NEAR-REAL-TIME EXPORT OF CYBER-SECURITY RISK INFORMATION
First Claim
1. A method comprising:
- monitoring, by a risk manager system, a plurality of connected devices that are vulnerable to cyber-security risks;
detecting, by the risk manager system, a cyber-security risk to one or more of the devices being monitored;
identifying, by the risk manager system, an external system to be notified of the detected cyber-security risk; and
sending cyber-security risk data, by the risk manager system, to the external system according to the detected cyber-security risk and at least one filtering option.
1 Assignment
0 Petitions
Accused Products
Abstract
This disclosure provides an apparatus and method for near-real-time export of cyber-security risk information, including but not limited to in industrial control systems and other systems. A method includes monitoring, by a risk manager system, a plurality of connected devices that are vulnerable to cyber-security risks. The method includes detecting a cyber-security risk to one or more of the devices being monitored. The method includes identifying an external system to be notified of the detected cyber-security risk. The method includes sending cyber-security risk data to the external system according to the detected cyber-security risk and at least one filtering option.
-
Citations
20 Claims
-
1. A method comprising:
-
monitoring, by a risk manager system, a plurality of connected devices that are vulnerable to cyber-security risks; detecting, by the risk manager system, a cyber-security risk to one or more of the devices being monitored; identifying, by the risk manager system, an external system to be notified of the detected cyber-security risk; and sending cyber-security risk data, by the risk manager system, to the external system according to the detected cyber-security risk and at least one filtering option. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A risk manager system comprising:
-
a controller; and a memory, the risk manager system configured to; monitor a plurality of connected devices that are vulnerable to cyber-security risks; detect a cyber-security risk to one or more of the devices being monitored; identify an external system to be notified of the detected cyber-security risk; and send cyber-security risk data to the external system according to the detected cyber-security risk and at least one filtering option. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory machine-readable medium encoded with executable instructions that, when executed, cause one or more processors of a risk manager system to:
-
monitor a plurality of connected devices that are vulnerable to cyber-security risks; detect a cyber-security risk to one or more of the devices being monitored; identify an external system to be notified of the detected cyber-security risk; and send cyber-security risk data to the external system according to the detected cyber-security risk and at least one filtering option. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification