Search

Roger Studner Phones & Addresses

  • Vienna, VA
  • 20052 Great Falls Forest Dr, Great Falls, VA 22066 (571) 323-2850
  • 20052 Great Falls Forest Dr #D, Great Falls, VA 22066 (571) 323-2850
  • Cayucos, CA
  • Morro Bay, CA
  • San Luis Obispo, CA
  • Herndon, VA
  • Fairfax, CA

Publications

Us Patents

Systems And Methods For Intelligent Cyber Security Threat Detection And Intelligent Verification-Informed Handling Of Cyber Security Events Through Automated Verification Workflows

View page
US Patent:
20220292189, Sep 15, 2022
Filed:
Feb 15, 2022
Appl. No.:
17/671881
Inventors:
- Herndon VA, US
Jonathan Hencinski - Herndon VA, US
Dan Whalen - Herndon VA, US
Roger Studner - Herndon VA, US
International Classification:
G06F 21/55
Abstract:
A system and method for automated verification of a cybersecurity event includes identifying a cybersecurity event of a subscriber; automatically constructing a response-enabled verification communication based on one or more features of the cybersecurity event satisfying verification-initiating criteria of an automated verification-initiation workflow, and transmitting the response-enabled verification communication to the subscriber associated with the cybersecurity event, wherein the response-enabled verification communication includes: one or more pieces of event-descriptive content; a first selectable interface object that, when selected by the subscriber, automatically increases a threat severity level of the cybersecurity event; and a second selectable interface object that, when selected by the subscriber, automatically de-escalates the threat severity level of the cybersecurity event causing a disposal of the cybersecurity event; and automatically routing the cybersecurity event to one of a cybersecurity threat escalation route and a cybersecurity threat de-escalation route based on subscriber input.

Systems And Methods For Cyber Security Threat Detection And Expedited Generation Of Investigation Storyboards Using Intelligent Cyber Security Automations

View page
US Patent:
20220269780, Aug 25, 2022
Filed:
Feb 2, 2022
Appl. No.:
17/591185
Inventors:
- Herndon VA, US
Emily Garton - Frederick MD, US
Jasper Tom - Arlington VA, US
Pat Conley - Rochester NY, US
David Spigarelli - Reston VA, US
Roger Studner - Herndon VA, US
International Classification:
G06F 21/55
Abstract:
A system and method for generating a digital cybersecurity artifact includes selectively executing an automated cybersecurity investigation workflow based on a probable cybersecurity threat type of a cybersecurity event, wherein an output of the automated cybersecurity investigation workflow includes one or more corpora of investigation findings data in response to executing the automated cybersecurity investigation workflow; selectively instantiating a digital cybersecurity artifact of a plurality of digital cybersecurity artifacts based on the probable cybersecurity threat type of the cybersecurity event, wherein the digital cybersecurity artifact includes a plurality of distinct regions electronically mapped to one or more threat type-specific content automations that, when executed, install investigation findings data into the plurality of distinct regions of the plurality of distinct regions of the digital cybersecurity artifact with selective subsets of investigation findings data of the one or more corpora of investigation findings data.

Systems And Methods For Intelligent Cyber Security Threat Detection And Intelligent Verification-Informed Handling Of Cyber Security Events Through Automated Verification Workflows

View page
US Patent:
20230108834, Apr 6, 2023
Filed:
Dec 2, 2022
Appl. No.:
18/074186
Inventors:
- Herndon VA, US
Jonathan Hencinski - Herndon VA, US
Dan Whalen - Herndon VA, US
Roger Studner - Herndon VA, US
International Classification:
G06F 21/55
Abstract:
A system and method for automated verification of a cybersecurity event includes identifying a cybersecurity event of a subscriber; automatically constructing a response-enabled verification communication based on one or more features of the cybersecurity event satisfying verification-initiating criteria of an automated verification-initiation workflow, and transmitting the response-enabled verification communication to the subscriber associated with the cybersecurity event, wherein the response-enabled verification communication includes: one or more pieces of event-descriptive content; a first selectable interface object that, when selected by the subscriber, automatically increases a threat severity level of the cybersecurity event; and a second selectable interface object that, when selected by the subscriber, automatically de-escalates the threat severity level of the cybersecurity event causing a disposal of the cybersecurity event; and automatically routing the cybersecurity event to one of a cybersecurity threat escalation route and a cybersecurity threat de-escalation route based on subscriber input.
Roger Alan Studner from Vienna, VA, age ~50 Get Report