Threatonomics

Why your CFO expects your CISO to measure risk buydown

by Emma McGowan , Senior Writer
Published

A practical guide to FAIR, scenario modeling, and speaking finance's language

The CISO walks into the CFO’s office with a carefully prepared pitch. “We need a $500,000 EDR solution,” she says, presenting vendor comparisons and threat intelligence reports. The CFO nods politely and asks one question: “What’s the return on that investment?”

The meeting goes sideways from there. The CISO talks about improved threat detection and faster response times. The CFO asks about impact on next quarter’s EBITDA. They’re speaking different languages—security measures value by threats prevented, finance measures it by capital returns. But there’s a growing expectation from CFOs that security investments should be measured the same way as any other capital allocation decision: by quantifying the risk they buy down.

What risk buydown actually means

Risk buydown is a concept borrowed from traditional finance. At its simplest, it means paying money upfront to reduce your future potential losses. When you buy insurance or hedge commodity prices, you’re buying down risk—spending today to protect against larger financial hits tomorrow.

In cybersecurity, every security control or tool you invest in should measurably reduce your exposure to future losses from cyber incidents. That reduction is the value your CFO is looking for.

The key distinction is between risk buydown and cost avoidance. Cost avoidance framing has a credibility problem: “We avoided a breach that could have cost us $5 million.” Even when used prospectively, it relies on a counterfactual — you can’t prove what didn’t happen, which makes it easy for finance teams to dismiss. Risk buydown is different: “This investment will reduce our expected annual losses from $2 million to $1.2 million.” It’s a quantified baseline with a measurable delta — an investment thesis finance teams already know how to evaluate.

Why CFOs expect this measurement now

Several converging forces are making quantifiable cyber risk measurement a business imperative. Board directors want to see enterprise risk exposure in financial terms they can compare against other strategic risks. SEC disclosure requirements have made cyber risk a material financial consideration. Cyber insurers demand demonstrable risk reduction from security programs, using actuarial data to price risk with increasing precision.

Perhaps most importantly, we now have substantial breach cost data. Organizations like IBM and Verizon publish detailed loss statistics in publicly available industry reports. Industry-specific benchmarks exist. We can estimate potential loss magnitudes with reasonable accuracy, which makes risk buydown calculation feasible in ways it wasn’t a decade ago.

Two approaches to measuring risk buydown

To quantify risk buydown effectively, you need a framework that translates security investments into financial terms. Two complementary approaches have emerged: bottom-up personal forecasting and top-down scenario pricing. Understanding when to use each approach—or both together—helps you build the most compelling case for security investments.

FAIR: Your personalized annual risk forecast

The de facto industry standard for quantifying cyber risk is FAIR (Factor Analysis of Information Risk). Think of FAIR like getting a custom mechanic’s report for your car—it examines your specific vehicle, your brakes, your driving habits, and predicts how much you’ll likely spend on car trouble this year. That personalized analysis makes it valuable for decision-making.

FAIR helps you estimate two critical variables: Threat Event Frequency (how often will someone attempt to attack us, based on your industry and threat landscape) and Vulnerability (how strong are our current defenses against those attempts).

When you multiply these factors through the FAIR model, you get an Annualized Loss Expectancy (ALE)—a dollar figure representing your expected cyber losses over the next year. For example: “Based on our current setup, we should expect to lose approximately $2 million over the next year to various cyber incidents.”

Demonstrating risk buydown with FAIR

Here’s where this becomes powerful. Let’s walk through a complete example. You’re a CISO at a mid-sized financial services company, and you want to implement a security awareness training program that costs $180,000 annually.

You start with a FAIR analysis of your current state, focusing on phishing-enabled ransomware and business email compromise. Based on industry data and your current email security controls plus historical phishing simulation results showing a 22% click rate, you estimate a 30% probability of a successful email-based attack in the next year. Drawing from breach cost data from financial services peers, you estimate potential impact at $3.5 million (incident response, operational downtime, regulatory fines, customer notification). Your expected annual loss from this threat vector: $1.05 million.

Now you model the proposed program. The vendor data shows organizations implementing their training see click rates drop to 8% after one year, and research indicates security-aware employees report suspicious emails faster, reducing dwell time. You re-run your FAIR model: probability of successful attacks drops to 12%, impact reduces to $2.8 million due to faster detection. Your new expected annual loss: $336,000.

In this hypothetical scenario, the model quantified the potential a risk buydown of $714,000 annually against a $180,000 investment. That’s a 297% return in year one.

When you present this to your CFO, the conversation is different from traditional security budget requests. You walk through your methodology, share data sources, and acknowledge uncertainty ranges. Your CFO asks: “What if the click rate only drops to 12% instead of 8%?”

You’ve run the sensitivity analysis. Even with conservative assumptions—only 15% probability reduction and no impact reduction—you’re still showing $525,000 in risk buydown against $180,000 in cost. The investment holds up across scenarios.

FAIR requires manual research and thoughtful estimation. You’re making educated assumptions about threat frequency and defensive posture based on industry reports, threat intelligence, historical incidents, and honest control assessments. It’s slower than automated approaches, but that deliberation is the point—you’re building a defensible business case with transparent assumptions your CFO can pressure-test.

Resilience Model: Scenario-specific loss pricing

While FAIR gives you a personalized annual forecast, the Resilience model provides a data-driven estimate of the potential financial impact, addressing a different question: “If a specific disaster happens—ransomware, data breach, cloud misconfiguration—what’s the actual bill?” Think of this as a crash test rating for your car. It doesn’t care about your driving habits. It says, “If this car hits a wall at 60mph, here’s the exact bill for the damage based on thousands of previous crashes.”

The Resilience model is a top-down, data-driven approach that uses real-world insurance claims from thousands of companies similar to yours. Instead of building up from your specific threat landscape and defenses, it starts with the assumption that a particular incident has already happened and calculates what you’ll pay.

The model breaks losses into a detailed shopping list:

  • Legal and forensics: Third-party incident response, legal counsel, forensic investigation
  • Technology recovery: Replacing or repairing servers, computers, and systems
  • Business interruption: Revenue lost while operations are disrupted
  • Regulatory and legal: Fines, penalties, and settlement costs

Because the model draws from analysis of actual insurance claims data, it accounts for how costs compound in real incidents. The latest version uses sophisticated mathematics (copulas) to understand how different loss categories correlate—for instance, a ransomware attack that encrypts systems will cause both technology recovery costs and business interruption losses, and these are related, not independent. The model ensures you’re not double-counting or artificially inflating total losses.

Demonstrating risk buydown with the Resilience model

Let’s return to our financial services company example, but this time using the Resilience model. Instead of building up your total annual risk across all scenarios, you want to understand your exposure to a specific, high-impact event: a data breach affecting customer financial records.

You run the model for your company profile—mid-sized financial services, specific revenue band, regulatory environment. Based on thousands of peer claims, the model prices a customer data breach at $4.2 million, broken down as:

  • Legal and forensics: $800,000
  • Technology recovery: $600,000
  • Business interruption: $1.8 million
  • Regulatory fines and customer notification: $1 million

Now you want to demonstrate the risk buydown from implementing a comprehensive data loss prevention (DLP) and encryption program costing $350,000 annually.

After implementation, you re-run the model with updated controls. Industry data shows that DLP and encryption significantly reduce breach scope and duration. Your new breach scenario prices at $2.1 million—the breach still happens, but encrypted data means lower regulatory fines, faster recovery reduces business interruption, and better containment limits the scope of compromise.

You’ve demonstrated a $2.1 million risk buydown from a single scenario. But here’s where the Resilience model becomes especially powerful for CFO conversations: you can also show them how this changes your insurance needs. If your worst-case breach scenario drops from $4.2 million to $2.1 million, you either need less coverage (lower premiums) or you have better protection within your existing coverage limits.

When to use each approach

Use FAIR when:

  • Justifying broad security program investments that affect multiple threat scenarios
  • Building a business case for controls that primarily reduce attack likelihood (MFA, security awareness training, threat detection)
  • You need to show total annual risk reduction across your entire threat landscape
  • Your audience wants to understand your comprehensive risk posture and how investments move the needle

Use the Resilience model when:

  • Presenting to the board or insurance committee about worst-case scenarios
  • Justifying investments that primarily reduce impact severity (backup and recovery, incident response capabilities, cyber insurance)
  • Making the case for adequate cyber insurance coverage limits
  • Your CFO wants to understand tail risk—what happens if everything goes wrong despite your best efforts

Use both together when:

  • Making major security program decisions that affect both likelihood and impact
  • You want to show FAIR’s annual expected loss reduction alongside worst-case scenario protection
  • Building a comprehensive risk management strategy that addresses both typical losses and catastrophic events

The most sophisticated security organizations use both. FAIR helps optimize your security spending across the threat landscape. The Resilience model ensures you’re resilient when prevention fails. Together, they give your CFO a complete picture: here’s what we’re doing to reduce our expected annual losses, and here’s our protection against scenarios that could threaten the company’s survival.

Common objections and how to address them

“We can’t predict when attacks will happen.” True, but you don’t need to predict timing—you need to estimate probability over defined time horizons. Finance makes probabilistic decisions under uncertainty every day. They need a defensible estimate that there’s a 15% probability of ransomware success in the next 12 months and the methodology behind it.

“Every control has intangible benefits we can’t quantify.” Start with tangible, quantifiable benefits first. Build credibility with straightforward math. Once you’ve established trust and a track record, layer in qualitative value for harder-to-measure controls.

“Finance doesn’t understand security.” Your CFO doesn’t need to understand EDR architecture or signature-based versus behavioral detection. They need to understand: What does this cost? What risk does it reduce? What’s the return? Meet them in their language—that’s your responsibility as a business leader.

“The estimates are too uncertain.” Every financial model involves uncertainty. Revenue projections are uncertain. What matters is transparency about your assumptions. Document what threat data you’re using, how you estimated improvements, what uncertainty ranges exist. Finance teams are comfortable with uncertainty bands—they just need to understand the basis for your estimates.

The bottom line 

Your CFO isn’t expecting perfect precision—they’re expecting you to show your work using credible data and make a defensible case for why dollars invested will generate measurable returns. Risk buydown measurement translates security spending from an opaque cost center into an active investment thesis about reducing future losses. It gives security and finance a common language for evaluating tradeoffs and positions cyber risk management as enterprise risk management.

The mechanics take time to learn. Your first FAIR analysis will be slower and more uncertain than your tenth. Your first time using a severity model to price worst-case scenarios will raise more questions than it answers. But the payoff isn’t just easier budget approvals—it’s smarter, more strategic decisions about where to invest in risk reduction. That’s what your CFO expects from your CISO, and increasingly what boards and regulators expect too.

You might also like

OpenClaw went viral. So did its security vulnerabilities.

Personal AI agents promise to streamline workflows and automate routine tasks, but a series of recent security incidents has exposed a critical vulnerability in how these tools acquire new capabilities. The findings reveal that threat actors are exploiting the same supply chain tactics that have compromised traditional software ecosystems, while platform security failures are exposing […]

Killing legacy systems might be your smartest financial move 

Every CISO has that one system. Maybe it’s running on Windows Server 2008. Maybe it’s the manufacturing control system that predates your current CEO. Maybe it’s the ancient database that three different business-critical applications depend on, maintained by one person who’s been threatening to retire for five years. You know these systems are problems. Your […]

What your CFO actually cares about (and how to speak their language)

You walk into your CFO’s office with a carefully prepared business case for a critical security investment. The risk assessment is complete, the vulnerabilities are documented, and you’re ready to make your argument. But the moment you mention “attack surface” or “zero-day vulnerabilities,” you can see their attention drift. The issue isn’t that your CFO […]

Risk Briefing: Cyber extortion has fundamentally changed

On January 14, 2026, Resilience launched its inaugural Risk Briefing Series with a clear message for CISOs: the cyber extortion playbook has been rewritten, and organizations relying on traditional defenses are dangerously exposed. In the first session of this monthly intelligence series, Jud Dressler, Director of Resilience’s Risk Operations Center and retired U.S. Air Force […]

The 65% shift that proves ransomware as we know it is dead

The cybersecurity industry has a terminology problem. We’re still calling it “ransomware” when the majority of attacks no longer encrypt and request a ransom for decryption as their primary weapon. Resilience’s analysis of cyber extortion claims in our portfolio throughout 2025 reveals a dramatic acceleration in attack methods. Data theft extortion-only events rose from 49% […]

Why your enterprise risk framework needs threat intelligence

Here’s a question that should make any enterprise risk management (ERM) professional uncomfortable: How can you manage a risk you don’t even know exists? In my role leading threat intelligence at Resilience, I work at the intersection of cybersecurity and business risk. And I’ve noticed a persistent gap: many ERM professionals know cyber risk belongs […]