-wide communication for coordinated responses.

2

Threat Response
Executes incident response playbooks and automates containment and remediation actions.

3

Compliance & Documentation
Creates audit trails, generates compliance reports, and maintains comprehensive security documentation.

4

Orchestration & Coordination
Oversees workflow management, task allocation, and collaboration between different agent systems.
Evolution of Cyber Agents: From Basic Models to Super Agents
The cyber agent ecosystem encompasses multiple levels of sophistication, from fundamental behavioral models to advanced super-agents, creating a comprehensive security framework.

1

Foundation: Basic Agent Models
  • Simple Reflex Agents: Direct threat response without state maintenance
  • Model-Based Reflex Agents: Internal environment modeling for informed decisions
  • Goal-Based Agents: Action planning for specific security objectives
  • Utility-Based Agents: Risk-reward optimization through utility functions

2

Functional Implementation
  • Scanning & Monitoring Agents: Network surveillance
  • Data & Analysis Agents: Threat detection and processing
  • Task & Response Agents: Automated operation execution
  • Communication & Coordination Agents: System-wide orchestration

3

Advanced Integration
  • Hierarchical Agents: Multi-level decision making
  • Directed Acyclic Graphs: Optimized task execution
  • Cross-functional Teams: Combined monitoring and response capabilities

4

Super Agent Evolution
  • Agent Nautilus™: Advanced threat detection engine
  • Data Tapestry™: Cross-platform integration
  • Cyber Defender & Red Team: Automated security operations
This hierarchical structure enables comprehensive cybersecurity coverage, from basic threat response to sophisticated system-wide protection.
Cyber Super-Agent Library

1

Threat Detection Super Agent (Agent Nautilus™)
The core behavioral analysis engine, providing advanced threat detection and anomaly analysis.

2

Data Tapestry ™ Super Agent
Connects and integrates diverse security tools, across language, vendor, timezone and platform, enabling seamless communication and data sharing.

3

Orchestrator Super Agent
Coordinates and manages the overall workflow, orchestrating the actions of various agents to optimize security operations.

4

Cyber Defender Agent Level 1
Automated threat response agent, working alongside SOC operators to quickly and effectively contain threats.

5

Cyber Red Team Level 1
Automated pen testing and security development validation, ensuring the robustness of an organization's security posture.
Cyber Agent Library: Agent Bartok via Synthesia
Loading...
Key Capabilities
  • Direct integration of the Agent Nautilus threat detection capabilities and alerting via the Synthesia workflow
  • Llama 3.2 LLM powered with the ICG Nautilus network observations and threat detection capabilities.
  • Deliver key observations and alerts to staff via the video avatar workflow.
  • Generate GRC and reporting by querrying the system in natural language

Cyber Agent Library: Agent Bartok - Talking Avatar via Colossyan
Key Capabilities
  • Direct integration of the Agent Nautilus threat detection capabilities and alerting with Colossyan.
  • Llama 3.2 LLM powered with the ICG Nautilus network observations and threat detection capabilities.
  • Deliver key observations and alerts to staff via the video avatar workflow.
  • Generate GRC and reporting by querrying the system in natural language

Cyber Agent Library: Agent Bartok via Web
  • Direct integration of the Agent Nautilus threat detection capabilities and alerting.
  • Llama 3.2 LLM powered with the ICG network observations and threat detection capabilities.
  • Directly query and interrogate your entire network stack directly from Teams.
  • Generate GRC and reporting by querrying the system in natural language.
  • Build integrations and APIs directly from the chatbot into approved python sandboxes..

Cyber Agent Library: Agent Bartok via Co-Pilot
  • Direct integration of the Agent Nautilus threat detection capabilities and alerting.
  • Co-Pilot powered LLM interaction with the ICG network observations and threat detection capabilities.
  • Directly query and interrogate your entire network stack directly from Teams.
  • Co-mingle Sharepoint folders and stacks, such as your IR manuals or specifications.
  • Generate GRC and reporting directly from inside Teams to Business Central.

Cyber Agent Library: Risk Value Cyber Agent
Return on Resilience
Demonstrate the value of your cyber investments. Understand the implications and financial value of cyber projects and incidents.
Vulnerability Analysis
Understand the financial implication of vulnerabilities, risks, and threats on your organization.
Financial Implications
Evaluate the cost of remediation, risk mitigation, and the potential financial impact of a cyberattack.
Return on Resilience Models
The LLM facilitates rapid ingestion of financial models and calculations. Here we have trained the LLM on the Accenture Return on Resilience model.

Example ticket using the Threat Attribution and Price Value Engine Co-Mingled with a Real Alert:
A data privacy violation involving BigIntegrator's power customer in Texas, Natural Energy, could have significant consequences for both companies. Based on the Accenture Return on Resilience (RoRes) model and market trends, we can assess the potential impact:
Financial Impact
  1. Direct Costs: The average cost of a data breach in the energy sector was estimated at $4.78 million in 2023​​. For a major utility like Natural Energy, this figure could be substantially higher.
  1. Regulatory Fines: Energy companies face strict data privacy regulations. Violations can lead to substantial fines, potentially reaching millions of dollars per incident​​.
  1. Lost Business: Cyber-resilient companies experience 16% higher incremental revenue growth. A major breach could reverse this advantage, leading to significant revenue loss.
Operational and Reputational Consequences
  1. Service Disruption: A breach could disrupt Natural Energy's operations, affecting power delivery to customers across Texas.
  1. Trust Erosion: Cybersecurity breaches severely damage trust between energy companies and their stakeholders, impacting customer retention and investor confidence​​.
  1. Long-term Impact: The reputational damage from a significant breach can have lasting effects on both Natural Energy and BigIntegrator, potentially affecting future contracts and partnerships.
Broader Implications for BigIntegrator
  1. Contract Loss: BigIntegrator's contract with Natural Energy, valued at $153.5 million in 2019​​, could be at risk if a major breach occurs due to BigIntegrator's services.
  1. Industry Reputation: As a key IT service provider in the energy sector, a significant breach could damage BigIntegrator's reputation across the entire industry.
  1. Legal Liability: BigIntegrator could face legal action from Natural Energy or affected customers, leading to additional costs and reputational damage.
  1. Market Value Impact: BigIntegrator's stock value could be negatively affected, as evidenced by the 3.24% drop following a recent ransomware incident​​.
Cyber Agent Library: Agent 16.18 Network Sensors
Plant & Field Sensor Agents
Software Based Sensor Agents

SNAP
Prioritized workflow management with automated ticket assignment and orchestration

Windows
Smart playbooks and correlation engines to accelerate threat investigation and remediation

Open Source
Available via git hub, simply run packet capture capabilities to a directory accessible by the agent and feed time series data into ICG and Agent Nautilus.
Together, these agents provide end-to-end coverage from physical sensor monitoring to intelligent ticket management, creating a unified security operations framework.
SaaS Ticket Management Agent
Prioritized alerts
Management and delivery workflow, ticket assignment and follow-up via a event orchestration system.
Recommended playbooks
Improve productivity and response time to investigate, mitigate, and remediate threats.
Aggregation and correlation of events
Global visibility and streamlined event triage: disrupt the progression of the cyber kill chain.
Accurate Assets, Inventory & Threat Surfaces
Not just a list - assets categorized by device type for pinpoint insight.

Cyber Agent Library: Visualization & Publishing via Mermaid.live
Flow Diagrams
Create dynamic flowcharts and process diagrams to visualize cyber workflows.
Sequence Mapping
Map complex sequences and interactions between system components.
Architecture Visualization
Generate clear visual representations of system architectures and relationships via natural language interactions.
Thank you
Turn the tide with Genomic AI
CASEY POTENZONE | casey@insightcyber.com