SYSTEM AND METHOD FOR CYBER ATTACKS ANALYSIS AND DECISION SUPPORT
First Claim
1. A method for cyber attack risk assessment, the method comprising operating at least one hardware processor for:
- collecting global cyber attack data from a networked resource;
collecting organizational profile data from a user, wherein the organizational profile data comprises;
types of computerized defensive controls employed by the organization, a maturity of each of the computerized defensive controls, and organizational assets each pertaining to a business environment and each associated with at least one of the computerized defensive controls; and
computing a cyber attack risk of the organization in real time, by continuously performing said collecting of global cyber attack data and comparing the global cyber attack data to the organizational profile data, to compute a cyber attack risk score for each of the organizational assets.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for cyber attack risk assessment, the method comprising operating at least one hardware processor for: collecting global cyber attack data from a networked resource; collecting organizational profile data from a user, wherein the organizational profile data comprises: types of computerized defensive controls employed by the organization, a maturity of each of the computerized defensive controls, and organizational assets each pertaining to a business environment and each associated with at least one of the computerized defensive controls; and computing a cyber attack risk of the organization in real time, by continuously performing said collecting of global cyber attack data and comparing the global cyber attack data to the organizational profile data, to compute a cyber attack risk score for each of the organizational assets.
-
Citations
20 Claims
-
1. A method for cyber attack risk assessment, the method comprising operating at least one hardware processor for:
-
collecting global cyber attack data from a networked resource; collecting organizational profile data from a user, wherein the organizational profile data comprises;
types of computerized defensive controls employed by the organization, a maturity of each of the computerized defensive controls, and organizational assets each pertaining to a business environment and each associated with at least one of the computerized defensive controls; andcomputing a cyber attack risk of the organization in real time, by continuously performing said collecting of global cyber attack data and comparing the global cyber attack data to the organizational profile data, to compute a cyber attack risk score for each of the organizational assets. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transient computer readable medium having stored thereon instructions that, when executed by at least one hardware processor, cause the at least one hardware processor to:
-
collect global cyber attack data from a networked resource; collect organizational profile data from a user, wherein the organizational profile data comprises types of computerized defensive controls employed by the organization, a maturity of each of the computerized defensive controls and organizational assets each associated with at least one of the computerized defensive controls; and compute a cyber attack risk of the organization in real time, by continuously performing said collecting of global cyber attack data and comparing the global cyber attack data to the organizational profile data, to compute a cyber attack risk score for each of the organizational assets. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A decision support system comprising at least one hardware processor configured to:
-
collect global cyber attack data from a networked resource; collect organizational profile data from a user, wherein the organizational profile data comprises types of computerized defensive controls employed by the organization, a maturity of each of the computerized defensive controls and organizational assets each associated with at least one of the computerized defensive controls; compute a cyber attack risk of the organization in real time, by continuously performing said collecting of global cyber attack data and comparing the global cyber attack data to the organizational profile data, to compute a cyber attack risk score for each of the organizational assets; and supporting a decision on improvement of one or more of the computerized defensive controls by providing a risk simulator configured to compute an effect of improving one or more of the computerized defensive controls on the cyber attack risk score. - View Dependent Claims (18, 19, 20)
-
Specification