Skip to content
Viriatus
Back to blog Risco

Quantitative Risk Analysis with FAIR and Monte Carlo

A formal examination of the FAIR methodology for quantitative information risk analysis and the application of Monte Carlo simulation to cybersecurity loss estimation.

S Sérgio Silva
·
20 February 2026
·
4 min
FAIRMonte CarloRiskGRC

Abstract

Qualitative risk assessment methods, while widely adopted, suffer from well-documented limitations in reproducibility, cognitive bias susceptibility, and decision utility. This article examines Factor Analysis of Information Risk (FAIR) as a quantitative alternative, describes the application of Monte Carlo simulation to uncertainty modelling in cybersecurity loss estimation, and discusses the practical implications of translating technical risk into financial language comprehensible to executive decision-makers.

Introduction

The predominant approach to cybersecurity risk assessment in contemporary organizations remains the qualitative risk matrix — typically a five-by-five grid mapping likelihood against impact using ordinal scales such as “high,” “medium,” and “low.” Hubbard and Seiersen (2016) have demonstrated that such matrices produce inconsistent results across assessors, conflate fundamentally different risk profiles into identical ratings, and provide insufficient granularity for investment decision-making. When a Chief Information Security Officer presents a risk as “High / Likely,” the board of directors lacks the quantitative basis to determine whether appropriate mitigation warrants an investment of fifty thousand euros or five hundred thousand euros. ISO/IEC 27005:2022 acknowledges these limitations and recommends that organizations adopt quantitative methods where feasible (ISO/IEC, 2022).

The FAIR Decomposition Model

Factor Analysis of Information Risk, formalized by Freund and Jones (2015), addresses the deficiencies of qualitative approaches by decomposing risk into a hierarchy of measurable factors. As illustrated in Figure 1, the model separates risk into two primary components: Loss Event Frequency (LEF) and Loss Magnitude (LM).

Risk (ALE)Loss Event FrequencyLoss MagnitudeThreat Event FrequencyVulnerability (Prob.)Primary LossSecondary LossContact Freq.Prob. of ActionThreat CapabilityControl StrengthFigure 1. FAIR risk decomposition taxonomy (adapted from Freund & Jones, 2015).

Figure 1: FAIR model decomposition — from threat frequency to loss magnitude

Loss Event Frequency is further decomposed into Threat Event Frequency — how often a threat agent initiates contact with an asset — and Vulnerability, defined as the probability that a threat event results in a loss event given the interplay between threat capability and control strength. Loss Magnitude separates into primary losses (response costs, replacement, lost productivity) and secondary losses (regulatory fines, reputational damage, litigation). The product of these factors yields an Annualized Loss Expectancy (ALE) expressed in monetary units (FAIR Institute, 2023).

Monte Carlo Simulation for Uncertainty Quantification

Because precise point estimates for each FAIR factor are rarely available, practitioners employ probability distributions — typically PERT or lognormal — to represent uncertainty in input parameters. Monte Carlo simulation generates thousands of randomized scenarios by sampling from these distributions, producing a probability distribution of potential losses rather than a single deterministic value (Hubbard & Seiersen, 2016).

Annualized Loss (EUR)FrequencyVaR 95%CVaR 95%500K2.0M3.2M3.8MFigure 2. Monte Carlo loss distribution with VaR and CVaR markers.

Figure 2: Monte Carlo distribution — VaR 95% and CVaR as decision metrics

Two metrics derived from this distribution are of particular decision utility (see Figure 2). Value at Risk (VaR) at the 95th percentile represents the loss threshold that will not be exceeded in 95% of simulated scenarios. Conditional Value at Risk (CVaR) at the 95th percentile represents the expected loss in the worst 5% of scenarios, capturing tail risk that VaR alone obscures. Together, these metrics enable management to articulate risk tolerance in financial terms and to evaluate the return on security investment with quantitative rigour (FAIR Institute, 2023).

Practical Implications

The transition from qualitative to quantitative risk analysis carries several operational implications. Organizations must invest in data collection to calibrate FAIR input parameters — historical incident data, threat intelligence feeds, and control effectiveness metrics. ISO/IEC 27005:2022 provides a compatible risk management framework within which FAIR analysis can be embedded (ISO/IEC, 2022). Sensitivity analysis should accompany all Monte Carlo outputs to identify which input factors most influence the loss distribution, thereby directing mitigation investment toward the highest-leverage controls. Rather than presenting boards with lists of CVE identifiers and CVSS scores, security leaders can demonstrate that a specific threat scenario carries a VaR 95% of 2.3 million euros and that a defined investment reduces that exposure by a quantified margin.

Conclusion

The FAIR methodology and Monte Carlo simulation collectively provide a rigorous, defensible framework for quantifying cybersecurity risk in financial terms. By replacing subjective ordinal ratings with calibrated probability distributions and empirically grounded loss models, organizations can elevate cybersecurity risk discussions from technical anxiety to evidence-based investment decision-making. As regulatory frameworks increasingly demand demonstrable risk management — notably NIS2 and DORA — the adoption of quantitative methods transitions from an analytical luxury to a governance necessity.

References

FAIR Institute. (2023). FAIR Model Reference Guide v4. FAIR Institute.

Freund, J., & Jones, J. (2015). Measuring and Managing Information Risk: A FAIR Approach. Butterworth-Heinemann.

Hubbard, D. W., & Seiersen, R. (2016). How to Measure Anything in Cybersecurity Risk. Wiley.

ISO/IEC. (2022). ISO/IEC 27005:2022 — Information security risk management. International Organization for Standardization.

Sérgio Silva
About the Author
Sérgio Silva
CEO — CyberS3C

Founder of CyberS3C and CEO of Viriatus. NOVA graduate with 20+ years in public administration, European Commission expert, and CISO of APDP.