PERVASIVE, DOMAIN AND SITUATIONAL-AWARE, ADAPTIVE, AUTOMATED, AND COORDINATED ANALYSIS AND CONTROL OF ENTERPRISE-WIDE COMPUTERS, NETWORKS, AND APPLICATIONS FOR MITIGATION OF BUSINESS AND OPERATIONAL RISKS AND ENHANCEMENT OF CYBER SECURITY
First Claim
1. A method for analyzing and mitigating risks and enhancing cyber security throughout enterprise-wide operational technology (OT) systems and information technology (IT) systems supporting business processes of an enterprise, and other information processing needs of said enterprise, and security technology (ST) networks to maintain a high level of security, comprising:
- identifying within said networks a plurality of monitored and controlled elements (MCEs);
providing pervasive business risk and security monitoring and control capabilities that adapt to evolving situational intelligence and existing control postures of target systems, subsystems, and elements at a plurality of hierarchical levels of said networks;
wherein said pervasive security monitoring and control capabilities are self-similar structurally, pervasive functionally, adaptive across various time scales, and relational analytically based on domain knowledge of physical operational and IT systems, operating rules, business processes and compliance policies;
monitoring real-time conditions and activities on said network elements, as well as elements of underlying enterprise business processes that are affected if and when security of an element is breached or business processes compromised; and
adapting said security monitoring and control capabilities at selected hierarchical levels and at selected time scales in response to enterprise situational knowledge that is relevant to said OT, IT, and ST networks, as well as subsystems and elements of said networks with regard to underlying business processes;
wherein said situational knowledge comprising any of situational changes, control implementations, and adjustments thereof, and other transitions in any of said OT systems, said IT systems, and a security threat environment; and
wherein said hierarchical levels range from an entire enterprise-wide network at a highest level to a single transaction at a lowest level.
1 Assignment
0 Petitions
Accused Products
Abstract
Real time security, integrity, and reliability postures of operational (OT), information (IT), and security (ST) systems, as well as slower changing security and operational blueprint, policies, processes, and rules governing the enterprise security and business risk management process, dynamically evolve and adapt to domain, context, and situational awareness, as well as the controls implemented across the operational and information systems that are controlled. Embodiments of the invention are systematized and pervasively applied across interconnected, interdependent, and diverse operational, information, and security systems to mitigate system-wide business risk, to improve efficiency and effectiveness of business processes and to enhance security control which conventional perimeter, network, or host based control and protection schemes cannot successfully perform.
301 Citations
23 Claims
-
1. A method for analyzing and mitigating risks and enhancing cyber security throughout enterprise-wide operational technology (OT) systems and information technology (IT) systems supporting business processes of an enterprise, and other information processing needs of said enterprise, and security technology (ST) networks to maintain a high level of security, comprising:
-
identifying within said networks a plurality of monitored and controlled elements (MCEs); providing pervasive business risk and security monitoring and control capabilities that adapt to evolving situational intelligence and existing control postures of target systems, subsystems, and elements at a plurality of hierarchical levels of said networks;
wherein said pervasive security monitoring and control capabilities are self-similar structurally, pervasive functionally, adaptive across various time scales, and relational analytically based on domain knowledge of physical operational and IT systems, operating rules, business processes and compliance policies;monitoring real-time conditions and activities on said network elements, as well as elements of underlying enterprise business processes that are affected if and when security of an element is breached or business processes compromised; and adapting said security monitoring and control capabilities at selected hierarchical levels and at selected time scales in response to enterprise situational knowledge that is relevant to said OT, IT, and ST networks, as well as subsystems and elements of said networks with regard to underlying business processes;
wherein said situational knowledge comprising any of situational changes, control implementations, and adjustments thereof, and other transitions in any of said OT systems, said IT systems, and a security threat environment; and
wherein said hierarchical levels range from an entire enterprise-wide network at a highest level to a single transaction at a lowest level. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
Specification