DATA PROCESSING SYSTEMS FOR MEASURING PRIVACY MATURITY WITHIN AN ORGANIZATION

    公开(公告)号:US20190220623A1

    公开(公告)日:2019-07-18

    申请号:US16363454

    申请日:2019-03-25

    申请人: OneTrust, LLC

    摘要: A privacy compliance measurement system, according to particular embodiments, is configured to determine compliance with one or more privacy compliance requirements by an organization or sub-group of the organization. In various embodiments, the system is configured to determine a privacy maturity rating for each of a plurality of sub-groups within an organization. In some embodiments, the privacy maturity rating is based at least in part on: (1) a frequency of risks or issues identified with Privacy Impact Assessments (PIAs) performed or completed by the one or sub-groups; (2) a relative training level of members of the sub-groups with regard to privacy related matters; (3) a breadth and amount of personal data collected by the sub-groups; and/or (4) etc. In various embodiments, the system is configured to automatically modify one or more privacy campaigns based on the determined privacy maturity ratings.

    RESOURCE REALLOCATION BASED ON EXPECTED REWARDS

    公开(公告)号:US20190205534A1

    公开(公告)日:2019-07-04

    申请号:US15860278

    申请日:2018-01-02

    IPC分类号: G06F21/55 G06F9/50 G06F21/57

    摘要: Methods and systems for determining a reallocation of resources are described. A device may determine initial allocation data that indicates a first amount of resources allocated to a plurality of areas. The device may determine a set of attacker expected rewards based on the initial allocation data. The device may determine a set of defender expected rewards based on the attacker expected rewards. The device may determine moving rewards indicating defensive scores in response to movement of the resources among the plurality of areas. The device may determine defender response rewards indicating defensive scores resulting from an optimal attack on the plurality of areas. The device may generate reallocation data indicating an allocation of a second amount of resources to the plurality of areas. The second amount of resources may maximize the moving rewards and the defender response rewards.

    AUTOMATIC TRANSFORMATION OF SECURITY EVENT DETECTION RULES

    公开(公告)号:US20190065755A1

    公开(公告)日:2019-02-28

    申请号:US15692429

    申请日:2017-08-31

    IPC分类号: G06F21/57 G06F21/10

    摘要: A computer-implemented method, a computer program product, and a computer system for transformation of security information and event management (SIEM) rules and deploying the SIEM rules in a network of event processors. A computer system or server converts the SIEM rules to formal representations. The computer system or server generates rule abstraction of the formal representations, by using an abstraction function. The computer system or server constructs a finite automaton based on the rule abstraction. The computer system or server eliminates irrelevant transitions in the finite automaton to generate an optimized finite automaton. The computer system or server generates optimized formal rules, based on the optimized finite automaton. The computer system or server converts the optimized formal rules to optimized SIEM rules. The computer or server deploys the optimized SIEM rules in the network of the event processors.