17944159. THREAT MANAGEMENT SYSTEM FOR IDENTIFYING AND PERFORMING ACTIONS ON CYBERSECURITY TOP THREATS simplified abstract (Google LLC)

From WikiPatents
Jump to navigation Jump to search

THREAT MANAGEMENT SYSTEM FOR IDENTIFYING AND PERFORMING ACTIONS ON CYBERSECURITY TOP THREATS

Organization Name

Google LLC

Inventor(s)

Benjamin Withnell of New York NY (US)

Nalani Fraser of Los Angeles CA (US)

Christopher Key of Great Falls VA (US)

THREAT MANAGEMENT SYSTEM FOR IDENTIFYING AND PERFORMING ACTIONS ON CYBERSECURITY TOP THREATS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17944159 titled 'THREAT MANAGEMENT SYSTEM FOR IDENTIFYING AND PERFORMING ACTIONS ON CYBERSECURITY TOP THREATS

Simplified Explanation

The patent application describes a threat management system with a recommendation engine and an action engine. The recommendation engine analyzes threats from the threat catalog and enterprise profile to generate a top threat list, while the action engine generates actions to mitigate or neutralize each threat on the list.

  • The recommendation engine conducts analytics on threat data to identify threats to the enterprise.
  • The action engine generates actions to address each threat on the top threat list.

Potential Applications

This technology could be applied in cybersecurity systems, risk management tools, and threat intelligence platforms.

Problems Solved

This technology helps organizations identify and address potential threats to their operations, data, and infrastructure.

Benefits

The system provides proactive threat management, enhances security measures, and improves overall risk mitigation strategies.

Potential Commercial Applications

"Enhancing Threat Management Systems for Enterprise Security"

Possible Prior Art

One possible prior art could be existing threat intelligence platforms that provide similar threat analysis and action generation capabilities.

Unanswered Questions

1. How does the system prioritize threats on the top threat list? 2. What types of actions are typically generated by the action engine to mitigate threats?


Original Abstract Submitted

A threat management system features a recommendation engine and an action engine. The recommendation engine is configured to (i) conduct analytics on content from the threat catalog and content from the enterprise profile to generate results that identify a plurality of threats directed to the enterprise and (ii) generate a top threat list based on the analytic results. The action engine is communicatively coupled to the recommendation engine. The action engine is configured to receive the top threat list and generate a plurality of actions corresponding to each threat of the top threat list, where each action of the plurality of actions includes information directed to operations to mitigate or neutralize a risk associated with a threat of the top threat list.