The LeaksID solution to deter data leaks was founded by G-71 Inc. in 2019 by experts in IT & cybersecurity to solve a crucial problem enterprises face: leaks and public disclosure of sensitive documents that are compromised via various methods, including photographs.

About us

Our team

CEO
CTO
CMO
Sergey Voynov
Igor Zuykov
Julia Doronina
Sergey is a serial entrepreneur in the booming cybersecurity industry and the founder of several successful companies. Sergey has been working in IT since 2001. He started as a consultant and project manager, then worked as a top manager of several large and international companies. Among Sergey's clients are the world's largest oil, energy and industrial companies, as well as medical and legal companies that work with sensitive information.
Igor is a skilled CTO with 17+ years of experience in software architecture, development, and deployment. 15+ years of experience working on many enterprise and integration projects, including real-time services and distributed systems, and taking part in creating an integration platform for banks and telecom operators. Eager to leverage the business value and benefits of IT solutions for cybersecurity purposes. Strong information technology professional, graduated from The Bauman Moscow State Technical University, Software for Computers and Automation Systems in 2006.
Yulia is a marketer with more than 7 years of experience in marketing management in tech companies (B2B/B2C SaaS & marketplaces), advertising agencies, and the cybersecurity industry. More than 4 years of experience as a Growth Leader and Head of Marketing in several international startups. Graduated from the Peoples' Friendship University, Institute of World Economics and Business, Master of Advertising Management, 2018. Formed several times the marketing department from scratch. Participant as a member of the core startup team in several acceleration programs and in several international conferences as Emerge, WebSummit, Slush.

Board of Advisors

Brian DiPietro brings over two decades of experience building and leading global teams of scale, centered on relentless execution and risk mitigation. Previously, as the Managing Director Information Security/CISO at JPMorgan Chase with over 16 years of experience, he was responsible for driving all cyber and technology controls initiatives for the Consumer and Commercial businesses, leading all communications with external regulators and internal auditors and interacting with external clients across industry segments on cyber security facts and industry trends. Brian also is the owner of a CISSP certification, International Information Systems Security Certification Consortium (ISC2).


Brian DiPietro
CISO
Eric Seagren brings over 25 years in IT, and as a published author he is well versed in a variety of industries and IT disciplines with multiple publishing credits and technical certifications including CRISC, CISA, CISSP-ISSAP. Eric currently serves as the Chief Information Security Officer at Oceaneering International. Formerly, she was a specialist at Stewart Transaction Solutions and J.P. Morgan Chase & Co., where he managed IT risk for the Central Technology & Operations (CTO) organization by weighing technical risks against the business objectives and educated business stakeholders at various levels. Eric focuses on creating security policies and solutions that respect the business needs and operational requirements of the organization. Eric holds a Bachelor of Science in Business: Information Systems.
Eric Seagren
CISO
Jeff Reich brings over 40 years in the security community, and in building and leading high-performance teams by identifying and developing high potential leaders at all levels of an organization. Jeff currently serves as the Co-Founder and Chief Risk Officer at LexAlign and additionally as Senior Information Security Instructor at the Center for Infrastructure Assurance and Security, delivering executive courses that educate National Guard General Officers and minor business executives to support cybersecurity programs and growth. Building successful programs dealing with challenging problems, delivering prevention, recovery, and turnaround solutions to organizations is what Jeff focuses on. In 2015, he was inducted into the ISSA Hall of Fame. Jeff holds CISSP certification from (ISC) 2, CRISC certification from ISACA. Moreover, he was granted a Foundation Certificate in IT Service Management from The Council for Service Management Education and The Information Systems Examination Board.
Jeff Reich
CRO

Our mission

To create transparent and safe environment in digital communication to protect documents containing confidential or sensitive data in advance and thereby to instill a culture of safe handling of information.

Why we do what we do

There is a common stereotype that the main threat to sensitive information comes from third parties. However, the number of insider-related breaches rises every year. It’s proven that 51% of organizations lack sufficient data protection strategies to detect and prevent insider threats. The reason for this — the development of technological capabilities of personal computers and smartphones. Over the past few years, the number of screenshots, pictures of the screen, and printouts containing sensitive information leaked online has significantly increased. These data breaches happen when documents containing personal data or confidential information are received by people whom users trust the most. Friends, acquaintances, or colleagues may lack knowledge about the rules of safe handling of valuable data or might have malicious intentions.

G-71 created LeaksID to deter people from leaking the most sensitive documents through screenshots, pictures of the screen, printed-out documents, and documents shared via email. LeaksID uses its patented algorithm that marks every file in a way that is invisible to the human eye. The end-user receives a unique copy of the document every time the document is opened, emailed, or printed out. These marks are impossible to remove. In this manner, every person who works with the document knows that if data breaches occur, whoever is responsible for them will be identified, even if the size of the leaked fragment is extremely small.
Get started to deter leaks with LeaksID today
Do you have more questions?
We can make a demo for you.