Patents Assigned to ISIGHT PARTNERS, INC.
  • Publication number: 20160241580
    Abstract: A security system comprising a computer, a memory, a data store comprising a cyber threat intent dictionary and a technology dictionary; and an application stored in the memory. When executed by the computer, the application generates a report that comprises an identification of a cyber threat intent and the identification of a cyber threat technology, wherein the cyber threat intent is selected from a plurality of cyber threat intents listed in the cyber threat intent dictionary and wherein the cyber threat technology is selected from the technology dictionary. The application also populates values in a cyber threat progression vector, where the cyber threat progression vector comprises elements that each corresponds to an action in a chain of actions associated with a cybercrime, where the values correspond to one of present or not present. The vector is used to manage the cyber risk of an enterprise or organization.
    Type: Application
    Filed: April 3, 2014
    Publication date: August 18, 2016
    Applicant: iSIGHT Partners, Inc.
    Inventors: John P. Watters, Frederick Doyle, Henry Peltokangas, Matthew Keane
  • Publication number: 20160241581
    Abstract: A security system comprising a computer, a memory, a data store comprising a plurality of consensus evaluations and a plurality of cyber threat analyst ratings, and an application stored in the memory. When executed by the computer, the application generates a cyber threat report that identifies of a cyber threat intent and a cyber threat technology, receives from a cyber threat analyst an input of a cyber threat frequency score, an input of a cyber threat likelihood score, and an input of a cyber threat capability score, and generates a cyber threat intensity based on the scores and based on a cyber threat analyst rating stored in the data store and associated with the cyber threat analyst inputting the scores, whereby the cyber threat report and the cyber threat intensity are used to select cyber risk mitigation actions to economically manage the cyber risk of an enterprise or organization.
    Type: Application
    Filed: April 3, 2014
    Publication date: August 18, 2016
    Applicant: iSIGHT Partners, Inc.
    Inventors: John P. Watters, Frederick Doyle, Henry Peltokangas, Matthew Keane
  • Patent number: 9015846
    Abstract: A security system is provided. The system comprises a computer system, a memory accessible to the computer system, a data store, and an application. The data store comprises a threat catalog, wherein the threat catalog comprises a plurality of threat vectors, each threat vector comprising a plurality of fields, wherein each field is constrained to carry a value selected from a predefined list of enumerated values. The application is stored in the memory and, when executed by the computer system receives a threat report, wherein the threat report comprises an identification of at least one threat vector, determines a correlation between the at least one threat vector received in the threat report with the threat vectors comprising the threat catalog, and, based on the correlation, sends a notification to a stakeholder in an organization under the protection of the security system.
    Type: Grant
    Filed: April 12, 2013
    Date of Patent: April 21, 2015
    Assignee: iSIGHT Partners, Inc.
    Inventors: John P. Watters, Matthew Keane
  • Patent number: 8813050
    Abstract: A system for electronic crime reduction is provided, comprising a computer system, a database, a malware de-compiler, a malware parser, and an inference engine. The database contains information that associates electronic crime attack signature data with at least one of an individual, a group, and a location. The malware de-compiler, when executed on the computer system, translates a first malware executable to an assembly language version. The first malware is associated with an electronic crime that has been committed. The malware parser, when executed on the computer system, analyzes the assembly language version to identify distinctive coding preferences used to develop the first malware. The inference engine, when executed on the computer system, analyzes the distinctive coding preferences identified by the malware parser application in combination with searching the database to identify one of an individual, a group, and a location associated with the electronic crime.
    Type: Grant
    Filed: June 3, 2008
    Date of Patent: August 19, 2014
    Assignee: Isight Partners, Inc.
    Inventors: John P. Watters, Jonathan M. Couch, Sam F. Stover, Michael J. Weinberger, Fredrick Doyle, Gregory MacManus
  • Publication number: 20130232577
    Abstract: A security system is provided. The system comprises a computer system, a memory accessible to the computer system, a data store, and an application. The data store comprises a threat catalog, wherein the threat catalog comprises a plurality of threat vectors, each threat vector comprising a plurality of fields, wherein each field is constrained to carry a value selected from a predefined list of enumerated values. The application is stored in the memory and, when executed by the computer system receives a threat report, wherein the threat report comprises an identification of at least one threat vector, determines a correlation between the at least one threat vector received in the threat report with the threat vectors comprising the threat catalog, and, based on the correlation, sends a notification to a stakeholder in an organization under the protection of the security system.
    Type: Application
    Filed: April 12, 2013
    Publication date: September 5, 2013
    Applicant: iSIGHT Partners, Inc.
    Inventors: John P. Watters, Matthew Keane
  • Patent number: 8494974
    Abstract: A method of selecting security actions is provided. The method comprises estimating a maximum forecast loss, identifying general, sector specific, and targeted threats. The method further comprises forecasting a security loss based on the estimated maximum forecast loss and the threats, estimating a reduction in the security loss based on a first investment on a general threat countermeasure, on a second investment on a sector specific countermeasure, and on a third investment on a targeted threat countermeasure. The method further comprises allocating at least a portion of a security investment budget among the first, the second, and the third investments to maximize the estimated reduction in security loss. An aspect disclosed comprises a method that determines rates of return on security investment and selects security investments based on the rates of return. An aspect disclosed comprises a system for forecasting a security loss based on a security investment.
    Type: Grant
    Filed: January 18, 2010
    Date of Patent: July 23, 2013
    Assignee: iSIGHT Partners Inc.
    Inventors: John P. Watters, Frederick Doyle
  • Patent number: 8438644
    Abstract: A security system is provided. The system comprises a computer system, a memory accessible to the computer system, a data store, and an application. The data store comprises a threat catalog, wherein the threat catalog comprises a plurality of threat vectors, each threat vector comprising a plurality of fields, wherein each field is constrained to carry a value selected from a predefined list of enumerated values. The application is stored in the memory and, when executed by the computer system receives a threat report, wherein the threat report comprises an identification of at least one threat vector, determines a correlation between the at least one threat vector received in the threat report with the threat vectors comprising the threat catalog, and, based on the correlation, sends a notification to a stakeholder in an organization under the protection of the security system.
    Type: Grant
    Filed: March 7, 2011
    Date of Patent: May 7, 2013
    Assignee: iSIGHT Partners, Inc.
    Inventors: John P. Watters, Matthew Keane
  • Publication number: 20120233698
    Abstract: A security system is provided. The system comprises a computer system, a memory accessible to the computer system, a data store, and an application. The data store comprises a threat catalog, wherein the threat catalog comprises a plurality of threat vectors, each threat vector comprising a plurality of fields, wherein each field is constrained to carry a value selected from a predefined list of enumerated values. The application is stored in the memory and, when executed by the computer system receives a threat report, wherein the threat report comprises an identification of at least one threat vector, determines a correlation between the at least one threat vector received in the threat report with the threat vectors comprising the threat catalog, and, based on the correlation, sends a notification to a stakeholder in an organization under the protection of the security system.
    Type: Application
    Filed: March 7, 2011
    Publication date: September 13, 2012
    Applicant: ISIGHT PARTNERS, INC.
    Inventors: John P. Watters, Matthew Keane
  • Publication number: 20110178942
    Abstract: A method of selecting security actions is provided. The method comprises estimating a maximum forecast loss, identifying general, sector specific, and targeted threats. The method further comprises forecasting a security loss based on the estimated maximum forecast loss and the threats, estimating a reduction in the security loss based on a first investment on a general threat countermeasure, on a second investment on a sector specific countermeasure, and on a third investment on a targeted threat countermeasure. The method further comprises allocating at least a portion of a security investment budget among the first, the second, and the third investments to maximize the estimated reduction in security loss. An aspect disclosed comprises a method that determines rates of return on security investment and selects security investments based on the rates of return. An aspect disclosed comprises a system for forecasting a security loss based on a security investment.
    Type: Application
    Filed: January 18, 2010
    Publication date: July 21, 2011
    Applicant: iSIGHT PARTNERS, INC.
    Inventors: John P. Watters, Frederick Doyle
  • Publication number: 20090300589
    Abstract: A system for electronic crime reduction is provided, comprising a computer system, a database, a malware de-compiler, a malware parser, and an inference engine. The database contains information that associates electronic crime attack signature data with at least one of an individual, a group, and a location. The malware de-compiler, when executed on the computer system, translates a first malware executable to an assembly language version. The first malware is associated with an electronic crime that has been committed. The malware parser, when executed on the computer system, analyzes the assembly language version to identify distinctive coding preferences used to develop the first malware. The inference engine, when executed on the computer system, analyzes the distinctive coding preferences identified by the malware parser application in combination with searching the database to identify one of an individual, a group, and a location associated with the electronic crime.
    Type: Application
    Filed: June 3, 2008
    Publication date: December 3, 2009
    Applicant: ISIGHT PARTNERS, INC.
    Inventors: John P. Watters, Jonathan M. Couch, Sam F. Stover, Michael J. Weinberger, Fredrick Doyle, Gregory MacManus