METHOD AND SYSTEM FOR PROVIDING RESPONSE SERVICES
First Claim
1. A method comprising:
- receiving a first signal originating from a breached entity, said first signal comprising a request;
obtaining prelim compromise info and converting said prelim compromise info into a form capable of being stored on a computer-readable medium;
dispatching a second signal for the purpose of activating at least one responder; and
responding to a compromise using at least one step chosen from the group of steps consisting of;
(i) advising a breached entity with at least one compromise response decision;
(ii) notifying at least one relevant party about said compromise; and
(iii) acquiring forensics data from at least one forensics investigation area;
(iv) assigning a risk officer to said breached entity;
(v) implementing a training program for said breached entity; and
(vi) referring an insurance professional to said breached entity for the purpose of assisting with an insurance claim.
1 Assignment
0 Petitions
Accused Products
Abstract
Pertaining to information security services, embodiments consistent with the present invention comprise an outsourced bundle of services for the purpose of responding to a compromise of information asset(s). Many of these services and processes have never before been combined into one integrated bundle, and these novel combinations represent an improvement in efficiency and comprehensiveness over the state of the art. Methods and systems consistent with the present invention comprise several main steps and processes, some of which are optional or discretionary. These main steps are: receiving a request, obtaining preliminary information about the compromise, dispatching one or more teams to respond, creating and updating a case file, advising the customer with response decisions, notifying relevant parties about the compromise, acquiring forensics data, referring an insurance professional, implementing a training program, isolating the compromised information asset(s), neutralizing the compromise, creating a risk assessment report, implementing security technologies, and implementing security processes.
-
Citations
1 Claim
-
1. A method comprising:
-
receiving a first signal originating from a breached entity, said first signal comprising a request; obtaining prelim compromise info and converting said prelim compromise info into a form capable of being stored on a computer-readable medium; dispatching a second signal for the purpose of activating at least one responder; and responding to a compromise using at least one step chosen from the group of steps consisting of; (i) advising a breached entity with at least one compromise response decision; (ii) notifying at least one relevant party about said compromise; and (iii) acquiring forensics data from at least one forensics investigation area; (iv) assigning a risk officer to said breached entity; (v) implementing a training program for said breached entity; and (vi) referring an insurance professional to said breached entity for the purpose of assisting with an insurance claim.
-
Specification