Search

Michael Roytman

from Wheeling, IL

Also known as:
  • Mikhail Roytman

Michael Roytman Phones & Addresses

  • Wheeling, IL
  • Hawthorn Woods, IL
  • Dayton, OH
  • Glenview, IL
  • Palatine, IL
  • Buffalo Grove, IL

Us Patents

  • Distinguished Name Scoping System For Event Filtering

    view source
  • US Patent:
    6484200, Nov 19, 2002
  • Filed:
    Jun 11, 1999
  • Appl. No.:
    09/330790
  • Inventors:
    Rajeev Angal - Santa Clara CA
    Shivaram Bhat - Sunnyvale CA
    Michael Roytman - Glenview IL
    Subodh Bapat - Palo Alto CA
  • Assignee:
    Sun Microsystems, Inc. - Santa Clara CA
  • International Classification:
    H04L 1226
  • US Classification:
    709224, 709218, 370352
  • Abstract:
    Method and system for allowing a computer network operations manager to subscribe for and receive notifications concerning network events from one or more objects or object levels, as defined by distinguished name scoping, and optionally having at least one event characteristic from a selected list. The selected list of characteristics may include: one or more levels of network objects involved in the event; one or more specified network nodes involved in the event; a specified geographical region in which said event occurs; a specified period of days within which the event occurs or is initiated; a specified time interval within which the event occurs or is initiated; a specified class of devices involved in the event; and an event of one or more specified event types.
  • Alarm Manager System For Distributed Network Management System

    view source
  • US Patent:
    20020012011, Jan 31, 2002
  • Filed:
    Dec 4, 1998
  • Appl. No.:
    09/205911
  • Inventors:
    MICHAEL ROYTMAN - GLENVIEW IL, US
    PLAMEN PETROV - BARRINGTON IL, US
  • International Classification:
    G09G005/00
  • US Classification:
    345/736000, 345/784000, 709/224000
  • Abstract:
    The alarm manager display in a distributed network management system is arranged to have two modes of operation. In one mode of operation, the alarm manager display automatically scrolls when new events arrive. If there are sorting criteria defined, the alarm manager window scrolls either up or down depending on the sort order so that when new events arrive, they always appear on the screen. In the second mode of operation, the alarm manager window does not scroll when new events arrive. The scroll bar operational modes are selectable by an operator from a menu. In accordance with another embodiment, a special attribute is added to the alarm manager configuration file. This attribute is read when the alarm manager is started and places the alarm manager into the operational mode in which it was last used.
  • Exploit Prediction Based On Machine Learning

    view source
  • US Patent:
    20220207152, Jun 30, 2022
  • Filed:
    Mar 14, 2022
  • Appl. No.:
    17/693502
  • Inventors:
    - Chicago IL, US
    Michael Roytman - Chicago IL, US
    Jeffrey Heuer - New York NY, US
  • International Classification:
    G06F 21/57
    G06N 20/00
  • Abstract:
    Generation of one or more models is caused based on selecting training data comprising a plurality of features including a prevalence feature for each vulnerability of a first plurality of vulnerabilities. The one or more models enable predicting whether an exploit will be developed for a vulnerability and/or whether the exploit will be used in an attack. The one or more models are applied to input data comprising the prevalence feature for each vulnerability of a second plurality of vulnerabilities. Based on the application of the one or more models to the input data, output data is received. The output data indicates a prediction of whether an exploit will be developed for each vulnerability of the second plurality. Additionally or alternatively, the output data indicates, for each vulnerability of the second plurality, a prediction of whether an exploit that has yet to be developed will be used in an attack.
  • Exploit Prediction Based On Machine Learning

    view source
  • US Patent:
    20200401704, Dec 24, 2020
  • Filed:
    Aug 31, 2020
  • Appl. No.:
    17/008515
  • Inventors:
    - Chicago IL, US
    Michael Roytman - Chicago IL, US
    Jeffrey Heuer - New York NY, US
  • International Classification:
    G06F 21/57
    G06N 20/00
  • Abstract:
    Generation of one or more models is caused based on selecting training data comprising a plurality of features including a prevalence feature for each vulnerability of a first plurality of vulnerabilities. The one or more models enable predicting whether an exploit will be developed for a vulnerability and/or whether the exploit will be used in an attack. The one or more models are applied to input data comprising the prevalence feature for each vulnerability of a second plurality of vulnerabilities. Based on the application of the one or more models to the input data, output data is received. The output data indicates a prediction of whether an exploit will be developed for each vulnerability of the second plurality. Additionally or alternatively, the output data indicates, for each vulnerability of the second plurality, a prediction of whether an exploit that has yet to be developed will be used in an attack.
  • Vulnerability Assessment Based On Machine Inference

    view source
  • US Patent:
    20200110885, Apr 9, 2020
  • Filed:
    Dec 9, 2019
  • Appl. No.:
    16/708292
  • Inventors:
    - Chicago IL, US
    Michael Roytman - Chicago IL, US
    David Bortz - Highland Park IL, US
    Jared Davis - Chicago IL, US
  • International Classification:
    G06F 21/57
    G06N 20/00
    G06F 16/9032
    G06F 16/903
  • Abstract:
    Techniques related to vulnerability assessment based on machine inference are disclosed. A vulnerability assessment server may receive, from a client device, a set of metadata corresponding to a program stored on the client device. Further, the vulnerability assessment server may extract a program name from the set of metadata. Still further, the vulnerability assessment server may determine one or more vulnerabilities of the program based on searching for the program name in one or more storage systems that maintain sets of vulnerability data.
  • Exploit Prediction Based On Machine Learning

    view source
  • US Patent:
    20190163917, May 30, 2019
  • Filed:
    Oct 12, 2018
  • Appl. No.:
    16/158873
  • Inventors:
    - Chicago IL, US
    Michael Roytman - Chicago IL, US
    Jeffrey Heuer - New York NY, US
  • International Classification:
    G06F 21/57
    G06F 15/18
  • Abstract:
    Generation of one or more models is caused based on selecting training data comprising a plurality of features including a prevalence feature for each vulnerability of a first plurality of vulnerabilities. The one or more models enable predicting whether an exploit will be developed for a vulnerability and/or whether the exploit will be used in an attack. The one or more models are applied to input data comprising the prevalence feature for each vulnerability of a second plurality of vulnerabilities. Based on the application of the one or more models to the input data, output data is received. The output data indicates a prediction of whether an exploit will be developed for each vulnerability of the second plurality. Additionally or alternatively, the output data indicates, for each vulnerability of the second plurality, a prediction of whether an exploit that has yet to be developed will be used in an attack.
  • Facilitating Field Data Collection Using Hierarchical Surveys

    view source
  • US Patent:
    20170123643, May 4, 2017
  • Filed:
    Dec 17, 2015
  • Appl. No.:
    14/973279
  • Inventors:
    - Chicago IL, US
    Michael ROYTMAN - Chicago IL, US
    Jennifer Paige GRIFFIN - Chicago IL, US
  • International Classification:
    G06F 3/0484
    H04L 29/08
    G06F 17/30
    G06F 9/44
    G06F 17/24
  • Abstract:
    The technology presented here enables low skilled administrators to design a hierarchical survey, low skilled field agents to collect answers to the hierarchical survey, and low skilled field managers to manage and monitor the progress of the field agents. The hierarchical surveys designed can be complex hierarchical surveys comprising multi-stage sampling units. The graphical user interfaces presented to the users are easy to use, and hide the complexity of the hierarchical survey. The user devices can communicate with each other to transmit the hierarchical surveys and the answers received to the hierarchical surveys using peer-to-peer networks, in environments where there is low, or no Internet connectivity.

Resumes

Michael Roytman Photo 1

Data Scientist At Risk I/O

view source
Position:
Data Scientist at Risk I/O, Founder and COO at TruckSpotting, Inc.
Location:
Greater Chicago Area
Industry:
Information Services
Work:
Risk I/O - Chicago, IL since Dec 2012
Data Scientist

TruckSpotting, Inc. - Atlanta, GA since Sep 2011
Founder and COO

Enova Financial - Chicago, IL Sep 2012 - Dec 2012
Fraud Analytics Associate

Georgia Institute of Technology, Intel Corporation - Atlanta, GA Aug 2011 - Aug 2012
Research Assistant

Crowe Horwath LLP Jun 2010 - Aug 2011
Manufacturing Consultant
Education:
Georgia Institute of Technology 2011 - 2012
Master of Science (M.S.), Operations Research
University of Illinois at Urbana-Champaign 2007 - 2010
Bachelor of Science (B.S.), Industrial Engineering
Glenbrook North High School 2003 - 2007
Honor & Awards:
3rd Place, Chicago Startup Weekend Hackathon - WhereFi, 2012 President's Fellowship for Graduate Study, 2011-2012 Champion, National Coaches' Debate Association Tournament, 2007 Champion, Illinois State Debate Tournament, 2007
Languages:
English
Russian
French
Michael Roytman Photo 2

Enterprise Architect

view source
Location:
3 Hawthorn Grv Cir, Hawthorn Woods, IL
Industry:
Information Technology And Services
Work:
Blue Cross Blue Shield Association
Enterprise Architect

United Airlines Jan 2002 - Feb 2005
Senior Software Engineer

Novarra 2000 - 2001
Senior Software Engineer

Sun Microsystems Oct 1997 - Oct 2000
Senior Software Engineer

Motorola 1995 - 1997
Software Engineer
Education:
Lake Forest Graduate School of Management 2006 - 2009
Master of Business Administration, Masters, Management, Healthcare
Illinois Institute of Technology 1997 - 1999
Master of Science, Masters, Computer Science
University of Illinois at Chicago 1992 - 1993
Bachelors, Bachelor of Science, Mathematics, Computer Science
Tashkent State University 1988 - 1992
Bachelors, Bachelor of Science, Applied Mathematics
Skills:
Enterprise Architecture
Sdlc
Enterprise Software
Soa
It Strategy
Agile Methodologies
Integration
Solution Architecture
Business Analysis
Software Project Management
Scrum
Requirements Analysis
Software Development
Sql
Data Modeling
Data Warehousing
Business Intelligence
Visio
Vendor Management
Db2
Agile Project Management
Web Services
Databases
Web Applications
Architecture
Unix
Database Design
Pmo
Requirements Gathering
Microsoft Sql Server
Systems Analysis
Oracle
Disaster Recovery
Xml
Java Enterprise Edition
Sharepoint
Application Architecture
Soap
It Management
Software Design
Java
Software Engineering
Tomcat
Esb
Software Documentation
Mobile Technology
Consumer Healthcare
Social Media
Ios Development
Android Development
Interests:
Groupon
Chicago Bears
Yahoo
Motorola
Electro Music
Personal Networking
Finance
Chicago Blackhawks
Techno Music
Manchester United
Mashable
Chicago Bulls
Seinfeld (Tv Series)
Applied Mathematics
Premier League
Computer Science
United Airlines
Chicago
Directv
Languages:
Russian
Michael Roytman Photo 3

Michael Roytman

view source
Name / Title
Company / Classification
Phones & Addresses
Michael Roytman
Housing Manager
Housing Authority of Cook County
175 W Jackson Blvd #350, Chicago, IL 60631
(773)3998900

Myspace

Michael Roytman Photo 4

Michael Roytman

view source
Locality:
WARMINSTER, PENNSYLVANIA
Gender:
Male
Birthday:
1940

Flickr

Facebook

Michael Roytman Photo 7

Michael Roytman

view source
Michael Roytman Photo 8

Michael Roytman

view source
Michael Roytman Photo 9

Michael Roytman

view source
Michael Roytman Photo 10

Michael Roytman

view source
Michael Roytman Photo 11

Michael Roytman

view source
Michael Roytman Photo 12

Michael Roytman

view source
Michael Roytman Photo 13

Michael Roytman

view source

Plaxo

Michael Roytman Photo 14

Michael Roytman

view source
Pennsylvania, USACEO and cheif architect at 21st Century Business S... Past: VP and Chief Technology Officer at Vivat

Classmates

Michael Roytman Photo 15

Michael Roytman | Neshami...

view source

Googleplus

Michael Roytman Photo 16

Michael Roytman

Work:
Risk I/O - Data Scientist (2013)
Education:
Georgia Institute of Technology - M.S. Operations Research, University of Illinois at Urbana-Champaign - B.S. Industrial Engineering
Michael Roytman Photo 17

Michael Roytman

Education:
Ort Guttman
Relationship:
Single
Michael Roytman Photo 18

Michael Roytman

Michael Roytman Photo 19

Michael Roytman

Michael Roytman Photo 20

Michael Roytman

Michael Roytman Photo 21

Michael Roytman

Youtube

Predicting vulnerability exploitation using E...

Kenna Security's Chief Data Scientist talks about the need for a syste...

  • Duration:
    32s

Michael Roytman Talks Data Science at Infosec...

Kenna Security's Chief Data Scientist, Michael Roytman talks about the...

  • Duration:
    5m 25s

Inverting the Vulnerability Management Pyrami...

"Inverting the Vulnerability Management Pyramid" presented by Michael ...

  • Duration:
    18m 45s

Michael Roytman | Who Watches the Watchers Me...

Michael Roytman | Who Watches the Watchers Metrics for Security Strate...

  • Duration:
    45m 47s

Understanding How Data Science Applies to Inf...

Michael takes us through some of the common AI and ML methods of data ...

  • Duration:
    1h 52s

gt00 the power law of information michael roy...

These are the videos from BSidesLV (Las Vegas) 2014:...

  • Duration:
    45m 1s

Get Report for Michael Roytman from Wheeling, IL
Control profile