US 12,355,805 B2
Generating trend data for a cybersecurity risk score
Philip Kibler, Whiteland, IN (US); Daniel Wilson, Firestone, CO (US); Martin Overton, West Sussex (GB); Tracie Grella, Maplewood, NJ (US); and Garin Pace, Darien, CT (US)
Assigned to AMERICAN INTERNATIONAL GROUP, INC., New York, NY (US)
Filed by American International Group, Inc., New York, NY (US)
Filed on Nov. 16, 2023, as Appl. No. 18/511,648.
Application 18/511,648 is a continuation of application No. 18/098,809, filed on Jan. 19, 2023, granted, now 11,909,757.
Application 18/098,809 is a continuation of application No. 17/127,347, filed on Dec. 18, 2020, granted, now 11,611,578, issued on Mar. 21, 2023.
Application 17/127,347 is a continuation of application No. 16/058,726, filed on Aug. 8, 2018, granted, now 10,904,282, issued on Jan. 26, 2021.
Claims priority of provisional application 62/542,655, filed on Aug. 8, 2017.
Prior Publication US 2024/0098110 A1, Mar. 21, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 29/00 (2006.01); G06F 11/30 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/1433 (2013.01) [G06F 11/301 (2013.01); H04L 63/20 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
receiving, by one or more processors, first data corresponding to first operational characteristics of a computer network at a first time;
determining, by the one or more processors using a risk model, a first value of a first cybersecurity risk parameter based on the first data of the computer network, wherein the first value is indicative of a cybersecurity risk level of the computer network;
receiving, by the one or more processors, second data corresponding to second operational characteristics of the computer network at a second time;
determining, by the one or more processors using the risk model, a second value of a second cybersecurity risk parameter based on the second data of the computer network, wherein the second value is indicative of the cybersecurity risk level of the computer network,
wherein one or more application program interfaces (APIs) over the computer network translate the first input data and the second input data into the risk model;
generating, by the one or more processors, risk score trend data of the computer network based upon the first value and the second value; and
monitoring, by the one or more processors, a data feed from the computer network for a threat alert of a cybersecurity threat, wherein the computer network implements a proactive measure configured to reduce the cybersecurity threat, in response to receiving the threat alert.