Strategic Platform

Foundations

Are you spending the right amount on cybersecurity? Not too little, not too much. Compliance is table stakes—Foundations finds your optimal investment point with YOUR data.

Multi-stakeholder assessment capturing CTO, HR, Legal, and CEO perspectives

Financial metrics: Annual Loss Expectancy, Revenue at Risk, Investment ROI

Monte Carlo simulation with "Goldilocks Zone" investment optimization

Executive Dashboard Preview
Revenue at Risk
Annualized
$4.2M
/ $180M revenue
2.3% of annual revenue exposed to cyber disruption
Risk Score
72/100
Above Poverty Line
Annual Loss Expectancy
$1.8M
Expected Annual Cost
Goldilocks Zone Status
Currently: Under-invested
+$340K investment reaches optimal ROI point
ACTION
Core Capability

Multi-Stakeholder Persona Assessment

Security risk isn't just technical—it's people, process, and policy. Foundations captures a complete organizational picture.

45
C-Level Tech (CTO/CISO)

Technical controls, infrastructure maturity, security architecture

20
C-Level HR

People security, training programs, security culture, insider risk

23
Legal/Compliance

Regulatory exposure, contractual obligations, legal risk tolerance

21
CEO/Board

Business priorities, risk appetite, strategic context

Why Multi-Stakeholder Matters
CISOs don't have visibility into HR training effectiveness
Legal exposure often unknown to technical teams
Boards care about business impact, not technical metrics
Aggregated perspectives provide more accurate risk picture
Risk Framework

Big 6 Risk Categories

Strategic risk categories that map to board-level concerns

Governance

Security leadership, policies, board oversight, program maturity

Culture

Security awareness, training effectiveness, employee behavior

Budget

Security investment levels, resource allocation, spending efficiency

Technical Debt

Legacy systems, patch management, architecture weaknesses

Third Party

Vendor risk, supply chain security, partner dependencies

People

Staffing levels, skills gaps, retention, insider threat

Core Capability

Financial Risk Quantification

Every metric expressed in dollars. Foundations calculates YOUR specific financial exposure—not industry averages.

Annual Loss Expectancy (ALE)

Expected annual cost from cyber incidents based on YOUR risk profile

Revenue at Risk

Portion of annual revenue exposed to cyber disruption

Daily Revenue Impact

Financial cost of each day of business disruption

Cyber Poverty Line

Minimum security score (75/100) needed to survive modern threats

Sample Financial Analysis
Company Revenue $180M
Annual Loss Expectancy $1.8M
Revenue at Risk $4.2M (2.3%)
Daily Impact (if down) $493K
Current Risk Score 72/100
Investment Scenarios
Current State Under-invested

Risk level with existing security investment

Survival +$180K

Minimum to reach Cyber Poverty Line (75/100)

Optimized (Goldilocks) +$340K

Best ROI point before diminishing returns

Over-Investment Zone WASTEFUL

Spending more than risk reduction justifies—diminishing returns

Core Capability

Find Your Optimal Investment Point

Most vendors push you to spend more. We show you where more spending stops helping. The Goldilocks Zone—not too little (vulnerable), not too much (wasteful).

Percentile Risk Estimates

90th, 95th, and 99th percentile worst-case scenarios

ROI Calculations

Expected ALE reduction and payback period for each scenario

Confidence Intervals

Boards see range of outcomes, not single-point estimates

Incident Analysis

Major Incident Scenario Modeling

YOUR organization's exposure to common cyber incidents—likelihood and impact based on YOUR controls

🔒

Ransomware Attack

Business disruption, recovery costs, potential ransom

Includes insurance coverage analysis
📊

Data Breach

Regulatory fines, legal exposure, notification costs

GDPR, CCPA, HIPAA impact modeling
🌐

DDoS Attack

Availability impact, revenue loss per hour

Based on YOUR daily revenue
📧

Business Email Compromise

Wire fraud, executive impersonation

Training and control effectiveness
👤

Insider Threat

Data theft, sabotage, privilege abuse

HR and access control integration
🔗

Supply Chain Compromise

Vendor breach, software supply chain attack

Third-party risk assessment
Core Capability

Executive Simulation & Board Reporting

Powerful tools for executive communication and strategic planning. What-if analysis for budget justification.

Executive Simulation Studio

What-if analysis and scenario modeling for budget justification

One-Page Board Reports

Financial risk metrics, investment recommendations, trend analysis

360° Risk Visualization

Interactive dashboards with risk score dial, dartboard view, KRIs

AI-Powered Recommendations

ROI-ranked prioritization with quick wins and strategic initiatives

Report Types

Executive Summary

Board-ready with financial metrics

Investment Analysis

ROI projections and recommendations

Trend Analysis

Peer benchmarking and progress tracking

Enterprise Feature

Portfolio Management

For MSSPs, cyber insurers, private equity firms, and enterprises managing multiple business units

Unlimited Companies

All portfolio companies in a single view with color-coded status

$

Aggregate Financials

Total revenue at risk across portfolio, aggregate ALE calculations

Triage Prioritization

Identify highest-risk entities, comparative benchmarking

Portfolio Features
Bulk company onboarding with portfolio wizard
Group-based filtering and analysis
Role-based permissions and access controls
Investment prioritization across portfolio

Industry-Specific Risk Frameworks

Custom risk multipliers, relevant regulations, and benchmark data for peer comparison

Healthcare (HIPAA)
Financial Services
Manufacturing (OT)
Defense Contractors
Energy/Utilities
Technology
Retail (PCI)
Professional Services
The Complete Picture

Foundations + PRISM = Complete Risk Aperture

Foundations tells you the RIGHT AMOUNT to invest. PRISM tells you HOW to execute tactically. Together, they create closed-loop risk intelligence from boardroom to server room.

Strategic Layer (Foundations)
  • Find optimal investment point
  • Detect over-investment waste
  • Board-level reporting
  • Goldilocks Zone analysis
Tactical Layer (PRISM)
  • Multi-framework compliance
  • System architecture modeling
  • Threat intelligence integration
  • Technical gap analysis

Ready to Find Your
Optimal Investment Point?

Stop guessing. Know exactly where additional spending stops reducing risk—so you invest the right amount, not just more.