| CPC H04L 63/1433 (2013.01) [G06F 21/577 (2013.01); H04L 41/0853 (2013.01); H04L 41/0866 (2013.01); H04L 41/12 (2013.01); H04L 43/0876 (2013.01); H04L 45/02 (2013.01); H04L 63/0236 (2013.01); H04L 63/10 (2013.01); H04L 63/101 (2013.01); H04L 63/102 (2013.01); H04L 63/1416 (2013.01); H04L 63/1466 (2013.01); H04W 12/08 (2013.01); H04W 84/005 (2013.01); H04L 2012/5609 (2013.01); H04L 2012/5623 (2013.01); H04L 43/12 (2013.01)] | 18 Claims |

|
1. A computerized method comprising:
by a system of one or more computer systems,
accessing a network risk map being applied to a network, the network risk map defining a plurality of compromise values and a plurality of compromise vulnerabilities which are associated with user accounts or network devices, wherein a compromise value indicates an importance an attacker would place on compromising a network device and/or user account, and wherein a compromise vulnerability indicates a likelihood of compromise of the user account and/or network device; and
identifying an external event associated with an effect on the network, wherein the compromise values and/or compromise vulnerabilities are modified based on the external event, and wherein modifying compromise vulnerabilities associated with user accounts compromises identifying that the external event affects particular network devices utilized by a subset of the user accounts and increasing compromise vulnerabilities associated with the subset; and
providing, for presentation via an interactive user interface, information describing the external event.
|