Cyber Risk Quantification

Type: Concept Confidence: 0.90 Sources: 5 Verified: 2026-02-28

Definition

Cyber risk quantification (CRQ) is the practice of expressing cybersecurity risk in financial terms — probability of loss events and their expected monetary impact — rather than qualitative labels. The dominant model is FAIR (Factor Analysis of Information Risk), created by Jack Jones in 2005 and adopted by The Open Group as the international standard. [src1] FAIR decomposes risk into Loss Event Frequency and Loss Magnitude, combined through Monte Carlo simulation to produce Loss Exceedance Curves. [src2]

Key Properties

Constraints

Framework Selection Decision Tree

START — User needs to assess cyber risk
├── What is the primary goal?
│   ├── Express risk in financial terms for board/CFO
│   │   └── ✅ FAIR / CRQ (this unit)
│   ├── Qualitative risk assessment (H/M/L)
│   │   └── → ERM Framework
│   ├── Compliance mapping (NIST CSF, ISO 27001)
│   │   └── → Cybersecurity compliance standards
│   ├── Business continuity for cyber incidents
│   │   └── → Business Continuity Planning
│   └── Cyber insurance purchase
│       └── ✅ FAIR + Loss Exceedance Curves (this unit)
├── Asset inventory and threat scenarios available?
│   ├── YES → Proceed with FAIR
│   └── NO → Build inventory first
└── Audience?
    ├── Board/CFO → Loss exceedance curves
    ├── CISO → Detailed scenario analysis
    └── Insurance broker → Aggregate loss distribution

Application Checklist

Step 1: Define risk scenarios

Step 2: Calibrate frequency and magnitude inputs

Step 3: Run Monte Carlo and generate LECs

Step 4: Inform decisions

Anti-Patterns

Wrong: Using qualitative labels for financial decisions

Board sees a red/yellow/green heat map and is asked to approve $5M investment. No way to evaluate ROI. [src3]

Correct: Quantify risk for financial comparison

Express risk in dollars to enable apples-to-apples comparison of control costs vs. expected loss reduction. [src1]

Wrong: Single scenario = total cyber risk

Quantifying only ransomware risk and using it to size insurance, ignoring data breaches and BEC. [src4]

Correct: Build a portfolio of 5-15 scenarios

Quantify top scenarios individually, then aggregate for total exposure. Use aggregate LEC for insurance. [src2]

Common Misconceptions

Misconception: Cyber risk cannot be quantified due to uncertainty.
Reality: FAIR explicitly models uncertainty through probability distributions. Quantitative estimates with known confidence are more useful than qualitative labels that hide uncertainty. [src1]

Misconception: You need perfect data to run FAIR.
Reality: FAIR works with calibrated SME estimates. The model uses ranges and probabilities, not point values. [src3]

Misconception: Loss exceedance curves predict how much you will lose.
Reality: LECs show probability of exceeding given thresholds — decision tools, not forecasts. [src2]

Comparison with Similar Concepts

ConceptKey DifferenceWhen to Use
FAIR / CRQQuantifies cyber risk in dollar termsFinancial decisions: insurance, control ROI
Risk Heat MapsQualitative likelihood/impact visualizationCommunication and prioritization
NIST CSF / ISO 27001Control frameworks for maturityCompliance and capability assessment
Penetration TestingTechnical vulnerability identificationFinding exploitable weaknesses

When This Matters

Fetch this when a user asks about quantifying cyber risk in financial terms, the FAIR model, loss exceedance curves, cyber insurance sizing, or justifying security investment with financial data.

Related Units