CyberSaint, Inc. (20240214410). SYSTEMS, MEDIA, AND METHODS FOR UTILIZING A CROSSWALK ALGORITHM TO IDENTIFY CONTROLS ACROSS FRAMEWORKS, AND FOR UTILIZING IDENTIFIED CONTROLS TO GENERATE CYBERSECURITY RISK ASSESSMENTS simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEMS, MEDIA, AND METHODS FOR UTILIZING A CROSSWALK ALGORITHM TO IDENTIFY CONTROLS ACROSS FRAMEWORKS, AND FOR UTILIZING IDENTIFIED CONTROLS TO GENERATE CYBERSECURITY RISK ASSESSMENTS

Organization Name

CyberSaint, Inc.

Inventor(s)

Padraic O'reilly of Lincoln MA (US)

Henry Grover of Acton MA (US)

Scott Shidlovsky of Hooksett NH (US)

SYSTEMS, MEDIA, AND METHODS FOR UTILIZING A CROSSWALK ALGORITHM TO IDENTIFY CONTROLS ACROSS FRAMEWORKS, AND FOR UTILIZING IDENTIFIED CONTROLS TO GENERATE CYBERSECURITY RISK ASSESSMENTS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240214410 titled 'SYSTEMS, MEDIA, AND METHODS FOR UTILIZING A CROSSWALK ALGORITHM TO IDENTIFY CONTROLS ACROSS FRAMEWORKS, AND FOR UTILIZING IDENTIFIED CONTROLS TO GENERATE CYBERSECURITY RISK ASSESSMENTS

The abstract describes a system that uses a crosswalk algorithm to identify cybersecurity controls across different frameworks and generate cybersecurity risk assessments. The process involves identifying controls in a data structure, determining relatedness between these controls and controls from other frameworks, updating the data structure with selected controls, and generating risk assessments for devices/software based on compliance levels.

  • Utilizes a crosswalk algorithm to identify cybersecurity controls across frameworks
  • Generates cybersecurity risk assessments for devices/software
  • Determines relatedness between identified controls and controls from different frameworks
  • Updates data structure with selected controls for a more robust set
  • Generates risk scores based on compliance levels for controls related to defined risks

Potential Applications: - Cybersecurity risk management - Compliance assessment - Security control identification

Problems Solved: - Streamlining cybersecurity control identification - Enhancing risk assessment accuracy - Improving compliance monitoring

Benefits: - Enhanced cybersecurity posture - Efficient control identification process - Accurate risk assessments

Commercial Applications: Title: "Enhancing Cybersecurity Risk Management with Crosswalk Algorithm" This technology can be applied in industries such as finance, healthcare, and government to improve cybersecurity measures, comply with regulations, and protect sensitive data.

Questions about the technology: 1. How does the crosswalk algorithm improve the identification of cybersecurity controls? 2. What are the key benefits of utilizing a crosswalk algorithm for cybersecurity risk assessments?


Original Abstract Submitted

in one or more embodiments, the disclosed systems, methods, and media include utilizing a crosswalk algorithm to identify controls (e.g., cybersecurity controls) across frameworks, and for utilizing identified controls to generate cybersecurity risk assessments. a cybersecurity module may identify one or more controls in a data structure. the process may utilize a crosswalk algorithm to determine a relatedness between the identified controls and different controls of different frameworks. the process may update the data structure with selected different controls, such that a more robust set of controls are identified when the cybersecurity module indexes into the data structure to identify particular controls. additionally, the process may generate a risk assessment for a device/software. the process may generate a risk score for the risk assessment, and the risk score may be based on a determined compliance level for each control determined to be related to a defined risk of interest.