US 11,936,676 B2
Enterprise cyber security risk management and resource planning
Ido Ganor, Ra'annana (IL)
Assigned to CISOTERIA LTD., Ra'anana (IL)
Filed by Ido Ganor, Ra'annana (IL)
Filed on Jul. 1, 2021, as Appl. No. 17/364,997.
Application 17/364,997 is a continuation of application No. 16/015,524, filed on Jun. 22, 2018, granted, now 11,057,417.
Claims priority of provisional application 62/523,944, filed on Jun. 23, 2017.
Prior Publication US 2021/0329025 A1, Oct. 21, 2021
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06F 3/04847 (2022.01); G06Q 10/0631 (2023.01); G06Q 10/0635 (2023.01); G06F 3/04842 (2022.01); G06F 21/57 (2013.01); G06Q 30/018 (2023.01); H04L 41/22 (2022.01)
CPC H04L 63/1433 (2013.01) [G06F 3/04847 (2013.01); G06Q 10/06315 (2013.01); G06Q 10/0635 (2013.01); H04L 63/20 (2013.01); G06F 3/04842 (2013.01); G06F 21/577 (2013.01); G06Q 30/018 (2013.01); H04L 41/22 (2013.01); H04L 63/1425 (2013.01); H04L 63/1441 (2013.01)] 22 Claims
OG exemplary drawing
 
1. A system, comprising:
a memory configured to store security policies and procedures associated with an enterprise, wherein the security policies and procedures comprise at least one of device information or policy information identifying actions associated with protecting assets of the enterprise and procedure information identifying actions to be performed by personnel to protect the assets of the enterprise;
at least one device comprising at least one processor, wherein the at least one device is configured to:
monitor enterprise activity associated with a plurality of devices associated with the enterprise in accordance with the security policies and procedures stored in the memory,
determine, based on the monitored enterprise activity, whether the enterprise is complying with the security policies and procedures stored in the memory,
calculate a risk exposure metric for a plurality of the assets of the enterprise based on the monitored enterprise activity and whether the enterprise is complying with the stored security policies and procedures,
output, to a display, information identifying the risk exposure metric associated with at least some of the plurality of the assets, and
generate a plan identifying actions to be taken by the enterprise to reduce the risk exposure metric associated with at least some of the plurality of the assets.