METHOD AND SYSTEM FOR CONTROLLING CONTEXT-AWARE CYBERSECURITY TRAINING
First Claim
Patent Images
1. A cybersecurity training system, comprising:
- a processor;
one or more data storage devices that store;
at least one training intervention, anda training needs model;
a computer-readable memory portion holding programming instructions that, when executed, instruct one or more processors to implement a policy manager that;
analyzes data relating to at least one user by applying the training needs model to the data to determine whether the at least one user may be at risk for a threat scenario, andidentifies, from the at least one training intervention, a set of one or more system-selected training interventions that are relevant to the threat scenario;
a computer-readable memory portion holding programming instructions that, when executed, instruct one or more processors to implement a system administrator interface that displays the set of one or more system-selected training interventions and receives a selection of an intervention in the set from an administrator; and
a computer-readable memory portion holding programming instructions that, when executed, instruct one or more processors to generate a command to deliver the administrator-selected training intervention to the at least one user.
9 Assignments
0 Petitions
Accused Products
Abstract
A context-aware training system senses a user action that may expose the user to a threat, such as a cybersecurity threat. The system selects a training action from a collection of available training actions and causes the training action to be delivered to the user or a group of users. The system includes an administrator interface that enables an administrator to select, customize and/or assign constraints to the training action that will be delivered to the user(s).
334 Citations
28 Claims
-
1. A cybersecurity training system, comprising:
-
a processor; one or more data storage devices that store; at least one training intervention, and a training needs model; a computer-readable memory portion holding programming instructions that, when executed, instruct one or more processors to implement a policy manager that; analyzes data relating to at least one user by applying the training needs model to the data to determine whether the at least one user may be at risk for a threat scenario, and identifies, from the at least one training intervention, a set of one or more system-selected training interventions that are relevant to the threat scenario; a computer-readable memory portion holding programming instructions that, when executed, instruct one or more processors to implement a system administrator interface that displays the set of one or more system-selected training interventions and receives a selection of an intervention in the set from an administrator; and a computer-readable memory portion holding programming instructions that, when executed, instruct one or more processors to generate a command to deliver the administrator-selected training intervention to the at least one user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of providing an administrator interface for a cybersecurity training system, comprising:
-
maintaining, on one or more data storage devices, one or more training interventions and a training needs model; and by a processor; receiving data relating to at least one user, applying the training needs model to the received data to determine whether the at least one user may be at risk of a threat scenario, identifying one or more of the training interventions that are relevant to the threat scenario, displaying, via the system administrator interface, the identified one or more training interventions, receiving, via the system administrator interface, an administrator selection of a displayed training intervention, and generating a command to deliver the administrator-selected training intervention to the at least one user. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method of providing an administrator interface for a security training system, comprising:
-
maintaining, on one or more data storage devices, at least one training intervention; and by a processor; displaying, via a system administrator interface, a representation of a measurement of whether at least one user may be at risk of a threat scenario, identifying one or more of the training interventions that are relevant to the threat scenario, displaying, via the system administrator interface, the identified one or more training interventions, receiving an administrator selection of one of the displayed training interventions, receiving a customization for the administrator-selected training intervention, and generating a command to deliver the administrator-selected training intervention with the customization to the at least one user. - View Dependent Claims (23, 24)
-
-
25. A cybersecurity training system, comprising:
-
a processor; one or more data storage devices that store; at least one training intervention, and a training needs model; a computer-readable memory portion holding programming instructions that, when executed, instruct one or more processors to implement a policy manager that analyzes data relating to at least one user by applying the training needs model to the data to determine whether the at least one user may be at risk for a threat scenario; and a computer-readable memory portion holding programming instructions that, when executed, instruct one or more processors to implement a system administrator interface that is configured to perform at least one of the following actions; display parameters of the training needs model and receive a customization of the training needs model from the administrator, or display logic of the policy manager and receive a configuration of the logic from the administrator; wherein the system is also configured to, upon completion of at least one of the actions of the system administrator interface; select one or more of the training interventions that are relevant to the threat scenario, and generate a command to deliver the selected training intervention to the at least one user. - View Dependent Claims (26, 27, 28)
-
Specification