Inventors:
Stephen DeAngelis - Washington Crossing PA, US
Frederick Stangl - Langhorne PA, US
International Classification:
G06F007/00
Abstract:
Methods for optimizing business processes, complying with governmental regulations, and identifying threat and vulnerability risks for an enterprise are disclosed. According to various embodiments, the method includes identifying at least one critical asset of the enterprise and identifying at least one business process of the enterprise associated with the identified critical asset. The method also includes identifying and evaluating at least one technological component of the enterprise associated with the enterprise's performance of the at least one business process and/or creating a threat profile for the business process. In addition, the method includes performing at least one of a risk analysis, a regulatory compliance analysis and a business process optimization analysis for the business process based on the evaluation of the at least one technological component and/or the threat profile. Additionally, the method may include at least one of developing a protection strategy, a compliance strategy and an optimization strategy for the enterprise based on the risk analysis, regulatory compliance analysis and process optimization analysis, respectively.