17944159. THREAT MANAGEMENT SYSTEM FOR IDENTIFYING AND PERFORMING ACTIONS ON CYBERSECURITY TOP THREATS simplified abstract (Google LLC)
Contents
- 1 THREAT MANAGEMENT SYSTEM FOR IDENTIFYING AND PERFORMING ACTIONS ON CYBERSECURITY TOP THREATS
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 THREAT MANAGEMENT SYSTEM FOR IDENTIFYING AND PERFORMING ACTIONS ON CYBERSECURITY TOP THREATS - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
THREAT MANAGEMENT SYSTEM FOR IDENTIFYING AND PERFORMING ACTIONS ON CYBERSECURITY TOP THREATS
Organization Name
Inventor(s)
Benjamin Withnell of New York NY (US)
Nalani Fraser of Los Angeles CA (US)
Christopher Key of Great Falls VA (US)
THREAT MANAGEMENT SYSTEM FOR IDENTIFYING AND PERFORMING ACTIONS ON CYBERSECURITY TOP THREATS - A simplified explanation of the abstract
This abstract first appeared for US patent application 17944159 titled 'THREAT MANAGEMENT SYSTEM FOR IDENTIFYING AND PERFORMING ACTIONS ON CYBERSECURITY TOP THREATS
Simplified Explanation
The patent application describes a threat management system with a recommendation engine and an action engine. The recommendation engine analyzes threats from the threat catalog and enterprise profile to generate a top threat list, while the action engine generates actions to mitigate or neutralize each threat on the list.
- The recommendation engine conducts analytics on threat data to identify threats to the enterprise.
- The action engine generates actions to address each threat on the top threat list.
Potential Applications
This technology could be applied in cybersecurity systems, risk management tools, and threat intelligence platforms.
Problems Solved
This technology helps organizations identify and address potential threats to their operations, data, and infrastructure.
Benefits
The system provides proactive threat management, enhances security measures, and improves overall risk mitigation strategies.
Potential Commercial Applications
"Enhancing Threat Management Systems for Enterprise Security"
Possible Prior Art
One possible prior art could be existing threat intelligence platforms that provide similar threat analysis and action generation capabilities.
Unanswered Questions
1. How does the system prioritize threats on the top threat list? 2. What types of actions are typically generated by the action engine to mitigate threats?
Original Abstract Submitted
A threat management system features a recommendation engine and an action engine. The recommendation engine is configured to (i) conduct analytics on content from the threat catalog and content from the enterprise profile to generate results that identify a plurality of threats directed to the enterprise and (ii) generate a top threat list based on the analytic results. The action engine is communicatively coupled to the recommendation engine. The action engine is configured to receive the top threat list and generate a plurality of actions corresponding to each threat of the top threat list, where each action of the plurality of actions includes information directed to operations to mitigate or neutralize a risk associated with a threat of the top threat list.