Skip to main content

How does Protos Labs quantify Cyber Risk?

Learn more about how we quantify cyber risk rooted in industry best practices.

Chris L avatar
Written by Chris L
Updated over 6 months ago

At Protos Labs, we quantify cyber risk using a structured, data-driven approach rooted in industry best practices—specifically the FAIR framework (Factor Analysis of Information Risk), a leading standard used by global enterprises and insurers.

FAIR breaks down risk into two core components:

  • Frequency – How likely is a cyber event to happen?

  • Severity – How much financial damage could it cause?

We build on this logical foundation but take it further using advanced AI techniques and stochastic modeling to simulate thousands of potential outcomes. This lets us provide realistic, decision-ready risk estimates—not just theoretical ones.

Here are the three main data sources we use to power our models:


1. 🛡️ Security Posture (via External Telemetry)

We continuously assess an organization’s external attack surface—the parts of its IT systems that are visible to attackers. This gives us insight into its real-world cyber hygiene.

  • If we detect unpatched vulnerabilities, exposed systems, or outdated configurations, we assume there may be gaps in controls like patch management or endpoint protection.

  • We score these findings using mappings to well-established standards such as NIST Cybersecurity Framework (CSF), across relevant control families (e.g., Identify, Protect, Detect).

This gives us a proxy for the organization's cyber defense readiness—especially useful when internal data isn't available.

🧠 Example:
If we assess a Singapore-based SaaS company and detect several exposed APIs and high-risk vulnerabilities, we simulate the likelihood of a data breach based on similar historical cases—adjusting for sector, geography, and known local threat actor activity. This helps estimate both the probability and financial impact of an incident.


2. 🌍 Demographic & Contextual Data

We also incorporate key profile details of the organization, such as:

  • Industry sector

  • Country of operation

  • Revenue and company size

  • Number of customer or employee records held

Why does this matter? A healthcare firm in the U.S. holding millions of patient records faces different risk dynamics compared to a small manufacturing business in Southeast Asia. These factors help us fine-tune our estimates of both how often incidents might occur and how severe they could be.


3. 📊 Cyber Loss Data & Threat Intelligence

We draw from extensive cyber loss datasets—including hundreds of thousands of anonymized incidents—to build baseline models of real-world financial impact.

But we don’t stop there. We enrich this with:

  • Up-to-date threat intelligence (e.g., ransomware groups, data breach trends)

  • Expert insights into attacker tactics, techniques, and procedures (TTPs)

  • Adjustments for emerging threats and evolving risks

This means our models account not just for historical losses, but also for how threats are evolving and how they might realistically affect your organization today.


🎯 Why It Matters

We analyze billions of data points to help you see what your potential cyber losses could look like. The output is not a guarantee—it’s a starting point for a meaningful conversation about risk exposure, investment in controls, and financial preparedness.

As with any model, it won’t be perfect. But it is transparent, evidence-based, and continuously improving. And it’s built to give you the best estimate possible with the data available—so you can make smarter decisions, faster.

Did this answer your question?