Cyber risk quantification (CRQ) is the practice of expressing cybersecurity risk in financial terms — probability of loss events and their expected monetary impact — rather than qualitative labels. The dominant model is FAIR (Factor Analysis of Information Risk), created by Jack Jones in 2005 and adopted by The Open Group as the international standard. [src1] FAIR decomposes risk into Loss Event Frequency and Loss Magnitude, combined through Monte Carlo simulation to produce Loss Exceedance Curves. [src2]
START — User needs to assess cyber risk
├── What is the primary goal?
│ ├── Express risk in financial terms for board/CFO
│ │ └── ✅ FAIR / CRQ (this unit)
│ ├── Qualitative risk assessment (H/M/L)
│ │ └── → ERM Framework
│ ├── Compliance mapping (NIST CSF, ISO 27001)
│ │ └── → Cybersecurity compliance standards
│ ├── Business continuity for cyber incidents
│ │ └── → Business Continuity Planning
│ └── Cyber insurance purchase
│ └── ✅ FAIR + Loss Exceedance Curves (this unit)
├── Asset inventory and threat scenarios available?
│ ├── YES → Proceed with FAIR
│ └── NO → Build inventory first
└── Audience?
├── Board/CFO → Loss exceedance curves
├── CISO → Detailed scenario analysis
└── Insurance broker → Aggregate loss distribution
Board sees a red/yellow/green heat map and is asked to approve $5M investment. No way to evaluate ROI. [src3]
Express risk in dollars to enable apples-to-apples comparison of control costs vs. expected loss reduction. [src1]
Quantifying only ransomware risk and using it to size insurance, ignoring data breaches and BEC. [src4]
Quantify top scenarios individually, then aggregate for total exposure. Use aggregate LEC for insurance. [src2]
Misconception: Cyber risk cannot be quantified due to uncertainty.
Reality: FAIR explicitly models uncertainty through probability distributions. Quantitative estimates with known confidence are more useful than qualitative labels that hide uncertainty. [src1]
Misconception: You need perfect data to run FAIR.
Reality: FAIR works with calibrated SME estimates. The model uses ranges and probabilities, not point values. [src3]
Misconception: Loss exceedance curves predict how much you will lose.
Reality: LECs show probability of exceeding given thresholds — decision tools, not forecasts. [src2]
| Concept | Key Difference | When to Use |
|---|---|---|
| FAIR / CRQ | Quantifies cyber risk in dollar terms | Financial decisions: insurance, control ROI |
| Risk Heat Maps | Qualitative likelihood/impact visualization | Communication and prioritization |
| NIST CSF / ISO 27001 | Control frameworks for maturity | Compliance and capability assessment |
| Penetration Testing | Technical vulnerability identification | Finding exploitable weaknesses |
Fetch this when a user asks about quantifying cyber risk in financial terms, the FAIR model, loss exceedance curves, cyber insurance sizing, or justifying security investment with financial data.