| CPC H04L 63/1425 (2013.01) [H04L 43/045 (2013.01); H04L 43/08 (2013.01); H04L 63/1433 (2013.01); G06F 21/577 (2013.01)] | 12 Claims | 

| 
               1. A system for comprehensive data loss prevention and compliance management, comprising: 
            a computing system comprising a processor and a memory; 
                an observation and state estimation subsystem comprising a first plurality of programming instructions stored in the memory and operating on the processor, wherein the first plurality of programming instructions, when operating on the processor, cause the computing system to: 
                produce a cyber-physical graph representing a plurality of connected resources on a network, wherein: 
                the connected resources comprise one or more of people, devices, systems, and organizations within the network; 
                    the cyber-physical graph comprises nodes representing the connected resources, with each node having one or more properties associated with the connected resource represented by that node; 
                    the cyber-physical graph comprises edges representing logical or physical relationships between pairs of the connected resources; and 
                    the cyber-physical graph includes information about sensitive data stored on one or more of the connected resources; and 
                  an activity monitoring subsystem comprising a second plurality of programming instructions stored in the memory and operating on the processor, wherein the second plurality of programming instructions, when operating on the processor, cause the computing system to: 
                collect data from a plurality of sources within the network, wherein the plurality of sources includes one or more of: system endpoints, infrastructure servers, perimeter security devices, and network security monitoring tools; 
                  analyze the collected data to identify sensitive data stored on one or more of the connected resources; 
                  update the cyber-physical graph to include information about the identified sensitive data and its location; and 
                  generate expected behavior data of at least some of the plurality of connected resources on the network by applying a behavioral model to nodes of the cyber-physical graph; 
                  generate actual behavior data of at least some of the plurality of connected resources on the network from time-series data comprising a record of network events and the respective times at which each network event occurred; 
                  detect a deviation between the actual behavior data and the expected behavior data for a first node by comparing properties of the expected behavior data of the first node with properties of the actual behavior data of the first node; 
                  when a deviation is detected, transmit data relevant to the deviation to a risk analysis and scoring subsystem; and 
                the risk analysis and scoring subsystem comprising a third plurality of programming instructions stored in the memory and operating on the processor, wherein the third plurality of programming instructions, when operating on the processor, cause the computing system to: 
              receive data relevant to the deviation; 
                  analyze severity of a threat posed by the deviation using at least one analysis algorithm; and 
                  generate a risk score based on a plurality of factors that indicate the severity of the threat. 
                 |