1
Norman Sadeh Koniecpol, Paul Hankes Drielsma, Lorrie Faith Candor, Patrick Kelley: User-controllable learning of policies. Carnegie Mellon University, Wombat Security Technology, K&L Gates, April 16, 2013: US08423483 (28 worldwide citation)

Various embodiments are directed to a computer implemented method for updating a policy that is enforced by a computer program. In one embodiment, a computer communicates, to a user, data regarding one or more decisions made by the program over a period of time according to a policy. Each decision i ...


2
Norman Sadeh Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong: Method and system for controlling context-aware cybersecurity training. Wombat Security Technologies, Fox Rothschild, June 21, 2016: US09373267 (20 worldwide citation)

A context-aware training system senses a user action that may expose the user to a threat, such as a cybersecurity threat. The system selects a training action from a collection of available training actions and causes the training action to be delivered to the user or a group of users. The system i ...


3
Norman Sadeh Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong: Context-aware training systems, apparatuses, and methods. Wombat Security Technologies, Fox Rothschild, March 8, 2016: US09280911 (14 worldwide citation)

A context-aware training system senses sensing a user action that may expose the user's computer to a cybersecurity threat. The system selects training action from a collection of available training actions and causes the training action to be selected to the user.


4
Norman Sadeh Koniecpol, Kurt Wescoe, Joseph A Ferrara: Cybersecurity training system with automated application of branded content. Wombat Security Technologies, Fox Rothschild, July 19, 2016: US09398029 (8 worldwide citation)

A cybersecurity training system uses lures and training actions to help train a user of an electronic device to recognize and act appropriately in situations that could compromise security. The system includes an administrator interface by which an administrator may customize a lure and/or a trainin ...


5
Norman Sadeh Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong: Context-aware training systems, apparatuses, and methods. WOMBAT SECURITY TECHNOLOGIES, Fox Rothschild, January 17, 2017: US09547998 (4 worldwide citation)

Context-aware training systems, apparatuses and systems. The context-aware training systems, apparatuses and systems are computer-implemented and include sensing a user action and, based on a training needs model, estimating a cost or benefit to exposing the user to a training action, selecting a tr ...


6
Norman Sadeh Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong: Context-aware cybersecurity training systems, apparatuses, and methods. WOMBAT SECURITY TECHNOLOGIES, Fox Rothschild, January 16, 2018: US09870715 (3 worldwide citation)

A system assesses the susceptibility of an electronic device user to a cybersecurity threat by sensing a user action with respect to the electronic device. The system maps the sensed data to a training needs model to determine whether the sensed data corresponds to a pattern associated with a threat ...


7
Norman Sadeh Koniecpol, Kurt Wescoe, Joseph A Ferrara: Cybersecurity training system with automated application of branded content. WOMBAT SECURITY TECHNOLOGIES, Fox Rothschild, November 7, 2017: US09813454 (1 worldwide citation)

A cybersecurity training system uses lures and training actions to help train a user of an electronic device to recognize and act appropriately in situations that could compromise electronic device security. The system includes a library of cybersecurity training actions and a library of brand items ...


8
Norman Sadeh Koniecpol, Kurt Wescoe, Jason Brubaker, Jason Hong: Mock attack cybersecurity training system and methods. WOMBAT SECURITY TECHNOLOGIES, Fox Rothschild, January 31, 2017: US09558677 (1 worldwide citation)

A training system senses a user action that may expose the user to a threat, such as a cybersecurity threat. The user action may be in response to a mock attack delivered via a messaging service, a wireless communication service, a fake malware application or another device, service, system or mecha ...


9
Alan Himler, John T Campbell, Joseph A Ferrara, Trevor T Hawthorn, Norman Sadeh Koniecpol, Kurt Wescoe: Method and system for assessing and classifying reported potentially malicious messages in a cybersecurity system. WOMBAT SECURITY TECHNOLOGIES, Fox Rothschild, September 26, 2017: US09774626 (1 worldwide citation)

In a cybersecurity network, a system identifies and classifies non-malicious messages by receiving a user notification indicating that the user has reported a received message as potentially malicious message, and determining whether the received message is legitimate or potentially malicious. When ...


10
Alan Himler, John T Campbell, Joseph A Ferrara, Trevor T Hawthorn, Norman Sadeh Koniecpol, Kurt Wescoe: Method and system for reducing reporting of non-malicious electronic messages in a cybersecurity system. WOMBAT SECURITY TECHNOLOGIES, Fox Rothschild, October 3, 2017: US09781149 (1 worldwide citation)

An electronic message analysis system of a cybersecurity network assesses whether a received message is a mock malicious message in response to, receiving a user activation action that indicates that the user has reported the received message as a potentially malicious message. The system does this ...