Patents by Inventor Adam PECKMAN
Adam PECKMAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230351456Abstract: In an illustrative embodiment, systems and methods for cyber vulnerability assessment include obtaining assessment data including information pertaining to domains of cyber security vulnerability of an enterprise and, for each security domain, a respective domain-level vulnerability score, identifying risk(s) relevant to the enterprise based on domain-level vulnerability score(s), identifying recommended products or services for mitigating each of the risks, and preparing a graphical user interface for selecting a portion of the recommended products or services. A user may select one or more products or services through the user interface for purchase and/or deployment planning. The domain-level vulnerability scores may be compared to peer vulnerabilities scores, target vulnerability scores, or prospective vulnerability scores based upon application of certain recommended products or services.Type: ApplicationFiled: December 21, 2022Publication date: November 2, 2023Applicant: Aon Risk Consultants, Inc.Inventors: Jason Hogg, Nicholas Dan, Jeffrey Bolas, Christopher Uriarte, Adam Peckman, Mani Dhesi, Cory Allen Moreira
-
Patent number: 11790090Abstract: In an illustrative embodiment, methods and systems for cybersecurity assessment of an organization's technology infrastructure include identifying features of the technology infrastructure and automatically generating a threat profile relevant to both the technology infrastructure and the organization's business (and/or business objectives), where the threat profile includes potential threat actors and threat scenarios applicable to the technology infrastructure. The methods and systems may include evaluating cybersecurity controls of the organization's technology infrastructure in light of the threat profile to identify and rate vulnerabilities within the technology infrastructure.Type: GrantFiled: March 19, 2021Date of Patent: October 17, 2023Assignee: Aon Global Operations SE Singapore BranchInventors: Anthony R. Belfiore, Jr., Mani Dhesi, Adam Peckman, Joseph Martinez
-
Patent number: 11568455Abstract: In an illustrative embodiment, systems and methods for cyber vulnerability assessment include obtaining assessment data including information pertaining to domains of cyber security vulnerability of an enterprise and, for each security domain, a respective domain-level vulnerability score, identifying risk(s) relevant to the enterprise based on domain-level vulnerability score(s), identifying recommended products or services for mitigating each of the risks, and preparing a graphical user interface for selecting a portion of the recommended products or services. A user may select one or more products or services through the user interface for purchase and/or deployment planning. The domain-level vulnerability scores may be compared to peer vulnerabilities scores, target vulnerability scores, or prospective vulnerability scores based upon application of certain recommended products or services.Type: GrantFiled: February 4, 2020Date of Patent: January 31, 2023Assignee: AON RISK CONSULTANTS, INC.Inventors: Jason Hogg, Nicholas Dan, Jeffrey Bolas, Christopher Uriarte, Adam Peckman, Mani Dhesi, Cory Allen Moreira
-
Publication number: 20220058272Abstract: In an illustrative embodiment, methods and systems for cybersecurity assessment of an organization's technology infrastructure include identifying features of the technology infrastructure and automatically generating a threat profile relevant to both the technology infrastructure and the organization's business (and/or business objectives), where the threat profile includes potential threat actors and threat scenarios applicable to the technology infrastructure. The methods and systems may include evaluating cybersecurity controls of the organization's technology infrastructure in light of the threat profile to identify and rate vulnerabilities within the technology infrastructure.Type: ApplicationFiled: March 19, 2021Publication date: February 24, 2022Applicant: AON GLOBAL OPERATIONS SE, SINGAPORE BRANCHInventors: Anthony R. BELFIORE, JR., Mani DHESI, Adam PECKMAN, Joseph MARTINEZ
-
Patent number: 10963572Abstract: In an illustrative embodiment, methods and systems for cybersecurity assessment of an organization's technology infrastructure include identifying features of the technology infrastructure and automatically generating a threat profile relevant to both the technology infrastructure and the organization's business (and/or business objectives), where the threat profile includes potential threat actors and threat scenarios applicable to the technology infrastructure. The methods and systems may include evaluating cybersecurity controls of the organization's technology infrastructure in light of the threat profile to identify and rate vulnerabilities within the technology infrastructure.Type: GrantFiled: August 13, 2019Date of Patent: March 30, 2021Assignee: Aon Global Operations SE Singapore BranchInventors: Anthony R. Belfiore, Jr., Mani Dhesi, Adam Peckman, Joseph Martinez
-
Publication number: 20210004878Abstract: In an illustrative embodiment, systems and methods for cyber vulnerability assessment include obtaining assessment data including information pertaining to domains of cyber security vulnerability of an enterprise and, for each security domain, a respective domain-level vulnerability score, identifying risk(s) relevant to the enterprise based on domain-level vulnerability score(s), identifying recommended products or services for mitigating each of the risks, and preparing a graphical user interface for selecting a portion of the recommended products or services. A user may select one or more products or services through the user interface for purchase and/or deployment planning. The domain-level vulnerability scores may be compared to peer vulnerabilities scores, target vulnerability scores, or prospective vulnerability scores based upon application of certain recommended products or services.Type: ApplicationFiled: February 4, 2020Publication date: January 7, 2021Applicant: Aon Risk Consultants, Inc.Inventors: Jason Hogg, Nicholas Dan, Jeffrey Bolas, Christopher Uriarte, Adam Peckman, Mani Dhesi, Cory Allen Moreira
-
Patent number: 10592938Abstract: In an illustrative embodiment, systems and methods for cyber vulnerability assessment include obtaining assessment data including information pertaining to domains of cyber security vulnerability of an enterprise and, for each security domain, a respective domain-level vulnerability score, identifying risk(s) relevant to the enterprise based on domain-level vulnerability score(s), identifying recommended products or services for mitigating each of the risks, and preparing a graphical user interface for selecting a portion of the recommended products or services. A user may select one or more products or services through the user interface for purchase and/or deployment planning. The domain-level vulnerability scores may be compared to peer vulnerabilities scores, target vulnerability scores, or prospective vulnerability scores based upon application of certain recommended products or services.Type: GrantFiled: January 31, 2019Date of Patent: March 17, 2020Assignee: Aon Risk Consultants, Inc.Inventors: Jason Hogg, Nicholas Dan, Jeffrey Bolas, Christopher Uriarte, Adam Peckman, Mani Dhesi, Cory Allen Moreira
-
Publication number: 20200042716Abstract: In an illustrative embodiment, methods and systems for cybersecurity assessment of an organization's technology infrastructure include identifying features of the technology infrastructure and automatically generating a threat profile relevant to both the technology infrastructure and the organization's business (and/or business objectives), where the threat profile includes potential threat actors and threat scenarios applicable to the technology infrastructure. The methods and systems may include evaluating cybersecurity controls of the organization's technology infrastructure in light of the threat profile to identify and rate vulnerabilities within the technology infrastructure.Type: ApplicationFiled: August 13, 2019Publication date: February 6, 2020Applicant: Aon Global Operations Ltd (Singapore Branch)Inventors: Anthony R. BELFIORE, JR., Mani DHESI, Adam PECKMAN, Joseph MARTINEZ
-
Patent number: 10387657Abstract: In an illustrative embodiment, methods and systems for cybersecurity assessment of an organization's technology infrastructure include identifying features of the technology infrastructure and automatically generating a threat profile relevant to both the technology infrastructure and the organization's business (and/or business objectives), where the threat profile includes potential threat actors and threat scenarios applicable to the technology infrastructure. The methods and systems may include evaluating cybersecurity controls of the organization's technology infrastructure in light of the threat profile to identify and rate vulnerabilities within the technology infrastructure.Type: GrantFiled: November 22, 2017Date of Patent: August 20, 2019Assignee: Aon Global Operations Ltd (Singapore Branch)Inventors: Anthony R. Belfiore, Jr., Mani Dhesi, Adam Peckman, Joseph Martinez
-
Publication number: 20190236661Abstract: In an illustrative embodiment, systems and methods for cyber vulnerability assessment include obtaining assessment data including information pertaining to domains of cyber security vulnerability of an enterprise and, for each security domain, a respective domain-level vulnerability score, identifying risk(s) relevant to the enterprise based on domain-level vulnerability score(s), identifying recommended products or services for mitigating each of the risks, and preparing a graphical user interface for selecting a portion of the recommended products or services. A user may select one or more products or services through the user interface for purchase and/or deployment planning. The domain-level vulnerability scores may be compared to peer vulnerabilities scores, target vulnerability scores, or prospective vulnerability scores based upon application of certain recommended products or services.Type: ApplicationFiled: January 31, 2019Publication date: August 1, 2019Inventors: Jason Hogg, Nicholas Dan, Jeffrey Bolas, Christopher Uriarte, Adam Peckman, Mani Dhesi, Cory Allen Moreira
-
Publication number: 20180146004Abstract: In an illustrative embodiment, methods and systems for cybersecurity assessment of an organization's technology infrastructure include identifying features of the technology infrastructure and automatically generating a threat profile relevant to both the technology infrastructure and the organization's business (and/or business objectives), where the threat profile includes potential threat actors and threat scenarios applicable to the technology infrastructure. The methods and systems may include evaluating cybersecurity controls of the organization's technology infrastructure in light of the threat profile to identify and rate vulnerabilities within the technology infrastructure.Type: ApplicationFiled: November 22, 2017Publication date: May 24, 2018Inventors: Anthony R. BELFIORE, JR., Mani DHESI, Adam PECKMAN, Joseph MARTINEZ