CPC G06Q 10/0635 (2013.01) [G06F 15/76 (2013.01); G06F 21/552 (2013.01); G06F 21/577 (2013.01); G06F 21/6245 (2013.01); G06Q 10/067 (2013.01); G06F 16/95 (2019.01)] | 20 Claims |
1. A method comprising:
identifying, by computing hardware, a potential risk trigger for an entity, wherein the potential risk trigger involves introducing at least one of a new risk or a change in a level of risk that the entity is exposed to in handling a certain type of data;
assessing, by the computing hardware, risk remediation data for a similarly situated entity to the entity, wherein the risk remediation data comprises:
a previous risk trigger experienced by the similarly situated entity that introduced at least one of a new risk or a change in a level of risk that the similarly situated entity was exposed to in handling at least one of the certain type of data or a similar type of data; and
a relevance of a risk posed by the previous risk trigger;
identifying, by the computing hardware and based on assessing the risk remediation data, that the previous risk trigger is similar to the potential risk trigger;
responsive to identifying that the previous risk trigger is similar to the potential risk trigger, identifying, by the computing hardware and based on the relevance of the risk posed by the previous risk trigger, a relevance of the risk posed by the potential risk trigger to the entity;
scanning, by the computing hardware, a data model, wherein the data model comprises an inventory for each of a plurality of data assets, and each respective inventory comprises a plurality of inventory attributes;
identifying, by the computing hardware and based on the plurality of inventory attributes for the respective inventory, the potential risk trigger has an effect on a particular data asset of the plurality of data assets in handling the certain type of data;
determining, by the computing hardware and based on the relevance of the risk posed by the potential risk trigger to the entity, to take an action to remediate the effect the potential risk trigger has on the particular data asset in handling the certain type of data; and
causing, by the computing hardware, the action to be performed to remediate the effect the potential risk trigger has on the particular data asset in handling the certain type of data.
|