Everything You Need to Know About Squalify

Get answers to common questions about Squalify, our top-down cyber risk quantification approach, and our partnership with Munich Re.

Value Proposition

What is Squalify's primary value proposition?

Squalify transforms complex cyber risk data into financial metrics that are easily understood by C-level executives and board members. Our insights provide an aggregated view of an organization's risk profile. This enables effective strategic decision-making and risk prioritization at the highest levels of an organization, based on the magnitude of the financial business impact of cyber risk.

What are the most common use cases for Squalify?

Squalify is designed for a wide range of strategic applications, including:

Board-level strategic decision making: Squalify's big-picture approach provides a high-level view of your enterprise-wide cyber risk to demonstrate the direct link between cyber risk and an organization's financial health.
Predict the material impact of potential cyber incidents: Squalify helps assess the financial impact of cyber risk on your organization, informing cybersecurity investments and overall risk management.
Benchmark against industry standards: Squalify provides insight into how your cybersecurity posture compares to industry peers to identify cybersecurity gaps and areas for improvement.
Manage subsidiaries for large enterprises: Squalify makes centralized management of cyber risk across global subsidiaries seamless, ensuring alignment with your organization's risk appetite by prioritizing cybersecurity investments based on each subsidiary's risk exposure.
Quantify the ROI of security budgets: With Squalify's simulation capabilities, you can calculate the ROI of cybersecurity improvement programs before they are even implemented, providing a clear financial justification for cybersecurity spending up front.
Identify information security vulnerabilities: Squalify can highlight vulnerable areas of your organization that require attention and investment to strengthen your overall cyber resilience.

Quantification Methodology

How does Squalify's quantification approach compare to conventional methods?

Top-Down vs. Bottom-up Quantification

Squalify's quantification approach uses a top-down methodology that focuses on assessing enterprise-wide cyber risk, providing insights for strategic decision-making at the highest levels of the organization. This contrasts with traditional bottom-up approaches that analyze technical, asset-level data for operational decision-making.

Benefits of Top-Down Quantification

Squalify's top-down methodology makes aggregated, enterprise-level risk assessments lean and seamless, with a time-to-insight of just days. These advantages offset the disadvantages of bottom-up methods, which tend to be much slower, more complex, and more data-intensive.

Does Squalify use the FAIR Methodology for quantification?

No - Squalify uses a proprietary risk quantification methodology, developed through ten years of cyber insurance risk quantification by our parent company Munich Re, one of the world’s largest cyber reinsurers.

Our approach also makes use of Munich Re’s unique cyber insurance database. This greatly simplifies the information collection stage and means that you don’t need to guess how often threats might occur, or how much an incident may cost. We’ve got the historic data about what actually happens and how much it costs. Of course, we keep the model updated to reflect new threats and changes in the loss landscape.

Our methodology includes a Monte Carlo Simulation to statistically model the financial impact of cyber risk. This is built into our platform and part of our core service, so you don’t need in-house statistical or mathematical expertise to set this up. And you certainly don’t need to create and maintain lots of spreadsheets!

We believe that our unique methodology greatly speeds up cyber risk quantification, while maintaining an unparalleled high level of quality. We take care of the difficult and boring stuff, leaving you to focus on what cyber risk means for your business and how you can use quantification to achieve strategic decision making.

Our methodology is fully documented, so if you do want to peek under the covers and review the mathematics we will be happy to geek out with you.

How does Squalify balance speed with high quality results in its quantification process?

Squalify balances speed with high quality results through a lean data collection process and advanced quantification algorithms. Our platform uses a "model certainty" criterion that measures the confidence level of quantification results based on the quality and quantity of data inputs. This ensures that you always have full transparency into the quality of the input data and the reliability of the quantification results.

Data Collection Process and Onboarding

How many data points does Squalify need?

Squalify requires only a dozen data points for fast quantification and a maximum of 200 data points for full quantification.

What data do I need to do a quantification? What is the data collection process?

Squalify simplifies the data collection process by focusing on key data points that provide a comprehensive view of your organization's cyber risk. We typically require only a fraction of the data required by traditional methods, enabling fast yet thorough risk assessments.

We need three categories of data to complete a full quantification:

Basic Company Information: We start with easily obtainable company data such as the industry, number of employees, and revenue. Typically this data is available from existing or public reports (e.g. annual reports).
Company relevant scenario data: Defining the most significant cyber scenarios for your business ensures the quantification focuses on the top risks. These scenarios may already be available in business continuity or crisis management plans; if not we have a structured methodology to clarify these. Expect to seek additional expert input from within your company on financial, operational, technology, and legal topics.
Information security maturity data: Our top-down approach means that we use maturity data on a company level. By default, we use the industry standard NIST Cybersecurity Framework to structure this information. If you use a different framework (e.g. ISO 27001) we have experience in mapping controls to NIST and can support you with this.

As a rule of thumb, the more data we receive from you, the higher the quality of the quantification results.

For the initial assessment, clients typically complete data collection in a few days for the worst-case loss assessment and 2-4 weeks for the full quantification. Importantly, future assessments become exponentially faster, requiring only updates as new information becomes available.

How do I estimate threat frequency data and the costs of incidents?

That’s the neat part, with Squalify you don’t need to.

Our unique methodology (see Does Squalify Use the FAIR Methodology above) includes an industry leading cyber loss database based on over 10 years of real life cyber insurance claims. This means that we now how often incidents occur, and how much incidents cost when they do.

Our model comes with a number of threat scenarios based on this historic data, which means that you can spend more time making decisions and no time guessing.

Training and Onboarding

How do I learn to run a Squalify quantification project?

Squalify recognizes that Cyber Risk Quantification can appear daunting and complicated. We address this firstly by having a simple quantification methodology and implementation (see Does Squalify Use the FAIR Methodology above), and secondly by supporting you with training as we welcome you to the platform.

We will work closely with you through the first quantification project (see What is the Onboarding Process? below) and aim to ensure that your team has the skills and knowledge to run later projects independently.

Our methodology is documented in detail and we can share this with you to use as a reference material. There is also an extensive help guide built within to our platform.

What is the onboarding process?

To ensure your success from the first quantification, we provide your quantification team with in-depth training and workshops on how to effectively use our platform and approach. Through your first quantification project we will support you with data collection, interview guidance, and scenario building. The onboarding also includes data validation rounds and peer reviews to ensure high quality data input and quantification output from the outset to ensure your continued success in cyber risk quantification.

Of course, our team is always available after onboarding if you need additional support.

Squalify x Munich Re Partnership

How does Squalify use Munich Re's model in its quantification results?

The Squalify platform includes Munich Re's proven cyber risk model, which is used to calculate insurance premiums and deductibles for its clients. This model has been refined through over 4,500 large enterprise quantifications and underpins our platform's ability to deliver high quality and reliable risk assessments, providing you with quantification insights backed by one of the world's leading reinsurers.

Is there a data exchange between Squalify and Munich Re?

There is limited data sharing between Squalify and Munich Re. We only share fully anonymized data in aggregate form with Munich Re for continuous model improvement. Your specific risk quantification results remain confidential. And because we have a strong commitment to privacy and security, we maintain a separate IT environment from Munich Re to ensure that no sensitive client data is shared with them.

How does Squalify ensure that the risk model is continuously improved and always reflects the current risk landscape?

Squalify's model is continuously updated by the Munich Re team, incorporating the latest threat landscape information and insurance loss data. This ensures that our risk quantifications are always relevant, accurate and aligned with emerging cyber threats, providing you with up-to-date insights for informed decision-making.

Transform Cyber Risk Management Into a Competitive Advantage

Quantify risk, optimize security investments, and align cybersecurity with enterprise objectives—powered by real-world cyber loss data.
Book Meeting