18627922. DYNAMIC INTELLIGENT CYBER PLAYBOOKS simplified abstract (Raytheon Company)

From WikiPatents
Revision as of 05:07, 18 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

DYNAMIC INTELLIGENT CYBER PLAYBOOKS

Organization Name

Raytheon Company

Inventor(s)

Torsten A. Staab of Bristow VA (US)

Daniel S. Rose of Salado TX (US)

Travis R. Durbin of PINEHURST NC (US)

DYNAMIC INTELLIGENT CYBER PLAYBOOKS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18627922 titled 'DYNAMIC INTELLIGENT CYBER PLAYBOOKS

The abstract of the patent application describes a method that involves detecting an event, identifying security tools from an inventory, generating a playbook based on the event and inventory, which includes commands corresponding to the security tools, and executing the playbook.

  • Detect an event
  • Identify security tools from an inventory
  • Generate a playbook based on the event and inventory
  • Include commands corresponding to the security tools in the playbook
  • Execute the playbook

Potential Applications: - Cybersecurity incident response - Security automation - Threat detection and mitigation

Problems Solved: - Streamlining security incident response - Enhancing efficiency in utilizing security tools - Improproving overall cybersecurity posture

Benefits: - Faster response to security incidents - Reduction in manual effort for executing security tasks - Improved coordination among security tools

Commercial Applications: Title: "Enhanced Cybersecurity Incident Response Automation" This technology can be utilized by cybersecurity companies, IT departments, and organizations with a focus on data protection to automate and optimize their incident response processes, leading to improved security posture and reduced risk of data breaches.

Questions about the technology: 1. How does this method improve the efficiency of cybersecurity incident response? - This method automates the execution of security tools based on predefined playbooks, reducing the time taken to respond to security incidents. 2. What are the key advantages of generating a playbook based on the inventory of security tools? - Generating a playbook based on the inventory ensures that the most relevant and effective security tools are utilized in response to specific events.


Original Abstract Submitted

A method, involving; detecting an event; identifying one or more security tools that are currently part of an inventory of security tools; generating a playbook based on the inventory, the playbook being generated responsive to the event, the playbook being a script that includes one or more commands, each of the commands corresponding to a respective security tool in the inventory of security tools; and executing the playbook.