US 12,299,619 B2
Adaptive enterprise risk evaluation
Mark Joseph Risoldi, Princeton, NJ (US); and Sethuraman Balasubramanian, Monmouth Junction, NJ (US)
Assigned to Merck Sharp & Dohme LLC, Rahway, NJ (US)
Filed by Merck Sharp & Dohme LLC, Rahway, NJ (US)
Filed on Jun. 5, 2020, as Appl. No. 16/894,627.
Application 16/894,627 is a continuation in part of application No. 16/688,732, filed on Nov. 19, 2019, granted, now 11,995,593.
Claims priority of provisional application 62/772,608, filed on Nov. 28, 2018.
Prior Publication US 2020/0311630 A1, Oct. 1, 2020
Int. Cl. G06Q 10/0635 (2023.01); G06F 3/0482 (2013.01); G06F 21/57 (2013.01); G06F 30/20 (2020.01); G06F 111/10 (2020.01); G06Q 10/0637 (2023.01); H04L 41/22 (2022.01)
CPC G06Q 10/0635 (2013.01) [G06F 3/0482 (2013.01); G06F 21/577 (2013.01); G06F 30/20 (2020.01); G06Q 10/06375 (2013.01); G06F 2111/10 (2020.01); G06F 2221/033 (2013.01); G06F 2221/034 (2013.01); H04L 41/22 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A method, comprising:
retrieving data corresponding to an asset, wherein the asset is a computing device or software application of an enterprise system;
identifying a set of vulnerabilities of the asset;
for each vulnerability in the set of vulnerabilities, determining whether a respective measure of effectiveness of a respective security control has breached a respective threshold measure of effectiveness of the respective security control;
for each vulnerability in a subset of the set of vulnerabilities, responsive to determining that the respective measure of effectiveness of the respective security control has breached the respective threshold measure of effectiveness of the respective security control, generating a targeted recommendation to implement a new security control on the asset for mitigating the vulnerability;
generating a user interface for the asset comprising a list including each targeted recommendation;
providing the user interface for display;
receiving user selection of a particular targeted recommendation in the list, the particular targeted recommendation mitigating a particular vulnerability of the subset of vulnerabilities; and
applying the security control identified by the particular targeted recommendation to the asset to mitigate the particular vulnerability.