quantarcyber.com · web viewquantar’s preliminary infringement contentions
TRANSCRIPT
![Page 1: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/1.jpg)
EXHIBIT E
Quantar’s Preliminary Infringement Contentions
US Patent No: 9762605 15/012,182 Accused Instrumentalities
Claim: 1
1. Apparatus for assessing financial loss from cyber threats capable of affecting at least one computer network, the threat including at least one electronic threat, the computer network comprising a plurality of IT systems and a plurality of business processes operating on the plurality of IT systems, the apparatus comprising at least one processor configured pursuant to programming code in a non-transitory computer readable memory coupled to the processor, the non-transitory computer memory storing instructions executable by the processor that cause the processor to:
NEHEMIA 1 (at 0.48);
https://quantarsolutions.com/wp-content/uploads/2019/05/NEHEMIA-1.mp4
NEHEMIA 2;
Prioritize Cyber Risks in DollarsRQ is an automated cyber risk platform engineered to deliver financially-quantifiedintelligence and mitigation options specific to each business
Transfer Cyber Risks Intelligentlyweigh the costs of mitigating a risk,
Step 1: Model the Business-Tech EnvironmentRQ gathers business and IT data to establish a comprehensive understanding of a company’senvironment. This exercise uses a step-by-step wizard to establish ties between key businessprocesses, applications, and the underlying IT infrastructure
Step 2: Financially Quantify Cyber RiskRQ manages over 5,000 algorithms, each custom built using Nehemiah’s curated risk intel
Page 1 of 73
![Page 2: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/2.jpg)
database.After modeling the environment, RQ activates the appropriate calculations to measure Probability ofLoss and Computed Loss for a variety of loss types:1. Revenue loss2. Business disruption
Step 3: Drive Action to Mitigate Cyber RisksRQ generates a list of recommended controls and computes the ROI of these security investments.
NEHEMIA 3;
RQ Financially Quantify Cyber as a Business RiskA Risk Quantification PlatformRQ (Risk Quantifier) is a decision support platform that enables organizations to understand the financial exposure from a cyberattack and trace back to the area of impact. RQ combines your existing data with our database of attack and loss intelligence to compute the financial loss of a cyberattack and recommend mitigations that provide the best financial return.
To quantify cyber risks, RQ considers all dimensions: the Business, IT, and the Attacker
Where’s the impact?Trace where in the IT environment a risk can be realized. Detail the correlation between business assets and IT applications to support mitigation efforts
NEHEMIA 4;Nehemiah Security’s Risk Engine Quantifies Cyber Risk in Financial Terms
RQ 2.0, a cyber risk platform engineered to financially quantify security as a business risk
Page 2 of 73
![Page 3: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/3.jpg)
based onverifiable intelligence. Designed to correlate technical risks with an organization’s business assets, RQ’s Risk Engine aggregates data from business units, IT environments, and threat intelligence to identify the dollar amount that an organization’s unique risks pose to their business operations.
Nehemiah is the first to market with continuous, automated cyber risk quantification armed with risk mitigation and projected ROI computations to precisely answer questions like, “What is theseverity of these risks to the business?”
Nehemiah’s RQ platform allows technical leaders to quantitatively report on the business impact of cyber risk through the lens of their company’s unique business model. The risk engine establishes relationships between business applications and technical assets, then correlates technical exposures to threat intelligence feeds and known attacker scenarios.
RQ automatically computes security as a business risk in financial terms. The RQ dashboard updates to report on potential losses such as disruption,
NEHEMIA 6;
Page 3 of 73
![Page 4: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/4.jpg)
LossPRODUCT 2;
Page 4 of 73
![Page 5: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/5.jpg)
PRODUCT 3;
Page 5 of 73
![Page 6: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/6.jpg)
PRODUCT 4
Page 6 of 73
![Page 7: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/7.jpg)
FinancialPRODUCT 1;
Page 7 of 73
![Page 8: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/8.jpg)
PRODUCT 2;
Page 8 of 73
![Page 9: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/9.jpg)
PRODUCT 3;
Page 9 of 73
![Page 10: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/10.jpg)
PRODUCT 4
Page 10 of 73
![Page 11: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/11.jpg)
predict future cyber threat activity using a Monte Carlo method based on stochastic modeling of actual past observed computer network cyber threat activity, to receive observed cyber threat data from a database, the list of observed cyber threats including information, for each threat, of identification of at least one computer system targeted, to extrapolate future event frequency, to
NEHEMIA 1 (at 0.48);
https://quantarsolutions.com/wp-content/uploads/2019/05/NEHEMIA-1.mp4
NEHEMIA 1 (at 1.51);
https://quantarsolutions.com/wp-content/uploads/2019/05/NEHEMIA-1.mp4
Page 11 of 73
![Page 12: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/12.jpg)
produce a profile of predicted cyber threat activity, wherein for each actual observed cyber threat on the computer network, an identifier, a name, a description of the threat, a temporal profile specifying frequency of occurrence, a target (or targets) for the threat and a severity score for the (each target) are included in the cyber threat data within the database, output the predicted future threat activity to one or more firewalls to improve their accuracy in correctly identifying cyber threats actually observed on the one or more computer networks to improve the accuracy of the apparatus and stochastic modeling of assessing financial loss from cyber threats on an ongoing basis, determine expected downtime of each system of the plurality of IT systems in dependence upon said predicted threat activity including the severity scores and extrapolated future event frequency, determine loss for each of the plurality of business processes dependent on the downtimes of the IT systems, and add losses for the plurality of business processes so as to obtain a combined financial loss arising from the cyber threat activity.
NEHEMIA 2;
Prioritize Cyber Risks in DollarsRQ is an automated cyber risk platform engineered to deliver financially-quantifiedintelligence and mitigation options specific to each business
Transfer Cyber Risks Intelligentlyweigh the costs of mitigating a risk,
Step 1: Model the Business-Tech EnvironmentRQ gathers business and IT data to establish a comprehensive understanding of a company’senvironment. This exercise uses a step-by-step wizard to establish ties between key businessprocesses, applications, and the underlying IT infrastructure
Step 2: Financially Quantify Cyber RiskRQ manages over 5,000 algorithms, each custom built using Nehemiah’s curated risk intel database.After modeling the environment, RQ activates the appropriate calculations to measure Probability ofLoss and Computed Loss for a variety of loss types:1. Revenue loss2. Business disruption
Step 3: Drive Action to Mitigate Cyber RisksRQ generates a list of recommended controls and computes the ROI of these security investments.
NEHEMIA 3;
Page 12 of 73
![Page 13: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/13.jpg)
RQ Financially Quantify Cyber as a Business RiskA Risk Quantification PlatformRQ (Risk Quantifier) is a decision support platform that enables organizations to understand the financial exposure from a cyberattack and trace back to the area of impact. RQ combines your existing data with our database of attack and loss intelligence to compute the financial loss of a cyberattack and recommend mitigations that provide the best financial return.
To quantify cyber risks, RQ considers all dimensions: the Business, IT, and the Attacker
Where’s the impact?Trace where in the IT environment a risk can be realized. Detail the correlation between business assets and IT applications to support mitigation efforts
NEHEMIA 4;Nehemiah Security’s Risk Engine Quantifies Cyber Risk in Financial Terms
RQ 2.0, a cyber risk platform engineered to financially quantify security as a business risk based onverifiable intelligence. Designed to correlate technical risks with an organization’s business assets, RQ’s Risk Engine aggregates data from business units, IT environments, and threat intelligence to identify the dollar amount that an organization’s unique risks pose to their business operations.
Nehemiah is the first to market with continuous, automated cyber risk quantification armed with risk mitigation and projected ROI computations to precisely answer questions like, “What is theseverity of these risks to the business?”
Nehemiah’s RQ platform allows technical leaders to quantitatively report on the business impact of cyber risk through the lens of their company’s unique business model. The risk
Page 13 of 73
![Page 14: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/14.jpg)
engine establishes relationships between business applications and technical assets, then correlates technical exposures to threat intelligence feeds and known attacker scenarios.
RQ automatically computes security as a business risk in financial terms. The RQ dashboard updates to report on potential losses such as disruption,
NEHEMIA 6;
LossPRODUCT 2;
Page 14 of 73
![Page 15: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/15.jpg)
PRODUCT 3;
Page 15 of 73
![Page 16: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/16.jpg)
PRODUCT 4
Page 16 of 73
![Page 17: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/17.jpg)
;
FinancialPRODUCT 1;
Page 17 of 73
![Page 18: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/18.jpg)
PRODUCT 2;
Page 18 of 73
![Page 19: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/19.jpg)
PRODUCT 3;
Page 19 of 73
![Page 20: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/20.jpg)
PRODUCT 4
Page 20 of 73
![Page 21: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/21.jpg)
Receive (data)PRODUCT 1;
Page 21 of 73
![Page 22: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/22.jpg)
PredictedPRODUCT 2;
Page 22 of 73
![Page 23: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/23.jpg)
PRODUCT 3;
Page 23 of 73
![Page 24: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/24.jpg)
DependencePRODUCT 2;
Page 24 of 73
![Page 25: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/25.jpg)
SeverityPRODUCT 2;
Page 25 of 73
![Page 26: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/26.jpg)
ScorePRODUCT 2;
Page 26 of 73
![Page 27: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/27.jpg)
Claim: 11
11. A computer-implemented method, the method being performed by a computer system having one or more computer processors and a non-transitory computer readable memory in which programming code is stored, whereupon execution of the programming code by one or more computer processors the computer system performs
Page 27 of 73
![Page 28: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/28.jpg)
operations comprising:
predicting future cyber threat activity, for each of a plurality of computer network cyber threats, using a Monte Carlo method based on stochastic modeling of actual past observed computer network cyber threat activity, to receive observed cyber threat data from a database, the list of observed cyber threats including information, for each threat, of identification of at least one computer system targeted, to extrapolate future event frequency, to produce a profile of predicted cyber threat activity, wherein for each actual observed cyber threat on the computer network, an identifier, a name, a description of the threat, a temporal profile specifying frequency of occurrence, a target (or targets) for the threat and a severity score for the (each target) are included in the cyber threat data within the database, output the predicted future threat activity to one or more firewalls to improve their accuracy in correctly identifying cyber threats actually observed on the one or more computer networks to improve the accuracy of the apparatus and stochastic modeling of assessing financial loss from cyber threats on an ongoing basis, wherein for each given threat the method comprises;
NEHEMIA 1 (at 0.48);
https://quantarsolutions.com/wp-content/uploads/2019/05/NEHEMIA-1.mp4
NEHEMIA 1 (at 1.51);
https://quantarsolutions.com/wp-content/uploads/2019/05/NEHEMIA-1.mp4
NEHEMIA 2;
Prioritize Cyber Risks in DollarsRQ is an automated cyber risk platform engineered to deliver financially-quantifiedintelligence and mitigation options specific to each business
Transfer Cyber Risks Intelligentlyweigh the costs of mitigating a risk,
Step 1: Model the Business-Tech EnvironmentRQ gathers business and IT data to establish a comprehensive understanding of a company’senvironment. This exercise uses a step-by-step wizard to establish ties between key businessprocesses, applications, and the underlying IT infrastructure
Step 2: Financially Quantify Cyber RiskRQ manages over 5,000 algorithms, each custom built using Nehemiah’s curated risk intel database.
Page 28 of 73
![Page 29: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/29.jpg)
After modeling the environment, RQ activates the appropriate calculations to measure Probability ofLoss and Computed Loss for a variety of loss types:1. Revenue loss2. Business disruption
Step 3: Drive Action to Mitigate Cyber RisksRQ generates a list of recommended controls and computes the ROI of these security investments.
NEHEMIA 3;
RQ Financially Quantify Cyber as a Business RiskA Risk Quantification PlatformRQ (Risk Quantifier) is a decision support platform that enables organizations to understand the financial exposure from a cyberattack and trace back to the area of impact. RQ combines your existing data with our database of attack and loss intelligence to compute the financial loss of a cyberattack and recommend mitigations that provide the best financial return.
To quantify cyber risks, RQ considers all dimensions: the Business, IT, and the Attacker
Where’s the impact?Trace where in the IT environment a risk can be realized. Detail the correlation between business assets and IT applications to support mitigation efforts
NEHEMIA 4;Nehemiah Security’s Risk Engine Quantifies Cyber Risk in Financial Terms
RQ 2.0, a cyber risk platform engineered to financially quantify security as a business risk based on
Page 29 of 73
![Page 30: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/30.jpg)
verifiable intelligence. Designed to correlate technical risks with an organization’s business assets, RQ’s Risk Engine aggregates data from business units, IT environments, and threat intelligence to identify the dollar amount that an organization’s unique risks pose to their business operations.
Nehemiah is the first to market with continuous, automated cyber risk quantification armed with risk mitigation and projected ROI computations to precisely answer questions like, “What is theseverity of these risks to the business?”
Nehemiah’s RQ platform allows technical leaders to quantitatively report on the business impact of cyber risk through the lens of their company’s unique business model. The risk engine establishes relationships between business applications and technical assets, then correlates technical exposures to threat intelligence feeds and known attacker scenarios.
RQ automatically computes security as a business risk in financial terms. The RQ dashboard updates to report on potential losses such as disruption,
NEHEMIA 6;
Page 30 of 73
![Page 31: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/31.jpg)
;
LossPRODUCT 2;
Page 31 of 73
![Page 32: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/32.jpg)
PRODUCT 3;
Page 32 of 73
![Page 33: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/33.jpg)
PRODUCT 4
Page 33 of 73
![Page 34: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/34.jpg)
FinancialPRODUCT 1;
Page 34 of 73
![Page 35: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/35.jpg)
PRODUCT 2;
Page 35 of 73
![Page 36: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/36.jpg)
PRODUCT 3;
Page 36 of 73
![Page 37: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/37.jpg)
PRODUCT 4
Page 37 of 73
![Page 38: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/38.jpg)
Receive (data)PRODUCT 1;
Page 38 of 73
![Page 39: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/39.jpg)
PredictedPRODUCT 2;
Page 39 of 73
![Page 40: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/40.jpg)
PRODUCT 3;
Page 40 of 73
![Page 41: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/41.jpg)
SeverityPRODUCT 2;
Page 41 of 73
![Page 42: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/42.jpg)
ScorePRODUCT 2;
Page 42 of 73
![Page 43: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/43.jpg)
modeling a set of past observed computer network cyber threat events to obtain an estimate of at least one model parameter;
performing a Monte Carlo simulation of the given computer network cyber threat by:
predicting future computer network cyber threat events using the at least one model parameter and a
NEHEMIA 1 (at 0.48);
Page 43 of 73
![Page 44: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/44.jpg)
stochastic model using a projection of at least one model parameter which is based on the estimate of at least one model parameter and on a randomly-drawn variable according to a predefined distribution and to use said at least one variable in the stochastic model and predicting a distribution of future computer network cyber threat events by repeating the simulation using a plurality of variables, determining expected downtime of each IT system in dependence upon said predicted future computer network cyber threat activity, determining financial loss for each of a plurality of operational processes dependent on the downtimes of the IT systems adding losses for the plurality of processes to obtain a combined financial loss arising from the future computer network cyber threat activity.
https://quantarsolutions.com/wp-content/uploads/2019/05/NEHEMIA-1.mp4
NEHEMIA 2;
Prioritize Cyber Risks in DollarsRQ is an automated cyber risk platform engineered to deliver financially-quantifiedintelligence and mitigation options specific to each business
Transfer Cyber Risks Intelligentlyweigh the costs of mitigating a risk,
Step 1: Model the Business-Tech EnvironmentRQ gathers business and IT data to establish a comprehensive understanding of a company’senvironment. This exercise uses a step-by-step wizard to establish ties between key businessprocesses, applications, and the underlying IT infrastructure
Step 2: Financially Quantify Cyber RiskRQ manages over 5,000 algorithms, each custom built using Nehemiah’s curated risk intel database.After modeling the environment, RQ activates the appropriate calculations to measure Probability ofLoss and Computed Loss for a variety of loss types:1. Revenue loss2. Business disruption
Step 3: Drive Action to Mitigate Cyber RisksRQ generates a list of recommended controls and computes the ROI of these security investments.
Page 44 of 73
![Page 45: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/45.jpg)
NEHEMIA 3;
RQ Financially Quantify Cyber as a Business RiskA Risk Quantification PlatformRQ (Risk Quantifier) is a decision support platform that enables organizations to understand the financial exposure from a cyberattack and trace back to the area of impact. RQ combines your existing data with our database of attack and loss intelligence to compute the financial loss of a cyberattack and recommend mitigations that provide the best financial return.
To quantify cyber risks, RQ considers all dimensions: the Business, IT, and the Attacker
Where’s the impact?Trace where in the IT environment a risk can be realized. Detail the correlation between business assets and IT applications to support mitigation efforts
NEHEMIA 4;Nehemiah Security’s Risk Engine Quantifies Cyber Risk in Financial Terms
RQ 2.0, a cyber risk platform engineered to financially quantify security as a business risk based onverifiable intelligence. Designed to correlate technical risks with an organization’s business assets, RQ’s Risk Engine aggregates data from business units, IT environments, and threat intelligence to identify the dollar amount that an organization’s unique risks pose to their business operations.
Nehemiah is the first to market with continuous, automated cyber risk quantification armed with risk mitigation and projected ROI computations to precisely answer questions like, “What is theseverity of these risks to the business?”
Page 45 of 73
![Page 46: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/46.jpg)
Nehemiah’s RQ platform allows technical leaders to quantitatively report on the business impact of cyber risk through the lens of their company’s unique business model. The risk engine establishes relationships between business applications and technical assets, then correlates technical exposures to threat intelligence feeds and known attacker scenarios.
RQ automatically computes security as a business risk in financial terms. The RQ dashboard updates to report on potential losses such as disruption,
NEHEMIA 6;
LossPRODUCT 2;
Page 46 of 73
![Page 47: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/47.jpg)
PRODUCT 3;
Page 47 of 73
![Page 48: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/48.jpg)
PRODUCT 4
Page 48 of 73
![Page 49: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/49.jpg)
FinancialPRODUCT 1;
Page 49 of 73
![Page 50: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/50.jpg)
PRODUCT 2;
Page 50 of 73
![Page 51: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/51.jpg)
PRODUCT 3;
Page 51 of 73
![Page 52: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/52.jpg)
PRODUCT 4
Page 52 of 73
![Page 53: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/53.jpg)
PredictedPRODUCT 2;
Page 53 of 73
![Page 54: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/54.jpg)
PRODUCT 3;
Page 54 of 73
![Page 55: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/55.jpg)
DependencePRODUCT 2;
Page 55 of 73
![Page 56: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/56.jpg)
Claim: 13
13. A computer readable medium having a computer program thereon, which when executed by a computer system having one or more computer processors and a non-transitory computer readable memory, causes the computer system to perform steps comprising:
Page 56 of 73
![Page 57: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/57.jpg)
to predict, for each of a plurality of computer network cyber threats, future cyber threat activity using a Monte Carlo method based on stochastic modeling of actual past observed computer network cyber threat activity, to receive observed cyber threat data from a database, the list of observed cyber threats including information, for each threat, of identification of at least one computer system targeted, to extrapolate future event frequency, to produce a profile of predicted cyber threat activity, wherein for each actual observed cyber threat on the computer network, an identifier, a name, a description of the threat, a temporal profile specifying frequency of occurrence, a target (or targets) for the threat and a severity score for the (each target) are included in the cyber threat data within the database, output the predicted future threat activity to one or more firewalls to improve their accuracy in correctly identifying cyber threats actually observed on the one or more computer networks to improve the accuracy of the apparatus and stochastic modeling of assessing financial loss from cyber threats on an ongoing basis;
NEHEMIA 1 (at 0.48);
https://quantarsolutions.com/wp-content/uploads/2019/05/NEHEMIA-1.mp4
NEHEMIA 1 (at 1.51);
https://quantarsolutions.com/wp-content/uploads/2019/05/NEHEMIA-1.mp4
NEHEMIA 2;
Prioritize Cyber Risks in DollarsRQ is an automated cyber risk platform engineered to deliver financially-quantifiedintelligence and mitigation options specific to each business
Transfer Cyber Risks Intelligentlyweigh the costs of mitigating a risk,
Step 1: Model the Business-Tech EnvironmentRQ gathers business and IT data to establish a comprehensive understanding of a company’senvironment. This exercise uses a step-by-step wizard to establish ties between key businessprocesses, applications, and the underlying IT infrastructure
Step 2: Financially Quantify Cyber RiskRQ manages over 5,000 algorithms, each custom built using Nehemiah’s curated risk intel database.After modeling the environment, RQ activates the appropriate calculations to measure Probability ofLoss and Computed Loss for a variety of loss types:1. Revenue loss
Page 57 of 73
![Page 58: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/58.jpg)
2. Business disruption
Step 3: Drive Action to Mitigate Cyber RisksRQ generates a list of recommended controls and computes the ROI of these security investments.
NEHEMIA 3;
RQ Financially Quantify Cyber as a Business RiskA Risk Quantification PlatformRQ (Risk Quantifier) is a decision support platform that enables organizations to understand the financial exposure from a cyberattack and trace back to the area of impact. RQ combines your existing data with our database of attack and loss intelligence to compute the financial loss of a cyberattack and recommend mitigations that provide the best financial return.
To quantify cyber risks, RQ considers all dimensions: the Business, IT, and the Attacker
Where’s the impact?Trace where in the IT environment a risk can be realized. Detail the correlation between business assets and IT applications to support mitigation efforts
NEHEMIA 4;Nehemiah Security’s Risk Engine Quantifies Cyber Risk in Financial Terms
RQ 2.0, a cyber risk platform engineered to financially quantify security as a business risk based onverifiable intelligence. Designed to correlate technical risks with an organization’s business assets, RQ’s Risk Engine aggregates data from business units, IT environments, and threat intelligence to identify the dollar amount that an organization’s unique risks pose to their business operations.
Page 58 of 73
![Page 59: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/59.jpg)
Nehemiah is the first to market with continuous, automated cyber risk quantification armed with risk mitigation and projected ROI computations to precisely answer questions like, “What is theseverity of these risks to the business?”
Nehemiah’s RQ platform allows technical leaders to quantitatively report on the business impact of cyber risk through the lens of their company’s unique business model. The risk engine establishes relationships between business applications and technical assets, then correlates technical exposures to threat intelligence feeds and known attacker scenarios.
RQ automatically computes security as a business risk in financial terms. The RQ dashboard updates to report on potential losses such as disruption,
NEHEMIA 6;
Page 59 of 73
![Page 60: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/60.jpg)
LossPRODUCT 2;
Page 60 of 73
![Page 61: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/61.jpg)
PRODUCT 3;
Page 61 of 73
![Page 62: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/62.jpg)
PRODUCT 4
Page 62 of 73
![Page 63: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/63.jpg)
FinancialPRODUCT 1;
Page 63 of 73
![Page 64: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/64.jpg)
PRODUCT 2;
Page 64 of 73
![Page 65: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/65.jpg)
PRODUCT 3;
Page 65 of 73
![Page 66: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/66.jpg)
PRODUCT 4
Page 66 of 73
![Page 67: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/67.jpg)
Receive (data)PRODUCT 1;
Page 67 of 73
![Page 68: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/68.jpg)
PredictedPRODUCT 2;
Page 68 of 73
![Page 69: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/69.jpg)
PRODUCT 3;
Page 69 of 73
![Page 70: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/70.jpg)
SeverityPRODUCT 2;
Page 70 of 73
![Page 71: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/71.jpg)
wherein execution of the computer program causes the computer system to perform, for each given threat, steps further comprising:
modeling a set of past observed computer network cyber threat events to obtain an estimate of at least one model parameter;
performing a Monte Carlo simulation of the given computer network cyber threat by:
Page 71 of 73
![Page 72: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/72.jpg)
predicting future computer network cyber threat events using the at least one model parameter and a stochastic model using a projection of at least one model parameter which is based on the estimate of at least one model parameter and on a randomly-drawn variable according to a predefined distribution and to use said at least one variable in the stochastic model and predicting a distribution of future computer network cyber threat events by repeating the simulation using a plurality of variables.
PredictedPRODUCT 2;
PRODUCT 3;
Page 72 of 73
![Page 73: quantarcyber.com · Web viewQuantar’s Preliminary Infringement Contentions](https://reader035.vdocuments.mx/reader035/viewer/2022062606/5fe52787763ade259324aafa/html5/thumbnails/73.jpg)
Note: Total claims: 15 and Independent claims: 3
Page 73 of 73