Glendale, AZ, United States of America

Ken Dietrich

USPTO Granted Patents = 1 

Average Co-Inventor Count = 6.0

ph-index = 1

Forward Citations = 22(Granted Patents)


Company Filing History:


Years Active: 2018

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Ken Dietrich - Innovator in Cyber-Security Risk Analysis

Introduction

Ken Dietrich is a notable inventor based in Glendale, AZ (US). He has made significant contributions to the field of cyber-security, particularly in industrial control systems. His innovative approach to analyzing cyber-security risks has garnered attention in the tech community.

Latest Patents

Ken Dietrich holds a patent for a method of analyzing cyber-security risks in an industrial control environment. This patent, which is focused on industrial control systems (ICS) that include a plurality of networked devices, outlines a process that involves providing a processor and a memory that stores a cyber-security algorithm. The processor runs this algorithm to collect and compile security data, including vulnerability data related to cyber-risks. The method includes scanning the networked devices, processing the security data using a rules engine, ranking the risks, and displaying the logical groupings on a user station. Ken Dietrich has 1 patent to his name.

Career Highlights

Ken has had a successful career, working with Honeywell International Inc., a leading company in technology and manufacturing. His work focuses on enhancing the security of industrial control systems, which are critical for various industries.

Collaborations

Throughout his career, Ken has collaborated with talented professionals, including Seth G Carpenter and Eric T Boice. These collaborations have contributed to the development of innovative solutions in the field of cyber-security.

Conclusion

Ken Dietrich's contributions to cyber-security risk analysis demonstrate his commitment to improving the safety and reliability of industrial control systems. His innovative patent reflects the importance of addressing cyber-security challenges in today's interconnected world.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…