US 11,948,115 B2
Systems and methods for monitoring information security effectiveness
Kelly Thomas White, Park City, UT (US); Michael Vance Fowkes, Salt Lake City, UT (US); Jesse Duane Card, American Fork, UT (US); and Andrew James Menzel, Tallahassee, FL (US)
Assigned to RiskRecon Inc., Purchase, NY (US)
Filed by RiskRecon Inc., Purchase, NY (US)
Filed on Feb. 11, 2022, as Appl. No. 17/669,629.
Application 17/669,629 is a division of application No. 16/278,652, filed on Feb. 18, 2019, granted, now 11,282,017.
Application 16/278,652 is a continuation in part of application No. 15/207,395, filed on Jul. 11, 2016, abandoned.
Claims priority of provisional application 62/191,362, filed on Jul. 11, 2015.
Prior Publication US 2022/0164731 A1, May 26, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. G06Q 10/00 (2023.01); G06F 21/55 (2013.01); G06F 21/62 (2013.01); G06N 20/00 (2019.01); G06Q 10/0635 (2023.01); H04L 9/40 (2022.01)
CPC G06Q 10/0635 (2013.01) [G06F 21/552 (2013.01); G06F 21/6245 (2013.01); G06N 20/00 (2019.01); H04L 63/1433 (2013.01); H04L 63/205 (2013.01); G06F 2221/034 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for assessing information technology risk priorities for network computer systems/assets, the method comprising:
receiving, by an electronic processor, a network identifier associated with a network-accessible computer system/asset of an organization;
accessing, via a network, a set of network-accessible computer systems/assets, including the network-accessible computer system/asset and a plurality of related network-accessible computer systems/assets;
determining indicia of content features/characteristics for each of a subset of the set of the network-accessible computer systems/assets;
determining indicia of security features/characteristics of each of the subset of the set of the network-accessible computer systems/assets;
determining network proximity between respective network-accessible computer systems/assets;
assigning a value at risk for each of the subset of the network-accessible computer systems/assets based on a combination of the indicia of content features/characteristics, the indicia of security features/characteristics, and the network proximity between network-accessible computer systems/assets, wherein the value at risk represents a measure of relative organizational risk exposure or loss potential in an event of compromise of a respective network-accessible computer system/asset; and
automatically prioritizing allocation of security controls/measures among the subset of the network-accessible computer systems/assets based on respective assigned values at risk.