AS0001, Inc. d/b/a Spektrum Labs (20240267393). ADAPTIVE SECURITY ARCHITECTURE BASED ON STATE OF POSTURE simplified abstract

From WikiPatents
Jump to navigation Jump to search

ADAPTIVE SECURITY ARCHITECTURE BASED ON STATE OF POSTURE

Organization Name

AS0001, Inc. d/b/a Spektrum Labs

Inventor(s)

Jonathan J. Thompson of Carmel IN (US)

ADAPTIVE SECURITY ARCHITECTURE BASED ON STATE OF POSTURE - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240267393 titled 'ADAPTIVE SECURITY ARCHITECTURE BASED ON STATE OF POSTURE

The patent application describes systems, methods, and computer-readable storage media for protecting data. One system includes a readiness system that identifies the security posture of an entity based on entity data and models the security posture and security objectives to generate a set of attributes of the entity. The system also includes a cybersecurity connection system that generates a cybersecurity protection plan corresponding to an attribute to protect the entity, which is activated in response to an input by the entity. Additionally, an incident system models cybersecurity protection plans between the entity and a third-party, and a remediation system executes remediation actions to mitigate vulnerabilities or security gaps based on the entity's security posture.

  • Readiness system to identify the security posture of an entity based on entity data and model security objectives.
  • Cybersecurity connection system to generate cybersecurity protection plans for the entity.
  • Incident system to model cybersecurity protection plans between the entity and a third-party.
  • Remediation system to execute remediation actions to mitigate vulnerabilities or security gaps.
  • Protection plans are activated in response to inputs by the entity.

Potential Applications: - Data protection for organizations and entities. - Cybersecurity risk management. - Incident response planning and execution.

Problems Solved: - Identifying and mitigating vulnerabilities in an entity's security posture. - Establishing proactive cybersecurity protection plans. - Managing incidents and remediation actions effectively.

Benefits: - Enhanced data protection. - Improved cybersecurity posture. - Efficient incident response and remediation.

Commercial Applications: Title: Enhanced Data Protection and Cybersecurity Management System This technology can be utilized by organizations, government agencies, and businesses to enhance their data protection and cybersecurity management practices. It can help in proactively identifying and mitigating vulnerabilities, establishing robust protection plans, and efficiently managing incidents and remediation actions.

Questions about Data Protection and Cybersecurity Management System:

1. How does the readiness system identify the security posture of an entity? The readiness system identifies the security posture of an entity based on entity data and models security objectives to generate a set of attributes.

2. What is the role of the cybersecurity connection system in protecting the entity? The cybersecurity connection system generates cybersecurity protection plans corresponding to attributes to protect the entity and activates them in response to inputs.


Original Abstract Submitted

systems, methods, and computer-readable storage media for protecting data. one system includes a readiness system comprising executable instructions to identify a security posture of an entity based on entity data and model the security posture and at least one security objective to generate a set of attributes of the entity. the system can further include a cybersecurity connection system comprising executable instructions to generate a cybersecurity protection plan corresponding to an attribute to protect the entity, wherein the cybersecurity protection plan is activated in response to an input by the entity. the system can further include an incident system comprising the executable instructions to model a plurality of cybersecurity protection plans between the entity and a third-party. the system can further include a remediation system comprising the executable instructions execute one or more remediation actions to mitigate a vulnerability or security gap based on the security posture of the entity.