St. Clair Hospital Pittsburgh, PA Sep 2013 to Dec 2013 Food Service AssistantAllstate Melbourne, FL Apr 2011 to Feb 2012 Inside Casualty Represented AdjusterState Compensation Insurance Fund Glendale, CA Feb 2003 to Dec 2010 Workers' Compensation Claims AdjusterL.A. Firemen's Credit Union Pasadena, CA 2001 to 2002 Real Estate Loans AssistantHealth & Rehab of North Seattle, Solid Ground Seattle, WA Volunteer Work
Education:
University of California at Irvine Irvine, CA 2001 Bachelor of Arts in Psychology
Skills:
Customer service, Negotiating settlements, Administrative: type 64 w.p.m., front desk reception, multi-line phones, letters, filing, data entry, Microsoft Office (Word/Excel/PowerPoint/Outlook... Excellent oral and written communication, Comfortable speaking in front of groups, doing presentations, Experience with medical reports and terminology
2011 to 2000 Service Advisor/Shop CoordinatorMidas Auto Service Experts St. Louis, MO 2002 to 2011 Service ManagerAdvance Auto Parts St. Louis, MO 2000 to 2002 Assistant Auto Parts Pro
- Santa Clara CA, US Lisa Sherilyn Henderson - Temecula CA, US
International Classification:
H04L 29/06 G06F 16/2455 G06F 16/22
Abstract:
A modified configuration management database (CMDB) system is disclosed in which detected configuration item (CI) vulnerabilities are stored as less-resource-intensive detection objects, rather than as more-resource-intensive vulnerable item (VI) objects. The system includes a vulnerability response (VR) server that enables promotion rules to be created and periodically applied to the stored detections. When the conditions of a detection promotion rule are satisfied by information relating to a stored detection, a new VI may be created and related to the stored detection within the CMDB. The disclosed promotion rules can be configured to ensure that VIs are only automatically created for high-risk or relevant detections, substantially reducing the number of VIs to be created, stored, and managed. As such, the disclosed system substantially reduces resource consumption and improves the efficiency and operation of the CMDB.
Network Security Through Linking Vulnerability Management And Change Management
- Santa Clara CA, US Lisa Sherilyn Henderson - Temecula CA, US Antonio Challita - Carlsbad CA, US Betsy Cherian - Poway CA, US John Anthony Rissone - San Diego CA, US Hnin Haymar - San Diego CA, US James Gavin Erbes - San Jose CA, US
International Classification:
H04L 29/06 H04L 12/24 G06F 8/65
Abstract:
A computational instance may contain a plurality of vulnerable items and a plurality of change requests, wherein at least some of the vulnerable items are assigned to a vulnerability group, the vulnerable items represent hardware or software components that exhibit known vulnerabilities, and the change requests represent additions, removals, or modifications of the hardware or software components. The computational instance may further include one or more computing devices configured to: generate a representation of a first graphical user interface containing data related to the vulnerability group, generate a representation of a second graphical user interface that allows specification of change request options, generate a representation of a third graphical user interface with data entry fields for a corresponding change request that are auto-populated based on the data related to the vulnerability group, and add a corresponding change request to the plurality of change requests.
Dynamic Preview Of Security Vulnerability Levels In A Managed Network
- Santa Clara CA, US Lisa Sherilyn Henderson - San Diego CA, US
International Classification:
H04L 29/06 G06F 17/24
Abstract:
A system may include a server device configured to: receive selected factors and respective weights for each of the selected factors; obtain combinations of selected primary factors that total less than a maximum number of rows; determine a duplication count for the combinations of selected primary factors; and generate, for display on a graphical user interface, data representing a table, where each column of the table represents one of the selected factors, where for columns of the table representing selected primary factors, rows represent each of the combinations of selected primary factors duplicated according to the duplication count, where for columns of the table representing selected secondary factors from the selected factors, rows represent repeated iteration through possible values of the selected secondary factors, and where each row includes a respective risk score based on a weighted average of the respective weights applied to the selected factors represented therein.
Method And Apparatus For Reducing Security Risk In A Networked Computer System Architecture
- Santa Clara CA, US Lisa Henderson - Temecula CA, US Jose Bernal - San Diego CA, US Bryan Boyle - San Diego CA, US
International Classification:
H04L 29/06 G06F 21/57
Abstract:
An apparatus and associated method are provided for reducing a security risk in a networked computer system architecture. The method comprises receiving at a security computer external vulnerability data from an external source regarding vulnerabilities associated with an attack vector for configuration item (CI) data related to a (CI) device, of the networked computer system. The security computer accesses a configuration management database (CMDB) and the CI data related to the physical device is read. Trust zone data associated with the CI device is determined utilizing the CMDB, and the security computer performs a vulnerability calculation for the CI device utilizing the external vulnerability data and associated trust zone data. This is also done for a second CI device. The vulnerability calculations for both are compared and this comparison serves as a basis for prioritizing an action to be taken on the CI device or associated other network components.
Apparatus And Method Providing Flexible Hierarchies In Database Applications
- Santa Clara CA, US Lisa Henderson - Temecula CA, US
International Classification:
G06F 16/28 G06F 16/21 G06F 16/25
Abstract:
A computer-driven system manages databases of flexible storage hierarchy. Computer servers include machine-readable storage containing at least one database, the database comprising multiple data records represented by multiple nodes. Each node has a node type and represents records of a corresponding record type. The nodes are embodied by machine-readable data stored in one or more tables. Multiple client-originated direct links are embodied by data stored in the one or more tables, where each one of the direct links directly connecting a different pair of the nodes. Multiple system-originated calculated links are embodied by data stored in the one or more tables. Each calculated link acts in observance with a rules framework to connect pairs of the nodes that would otherwise be connected only indirectly through one or more intermediate nodes and direct links between said intermediate nodes.
Method And Apparatus For Reducing Security Risk In A Networked Computer System Architecture
- Santa Clara CA, US Lisa Henderson - Temecula CA, US Jose Bernal - San Diego CA, US Bryan Boyle - San Diego CA, US
International Classification:
H04L 29/06
Abstract:
An apparatus and associated method are provided for reducing a security risk in a networked computer system architecture. The method comprises receiving at a security computer external vulnerability data from an external source regarding vulnerabilities associated with an attack vector for configuration item (CI) data related to a (CI) device, of the networked computer system. The security computer accesses a configuration management database (CMDB) and the CI data related to the physical device is read. Trust zone data associated with the CI device is determined utilizing the CMDB, and the security computer performs a vulnerability calculation for the CI device utilizing the external vulnerability data and associated trust zone data. This is also done for a second CI device. The vulnerability calculations for both are compared and this comparison serves as a basis for prioritizing an action to be taken on the CI device or associated other network components.
The College of Saint Rose - Childhood Education, Marist College - PR/Organizational Comm
Relationship:
Engaged
About:
If you think it's me, you're probably right. :)
Bragging Rights:
Currently (barely) surviving grad school.
Lisa Henderson
Work:
Quinton Henderson - Son (2007) Aventix Animal Health - Pharma Rep (2012) Scottsdale Veterinary Hospital - Registered Animal Health Technician (2013)
Lisa Henderson
Work:
The Watershed Addiction Treatment Programs, Inc. - Social Media Specialist (10) The Palm Beach Post Newspaper - Major/National Advertising Account Executive (7-7) The Palm Beach Post Newspaper - Retail Advertising Account Executive (3-7)
Tagline:
"Far and away the best prize that life offers is the chance to work hard at work worth doing."- Theodore Roosevelt
Lisa Henderson
Work:
Realty by Design - Broker and Owner
Education:
New York Univeristy
About:
I’m so glad you’re here. I’m Lisa Henderson and I started the company in the Spring of 2011 for three reasons: As a way of lowering the cost of selling a home for full service home sellers.To take th...
Tagline:
Helping Homeowners Save on Real Estate Commissions
Lisa Henderson
Work:
Del. Co. DPW - Asst. to Commissioner (1995)
Education:
SUNY Cortland - Recreation & Leisure Services
Relationship:
Married
Lisa Henderson
Education:
Reed College - Literature-Theatre (Shakespeare), Fox Sr. High School
Tagline:
I am Lisa, sometimes called the Great. I like people. :3
Myra Linn Elementary School Riverside CA 1974-1979, Wells Intermediate School Riverside CA 1979-1982, Buena Vista Continuation High School Chino CA 1982-1984
Community:
Terry Thompson, Tony Misko, Bob Whitmore, Elaine Maynard, Constance Koch
Kelly Herring, Charlotte Johnson, Jerry Gomez, Darrell Conway, Charlsa Bickel, Linda Brown, Kandy Williams, Lynn Creek, Vicki Johnson, Trish Sensabaugh, Rick Rose
There is a ton of disinformation on the web and social media that is likely shading attitudes about vaccines, said Lisa Henderson, vice president of health initiatives with the Greater Dayton Area Hospital Association.
Lisa Henderson, 36, updated her blog on November 24 witha post titled "Why My Husband and I Cancelled Christmas." She explains that their three boys had been misbehaving quite a bit, and she and her husband decided that there would be consequences.
It's not like her children suffer from a lack of toys, Lisa Henderson wrote. The family will still decorate and celebrate Christmas as the birth of Christ, and the children will still get presents from other family.