Patents by Inventor Clifford Charles Wright
Clifford Charles Wright has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12212581Abstract: A system, method, and computer-readable medium for performing a security operation.Type: GrantFiled: January 29, 2024Date of Patent: January 28, 2025Assignee: Forcepoint LLCInventors: Nicolas Christian Fischbach, Raffael Marty, Margaret Cunningham, Clifford Charles Wright
-
Publication number: 20240171590Abstract: A system, method, and computer-readable medium for performing a security operation.Type: ApplicationFiled: January 29, 2024Publication date: May 23, 2024Inventors: Nicolas Christian Fischbach, Raffael Marty, Margaret Cunningham, Clifford Charles Wright
-
Patent number: 11888860Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity, the security related activity being based upon the observable from the electronic data source; the security related activity comprising a concerning behavior, the security related activity being enacted during an activity session; associating the security related activity enacted during an activity session with a security risk persona; analyzing the security related activity, the analyzing the security related activity using the security risk persona; and, performing a security operation in response to the analyzing the security related activity.Type: GrantFiled: December 11, 2020Date of Patent: January 30, 2024Assignee: Forcepoint LLCInventors: Margaret Cunningham, Clifford Charles Wright
-
Patent number: 11888861Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; identifying a security related activity of the entity, the security related activity being of analytic utility; accessing an entity behavior catalog based upon the security related activity, the entity behavior catalog providing an inventory of entity behaviors; and performing a security operation via a human-centric risk modeling framework, the security operation using entity behavior catalog data stored within the entity behavior catalog based upon the security related activity.Type: GrantFiled: December 11, 2020Date of Patent: January 30, 2024Assignee: Forcepoint LLCInventors: Nicolas Christian Fischbach, Raffael Marty, Margaret Cunningham, Clifford Charles Wright
-
Patent number: 11888859Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing an electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity, the security related activity being based upon the observable from the electronic data source; analyzing the security related activity, the analyzing the security related activity using a security risk persona; associating the security risk persona with a phase of a cyber kill chain; and, performing a security operation on the security related activity via a security system, the security operation disrupting performance of the phase of the cyber kill chain.Type: GrantFiled: December 11, 2020Date of Patent: January 30, 2024Assignee: Forcepoint LLCInventors: Margaret Cunningham, Clifford Charles Wright
-
Patent number: 11843613Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity, the security related activity being based upon the observable from the electronic data source, the security related activity comprising a concerning behavior; generating a contextual modifier relating to the security related activity; analyzing the security related activity, the analyzing the security related activity being based upon the contextual modifier; and, performing a security operation in response to the analyzing the security related activity.Type: GrantFiled: December 11, 2020Date of Patent: December 12, 2023Assignee: Forcepoint LLCInventors: Margaret Cunningham, Clifford Charles Wright
-
Patent number: 11838298Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing an electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity, the security related activity being based upon the observable from the electronic data source; analyzing the security related activity, the analyzing the security related activity using a security risk persona; and, performing a security operation in response to the analyzing the security related activity.Type: GrantFiled: December 11, 2020Date of Patent: December 5, 2023Assignee: Forcepoint LLCInventors: Margaret Cunningham, Clifford Charles Wright
-
Patent number: 11570197Abstract: A system, method, and computer-readable medium are disclosed for performing a security risk modeling operation. The security risk modeling operation includes: monitoring an entity, the monitoring observing an electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity, the security related activity being based upon the observable from the electronic data source; analyzing the security related activity, the analyzing the security related activity using a human-centric risk modeling framework; and, performing a security operation in response to the analyzing the security related activity.Type: GrantFiled: April 30, 2020Date of Patent: January 31, 2023Assignee: Forcepoint LLCInventors: Margaret Cunningham, Clifford Charles Wright, Dalwinderjeet Kular Grewal
-
Patent number: 11489862Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity of the entity, the security related activity being based upon the observable derived from the electronic data source, the security related activity being of analytic utility; associating the security related activity with a phase of a cyber kill chain; and, performing a security operation on the security related activity via a security system, the security operation disrupting performance of the phase of the cyber kill chain.Type: GrantFiled: April 30, 2020Date of Patent: November 1, 2022Assignee: Forcepoint LLCInventors: Margaret Cunningham, Clifford Charles Wright
-
Patent number: 11314871Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity of the entity, the security related activity being based upon the observable derived from the electronic data source, the security related activity being of analytic utility; associating the security related activity with a component of a cyber kill chain; and, performing a security operation on the security related activity via a security system, the security operation disrupting performance of the component of the cyber kill chain by affecting performance of the security related activity by the entity.Type: GrantFiled: February 14, 2020Date of Patent: April 26, 2022Assignee: Forcepoint, LLCInventors: Alan Ross, Raffael Marty, Margaret Cunningham, Clifford Charles Wright
-
Patent number: 11223646Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity, the security related activity being based upon the observable from the electronic data source, the security related activity comprising a concerning behavior, the concerning behavior comprising a security related activity of analytic utility; analyzing the security related activity, the analyzing the security related activity being based upon the concerning behavior; and, performing a security operation in response to the analyzing the security related activity.Type: GrantFiled: April 30, 2020Date of Patent: January 11, 2022Assignee: Forcepoint, LLCInventors: Margaret Cunningham, Clifford Charles Wright
-
Publication number: 20220006818Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing an electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity, the security related activity being based upon the observable from the electronic data source; analyzing the security related activity, the analyzing the security related activity using a security risk persona; associating the security risk persona with a phase of a cyber kill chain; and, performing a security operation on the security related activity via a security system, the security operation disrupting performance of the phase of the cyber kill chain.Type: ApplicationFiled: December 11, 2020Publication date: January 6, 2022Inventors: Margaret Cunningham, Clifford Charles Wright
-
Publication number: 20210226983Abstract: A system, method, and computer-readable medium are disclosed for performing a security risk modeling operation. The security risk modeling operation includes: monitoring an entity, the monitoring observing an electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity, the security related activity being based upon the observable from the electronic data source; analyzing the security related activity, the analyzing the security related activity using a human-centric risk modeling framework; and, performing a security operation in response to the analyzing the security related activity.Type: ApplicationFiled: April 30, 2020Publication date: July 22, 2021Inventors: Margaret Cunningham, Clifford Charles Wright, Dalwinderjeet Kular Grewal
-
Publication number: 20210224385Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity of the entity, the security related activity being based upon the observable derived from the electronic data source, the security related activity being of analytic utility; associating the security related activity with a component of a cyber kill chain; and, performing a security operation on the security related activity via a security system, the security operation disrupting performance of the component of the cyber kill chain by affecting performance of the security related activity by the entity.Type: ApplicationFiled: February 14, 2020Publication date: July 22, 2021Inventors: Alan Ross, Raffael Marty, Margaret Cunningham, Clifford Charles Wright
-
Publication number: 20210226971Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity of the entity, the security related activity being based upon the observable derived from the electronic data source, the security related activity being of analytic utility; associating the security related activity with a phase of a cyber kill chain; and, performing a security operation on the security related activity via a security system, the security operation disrupting performance of the phase of the cyber kill chain.Type: ApplicationFiled: April 30, 2020Publication date: July 22, 2021Inventors: Margaret Cunningham, Clifford Charles Wright
-
Publication number: 20210224396Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity, the security related activity being based upon the observable from the electronic data source, the security related activity comprising a concerning behavior, the concerning behavior comprising a security related activity of analytic utility; analyzing the security related activity, the analyzing the security related activity being based upon the concerning behavior; and, performing a security operation in response to the analyzing the security related activity.Type: ApplicationFiled: April 30, 2020Publication date: July 22, 2021Inventors: Margaret Cunningham, Clifford Charles Wright
-
Publication number: 20210144153Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing an electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity, the security related activity being based upon the observable from the electronic data source; analyzing the security related activity, the analyzing the security related activity using a security risk persona; and, performing a security operation in response to the analyzing the security related activity.Type: ApplicationFiled: December 11, 2020Publication date: May 13, 2021Inventors: Margaret Cunningham, Clifford Charles Wright
-
Publication number: 20210120011Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; identifying a security related activity of the entity, the security related activity being of analytic utility; accessing an entity behavior catalog based upon the security related activity, the entity behavior catalog providing an inventory of entity behaviors; and performing a security operation via a human-centric risk modeling framework, the security operation using entity behavior catalog data stored within the entity behavior catalog based upon the security related activity.Type: ApplicationFiled: December 11, 2020Publication date: April 22, 2021Inventors: Nicolas Christian Fischbach, Raffael Marty, Margaret Cunningham, Clifford Charles Wright
-
Publication number: 20210112074Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity, the security related activity being based upon the observable from the electronic data source, the security related activity comprising a concerning behavior; generating a contextual modifier relating to the security related activity; analyzing the security related activity, the analyzing the security related activity being based upon the contextual modifier; and, performing a security operation in response to the analyzing the security related activity.Type: ApplicationFiled: December 11, 2020Publication date: April 15, 2021Inventors: Margaret Cunningham, Clifford Charles Wright
-
Publication number: 20210112075Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity, the security related activity being based upon the observable from the electronic data source; the security related activity comprising a concerning behavior, the security related activity being enacted during an activity session; associating the security related activity enacted during an activity session with a security risk persona; analyzing the security related activity, the analyzing the security related activity using the security risk persona; and, performing a security operation in response to the analyzing the security related activity.Type: ApplicationFiled: December 11, 2020Publication date: April 15, 2021Inventors: Margaret Cunningham, Clifford Charles Wright