<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Heatmaps to Histograms: Field Notes]]></title><description><![CDATA[Risk quantification made practical. Monthly insights, tools, and techniques for cybersecurity, GRC, and risk management professionals.]]></description><link>https://newsletter.heatmapstohistograms.com</link><image><url>https://substackcdn.com/image/fetch/$s_!laV-!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9b118e0-8808-483b-a5c5-93a60465ab42_1024x1024.png</url><title>Heatmaps to Histograms: Field Notes</title><link>https://newsletter.heatmapstohistograms.com</link></image><generator>Substack</generator><lastBuildDate>Tue, 28 Apr 2026 09:03:19 GMT</lastBuildDate><atom:link href="https://newsletter.heatmapstohistograms.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Tony Martin-Vegue]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[heatmapstohistograms@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[heatmapstohistograms@substack.com]]></itunes:email><itunes:name><![CDATA[Tony Martin-Vegue]]></itunes:name></itunes:owner><itunes:author><![CDATA[Tony Martin-Vegue]]></itunes:author><googleplay:owner><![CDATA[heatmapstohistograms@substack.com]]></googleplay:owner><googleplay:email><![CDATA[heatmapstohistograms@substack.com]]></googleplay:email><googleplay:author><![CDATA[Tony Martin-Vegue]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Issue 11: The Complete Guide to Cyber Risk Dashboard Design]]></title><description><![CDATA[Lies, Damn Lies, and the Numbers That "Feel Right"]]></description><link>https://newsletter.heatmapstohistograms.com/p/issue-11-the-complete-guide-to-cyber</link><guid isPermaLink="false">https://newsletter.heatmapstohistograms.com/p/issue-11-the-complete-guide-to-cyber</guid><dc:creator><![CDATA[Tony Martin-Vegue]]></dc:creator><pubDate>Wed, 01 Apr 2026 13:01:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2GRj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6cdad9a-37c8-4ddb-b9ac-6918f3928d2d_4000x2250.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>In This Issue:</h1><ul><li><p><strong>&#128214; Book Update</strong></p></li><li><p><strong>&#127908; Upcoming Talks</strong></p></li><li><p><strong>&#128221; The Complete Guide to Cyber Risk Dashboard Design</strong></p></li></ul><div><hr></div><h1>&#128214; Book Update</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9nqT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71708dd-0b6e-463c-88a1-cfdb56849d58_2717x2761.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9nqT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71708dd-0b6e-463c-88a1-cfdb56849d58_2717x2761.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9nqT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71708dd-0b6e-463c-88a1-cfdb56849d58_2717x2761.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9nqT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71708dd-0b6e-463c-88a1-cfdb56849d58_2717x2761.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9nqT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71708dd-0b6e-463c-88a1-cfdb56849d58_2717x2761.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9nqT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71708dd-0b6e-463c-88a1-cfdb56849d58_2717x2761.jpeg" width="440" height="447.25274725274727" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c71708dd-0b6e-463c-88a1-cfdb56849d58_2717x2761.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1480,&quot;width&quot;:1456,&quot;resizeWidth&quot;:440,&quot;bytes&quot;:1819099,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/192649637?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71708dd-0b6e-463c-88a1-cfdb56849d58_2717x2761.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9nqT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71708dd-0b6e-463c-88a1-cfdb56849d58_2717x2761.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9nqT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71708dd-0b6e-463c-88a1-cfdb56849d58_2717x2761.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9nqT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71708dd-0b6e-463c-88a1-cfdb56849d58_2717x2761.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9nqT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc71708dd-0b6e-463c-88a1-cfdb56849d58_2717x2761.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Hey, it&#8217;s here! It&#8217;s in my hand!</strong> My book, <em><a href="https://www.heatmapstohistograms.com/">From Heatmaps to Histograms</a></em>, just arrived on my doorstep from Springer Nature. It&#8217;s an amazing feeling that I don&#8217;t really have words for. It&#8217;s been quite a journey, to say the least. In the book, I call risk measurement and quantitative analysis a &#8220;quiet revolution&#8221; of rational thought, so as it goes out into the world it feels &#8220;done&#8221; in a sense, but it also feels like a beginning. I keep coming back to this quote from T.S. Eliot, one of my favorite poets:</p><div class="pullquote"><p><em>What we call the beginning is often the end. And to make an end is to make a beginning.</em></p></div><p>Here is where things stand with orders and shipping as of April 1:</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><ul><li><p><strong>The book is available worldwide, anywhere books are sold, online and in local bookstores</strong></p></li><li><p><strong>Available now via the publisher, <a href="https://link.springer.com/book/10.1007/979-8-8688-2300-8">Springer</a></strong> &#8212; ebook $29.99, print $39.99</p></li><li><p><strong>Available now via <a href="https://www.barnesandnoble.com/w/from-heatmaps-to-histograms-tony-martin-vegue/1148612851">Barnes &amp; Noble</a></strong><a href="https://www.barnesandnoble.com/w/from-heatmaps-to-histograms-tony-martin-vegue/1148612851"> </a>&#8212; ebook and print $39.99, I am hearing that orders through B&amp;N have shipped</p></li><li><p><strong>Still on preorder via <a href="https://www.amazon.com/Heatmaps-Histograms-Practical-Guide-Quantification/dp/B0FX7V3J7D">Amazon</a></strong> &#129335;&#8205;&#9794;&#65039; &#8212; print $39.99, showing an April 9 date, but I would imagine copies ship within a few days</p></li></ul><p>Book signings and events are in the works, and I&#8217;ll share details as they come together.</p><p>As you get your copies, please send me pictures. I would love to post them on LinkedIn. If you leave a review, which helps enormously, let me know, and I will share it. And thank you to everyone who preordered.</p><p>&#128279; <a href="https://www.heatmapstohistograms.com">Book website</a></p><div><hr></div><h1>&#127908; Upcoming Talks</h1><p><strong>April 21, 2026</strong> &#8212; &#8220;Did We Solve the Data Problem? Judgment, Beliefs, and Risk in the AI Age&#8221; SIRAcon 2026 &#8212; Keynote</p><p>I&#8217;m keynoting SIRAcon this year with a talk on why the real bottleneck in risk quantification was never data, it was judgment, and why AI makes that distinction more important than ever. SIRAcon remains my favorite conference because it is model-neutral, vendor-neutral, and entirely dedicated to advancing risk practices.</p><p>&#128279; <a href="https://web.cvent.com/event/fec816af-1cb3-46b3-b0dc-1895493777be/summary">More info</a></p><div><hr></div><h1><strong>&#128221; </strong>The Complete Guide to Cyber Risk Dashboard Design</h1><p>This issue is a masterclass in building the ultimate cyber risk dashboard. I&#8217;m going to teach you how to build the example below, which has every critical element a risk team needs to present to executive leadership:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2GRj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6cdad9a-37c8-4ddb-b9ac-6918f3928d2d_4000x2250.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2GRj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6cdad9a-37c8-4ddb-b9ac-6918f3928d2d_4000x2250.png 424w, https://substackcdn.com/image/fetch/$s_!2GRj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6cdad9a-37c8-4ddb-b9ac-6918f3928d2d_4000x2250.png 848w, https://substackcdn.com/image/fetch/$s_!2GRj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6cdad9a-37c8-4ddb-b9ac-6918f3928d2d_4000x2250.png 1272w, https://substackcdn.com/image/fetch/$s_!2GRj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6cdad9a-37c8-4ddb-b9ac-6918f3928d2d_4000x2250.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2GRj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6cdad9a-37c8-4ddb-b9ac-6918f3928d2d_4000x2250.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b6cdad9a-37c8-4ddb-b9ac-6918f3928d2d_4000x2250.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:486890,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/192649637?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6cdad9a-37c8-4ddb-b9ac-6918f3928d2d_4000x2250.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2GRj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6cdad9a-37c8-4ddb-b9ac-6918f3928d2d_4000x2250.png 424w, https://substackcdn.com/image/fetch/$s_!2GRj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6cdad9a-37c8-4ddb-b9ac-6918f3928d2d_4000x2250.png 848w, https://substackcdn.com/image/fetch/$s_!2GRj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6cdad9a-37c8-4ddb-b9ac-6918f3928d2d_4000x2250.png 1272w, https://substackcdn.com/image/fetch/$s_!2GRj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6cdad9a-37c8-4ddb-b9ac-6918f3928d2d_4000x2250.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><ul><li><p>A peer benchmarking figure from the <strong>IBM/Ponemon Cost of a Data Breach Report</strong>, a trusted source that gives you a perfect baseline for what a data breach would cost your organization</p></li><li><p>An aggregated cyber risk rating across all risks and portfolios, so leadership has a single clear picture of where we stand</p></li><li><p>Control coverage and open risk items, the operational metrics every board wants to see</p></li><li><p><strong>The centerpiece:</strong> a risk matrix showing your top risks for quick, easy decisions on where to focus mitigation efforts</p></li><li><p>A 3D pie chart of top threats for fast visual recognition</p></li><li><p>And much more&#8230;.</p></li></ul><p></p><p></p><h1 style="text-align: center;">&#42780;</h1><h1 style="text-align: center;"><strong>April Fools.</strong></h1><p>I hope I didn&#8217;t give everyone a heart attack. You probably thought I lost my mind. The <em><strong>real</strong></em> topic of this issue is a walkthrough of very common data visualization and measurement techniques, how they can be misused or misinterpreted, and what the better alternatives look like.</p><p>What is entirely absent from this dashboard, before you look at any individual element, is any <strong>statement of purpose</strong>. There is no decision it is designed to support, no organizational objective it connects to, and no decision-relevant question a board member could answer after reading it that they could not have answered before. The dashboard is a collection of indicators assembled because indicators can be assembled, a snapshot of activity presented as &#8220;risk.&#8221; When a dashboard has no decision to serve, there is no principled way to ask whether any given metric belongs on it at all.</p><p><strong>A dashboard that tells you what happened is a report. A dashboard that tells you what to do requires a decision at its center, and this one has none.</strong></p><p>Hubbard defines measurement as a <em>quantitatively expressed reduction in uncertainty based on one or more observations</em>. By that standard, not one element on this dashboard qualifies as a measurement. Each one fails on at least one of four criteria: it lacks a defined construct, it has no unit, it is not reproducible across observers, or it has no demonstrable connection to the phenomenon it claims to represent.<br><br>Let&#8217;s dive in, one at a time.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!H0xd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb053e25f-b7a5-40ca-a80d-1af9b0cc3bef_4000x2250.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!H0xd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb053e25f-b7a5-40ca-a80d-1af9b0cc3bef_4000x2250.png 424w, https://substackcdn.com/image/fetch/$s_!H0xd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb053e25f-b7a5-40ca-a80d-1af9b0cc3bef_4000x2250.png 848w, https://substackcdn.com/image/fetch/$s_!H0xd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb053e25f-b7a5-40ca-a80d-1af9b0cc3bef_4000x2250.png 1272w, https://substackcdn.com/image/fetch/$s_!H0xd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb053e25f-b7a5-40ca-a80d-1af9b0cc3bef_4000x2250.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!H0xd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb053e25f-b7a5-40ca-a80d-1af9b0cc3bef_4000x2250.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b053e25f-b7a5-40ca-a80d-1af9b0cc3bef_4000x2250.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:520994,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/192649637?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb053e25f-b7a5-40ca-a80d-1af9b0cc3bef_4000x2250.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!H0xd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb053e25f-b7a5-40ca-a80d-1af9b0cc3bef_4000x2250.png 424w, https://substackcdn.com/image/fetch/$s_!H0xd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb053e25f-b7a5-40ca-a80d-1af9b0cc3bef_4000x2250.png 848w, https://substackcdn.com/image/fetch/$s_!H0xd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb053e25f-b7a5-40ca-a80d-1af9b0cc3bef_4000x2250.png 1272w, https://substackcdn.com/image/fetch/$s_!H0xd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb053e25f-b7a5-40ca-a80d-1af9b0cc3bef_4000x2250.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>&#9312; $4.44M: The Wrong Number from the Wrong Companies Measuring the Wrong Thing</h2><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!emjn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b8d82c-713c-4211-a739-c695c899f9be_838x357.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!emjn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b8d82c-713c-4211-a739-c695c899f9be_838x357.png 424w, https://substackcdn.com/image/fetch/$s_!emjn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b8d82c-713c-4211-a739-c695c899f9be_838x357.png 848w, https://substackcdn.com/image/fetch/$s_!emjn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b8d82c-713c-4211-a739-c695c899f9be_838x357.png 1272w, https://substackcdn.com/image/fetch/$s_!emjn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b8d82c-713c-4211-a739-c695c899f9be_838x357.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!emjn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b8d82c-713c-4211-a739-c695c899f9be_838x357.png" width="500" height="213.0071599045346" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/90b8d82c-713c-4211-a739-c695c899f9be_838x357.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:357,&quot;width&quot;:838,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:25688,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/192649637?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b8d82c-713c-4211-a739-c695c899f9be_838x357.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!emjn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b8d82c-713c-4211-a739-c695c899f9be_838x357.png 424w, https://substackcdn.com/image/fetch/$s_!emjn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b8d82c-713c-4211-a739-c695c899f9be_838x357.png 848w, https://substackcdn.com/image/fetch/$s_!emjn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b8d82c-713c-4211-a739-c695c899f9be_838x357.png 1272w, https://substackcdn.com/image/fetch/$s_!emjn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90b8d82c-713c-4211-a739-c695c899f9be_838x357.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>I have seen this figure used two ways, and both are wrong.</p><ol><li><p>Using it as a proxy for your projected breach cost: &#8220;if we have a breach, it will cost us $4.44M on average.&#8221;</p></li><li><p>Taking the per-record figure from the same report and multiplying it by the number of records at your organization to produce a &#8220;personalized&#8221; breach cost estimate. The report&#8217;s own FAQ section explicitly states that the per-record cost cannot be used this way, because the study only covers breaches up to 113,620 records, but people still do it. All the time. (Who reads the fine print, anyway?)</p></li></ol><p>Neither approach is defensible, and you should not use Ponemon figures for either purpose. The methodological problems with this report could fill an entire issue (and I will probably do that at some point), but here are the three that matter most:</p><ul><li><p><strong>The sample is non-scientific.</strong> The report surveys 600 organizations that experienced a breach, selected in a way that is, by the report&#8217;s own admission, &#8220;biased toward organizations with more mature privacy or information security programs.&#8221; Your organization may look nothing like that population, and because the sample is non-scientific, the results cannot be extrapolated to your organization.</p></li><li><p><strong>The cost data is estimated, not measured.</strong> Ponemon asks individuals to estimate their breach costs after the fact using activity-based extrapolation, and the report acknowledges this may introduce bias and inaccuracies. A survey is not the right instrument for gathering this kind of data.</p></li><li><p><strong>The headline figure conceals enormous variance.</strong> The US average in 2025 was $10.22M. Healthcare averaged $7.42M. Retail averaged $3.54M. Public sector averaged $2.86M. A single global average summarizing those figures tells you almost nothing useful about any of them, and averaging a distribution this wide is a flaw of averages in its own right.</p></li></ul><p><strong>For next time:</strong> If you need a benchmark figure, the Cyentia Institute&#8217;s IRIS 2025 report is built on more than 150,000 real cyber incidents spanning fifteen years of empirical loss data, segmented by sector and organization size. Unlike Ponemon, it is not survey-based. You can get a credible, defensible range calibrated to your revenue band and sector. Disclaimer: I am a Fellow at the Cyentia Institute, but I was advocating for this data long before that relationship existed.</p><div><hr></div><h2>&#9313; &#8220;Medium&#8221;: A Label That Cannot Be Computed</h2><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kF0r!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb108bf77-3d03-4462-a474-62accafd1b3a_838x357.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kF0r!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb108bf77-3d03-4462-a474-62accafd1b3a_838x357.png 424w, https://substackcdn.com/image/fetch/$s_!kF0r!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb108bf77-3d03-4462-a474-62accafd1b3a_838x357.png 848w, https://substackcdn.com/image/fetch/$s_!kF0r!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb108bf77-3d03-4462-a474-62accafd1b3a_838x357.png 1272w, https://substackcdn.com/image/fetch/$s_!kF0r!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb108bf77-3d03-4462-a474-62accafd1b3a_838x357.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kF0r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb108bf77-3d03-4462-a474-62accafd1b3a_838x357.png" width="500" height="213.0071599045346" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b108bf77-3d03-4462-a474-62accafd1b3a_838x357.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:357,&quot;width&quot;:838,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:27501,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/192649637?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb108bf77-3d03-4462-a474-62accafd1b3a_838x357.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kF0r!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb108bf77-3d03-4462-a474-62accafd1b3a_838x357.png 424w, https://substackcdn.com/image/fetch/$s_!kF0r!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb108bf77-3d03-4462-a474-62accafd1b3a_838x357.png 848w, https://substackcdn.com/image/fetch/$s_!kF0r!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb108bf77-3d03-4462-a474-62accafd1b3a_838x357.png 1272w, https://substackcdn.com/image/fetch/$s_!kF0r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb108bf77-3d03-4462-a474-62accafd1b3a_838x357.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Think about ten hot sauces lined up on a table, ranging from almost ketchup to face-melting. You could rank them from mildest to hottest. What you could not do is average them into a single meaningful spiciness score, because the distance between each level is undefined. The gap between a Tabasco and a habanero is not the same as the gap between a habanero and a Carolina Reaper, and no amount of arithmetic on your ranking will tell you that.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4jn4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63a9bc18-b0a9-4c5a-877b-29a4c0369098_998x630.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4jn4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63a9bc18-b0a9-4c5a-877b-29a4c0369098_998x630.png 424w, https://substackcdn.com/image/fetch/$s_!4jn4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63a9bc18-b0a9-4c5a-877b-29a4c0369098_998x630.png 848w, https://substackcdn.com/image/fetch/$s_!4jn4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63a9bc18-b0a9-4c5a-877b-29a4c0369098_998x630.png 1272w, https://substackcdn.com/image/fetch/$s_!4jn4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63a9bc18-b0a9-4c5a-877b-29a4c0369098_998x630.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4jn4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63a9bc18-b0a9-4c5a-877b-29a4c0369098_998x630.png" width="550" height="347.1943887775551" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/63a9bc18-b0a9-4c5a-877b-29a4c0369098_998x630.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:630,&quot;width&quot;:998,&quot;resizeWidth&quot;:550,&quot;bytes&quot;:324122,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/192649637?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63a9bc18-b0a9-4c5a-877b-29a4c0369098_998x630.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4jn4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63a9bc18-b0a9-4c5a-877b-29a4c0369098_998x630.png 424w, https://substackcdn.com/image/fetch/$s_!4jn4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63a9bc18-b0a9-4c5a-877b-29a4c0369098_998x630.png 848w, https://substackcdn.com/image/fetch/$s_!4jn4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63a9bc18-b0a9-4c5a-877b-29a4c0369098_998x630.png 1272w, https://substackcdn.com/image/fetch/$s_!4jn4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F63a9bc18-b0a9-4c5a-877b-29a4c0369098_998x630.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Hot sauce, like any other ordinal scale, can be ranked but not averaged</figcaption></figure></div><p>This is exactly what happens when you take a portfolio of risks rated High, Medium, and Low and collapse them into a single aggregate rating. The &#8220;Overall Risk Rating: Medium&#8221; on this dashboard is not a measurement of <em>anything</em>. It is an artifact of an operation that <em>should not have been performed</em>. Ordinal scales encode rank order only, saying nothing about the distance between levels. You can sort them, but you cannot add them, average them, or combine them into a summary figure.</p><p>Then there is the label itself. Consider what a leader is supposed to do with the word Medium. There is no defined threshold, no probability, no magnitude, and no financial unit attached to it. Someone decided this was Medium rather than High or Low, and that decision implies a process, but the process almost always involves additional undefined terms: likelihood judged on a five-point scale, impact estimated against vague categories. Undefined inputs produce undefined outputs, and the label that emerges carries the weight of a decision without the substance of one.</p><p>The sub-label reads &#8220;Unchanged from Q4.&#8221; The absence of change is being presented as a finding worth reporting.</p><p><strong>For next time:</strong> A label that connects to a decision tells a different story. &#8220;There is a 35% probability of a loss event exceeding our $5M retention threshold in the next 12 months&#8221; is a statement that means something. It tells you whether to buy more insurance, change your controls, or accept the exposure, and it gives leadership an actual basis for a conversation.</p><p>Borrowing from finance, a quantitative approach also opens the door to a genuine portfolio view of risk, one where the results of individual scenario analyses can be legitimately aggregated, because you are working with probabilities and loss ranges rather than ordinal labels. The math is valid in a way that averaging Highs and Mediums simply is not. That said, I do not personally recommend collapsing a risk portfolio into a single aggregate number either, for reasons I covered in a <a href="https://newsletter.heatmapstohistograms.com/i/175215165/reader-question-via-linkedin">reader question</a> a few issues back. The portfolio view is most useful when you can see the individual scenarios and their relative contributions, not when they disappear into another composite score.</p><div><hr></div><h2>&#9314; 37 Open Risk Items: You Cannot Close the Future</h2><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CqV2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7b8aee7-afe4-43ce-9d0e-dc1cffdbc655_811x293.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CqV2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7b8aee7-afe4-43ce-9d0e-dc1cffdbc655_811x293.png 424w, https://substackcdn.com/image/fetch/$s_!CqV2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7b8aee7-afe4-43ce-9d0e-dc1cffdbc655_811x293.png 848w, https://substackcdn.com/image/fetch/$s_!CqV2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7b8aee7-afe4-43ce-9d0e-dc1cffdbc655_811x293.png 1272w, https://substackcdn.com/image/fetch/$s_!CqV2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7b8aee7-afe4-43ce-9d0e-dc1cffdbc655_811x293.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CqV2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7b8aee7-afe4-43ce-9d0e-dc1cffdbc655_811x293.png" width="501" height="181.00246609124537" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a7b8aee7-afe4-43ce-9d0e-dc1cffdbc655_811x293.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:293,&quot;width&quot;:811,&quot;resizeWidth&quot;:501,&quot;bytes&quot;:17734,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/192649637?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7b8aee7-afe4-43ce-9d0e-dc1cffdbc655_811x293.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CqV2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7b8aee7-afe4-43ce-9d0e-dc1cffdbc655_811x293.png 424w, https://substackcdn.com/image/fetch/$s_!CqV2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7b8aee7-afe4-43ce-9d0e-dc1cffdbc655_811x293.png 848w, https://substackcdn.com/image/fetch/$s_!CqV2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7b8aee7-afe4-43ce-9d0e-dc1cffdbc655_811x293.png 1272w, https://substackcdn.com/image/fetch/$s_!CqV2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7b8aee7-afe4-43ce-9d0e-dc1cffdbc655_811x293.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Of everything on this dashboard, this one may be the hardest to let go of, even for practitioners who have been doing quantitative risk analysis for years. The open/close model is not a simple rookie mistake. It is a way of thinking that runs through incident response and almost every other operational process in security. It also feels <em>good</em>; it feels productive in a way that probabilistic thinking sometimes does not, because closing a ticket is a visible act of completion.</p><p>The problem is that it rests on a logical error. <strong>A risk is not a task</strong>. <strong>It is a statement about the future</strong>: given what we know about our environment, our controls, and the threat landscape, there is some probability that a loss event will occur. You cannot fix that and close it. You can change your controls, accept the exposure, transfer it to an insurer, or decide the scenario is outside your scope, but none of those actions make the future go away. The probability changes. The scenario does not disappear from the register because someone marked it resolved.</p><p>When a risk register behaves like a ticketing system, the incentive follows: teams work to close items rather than to reduce exposure. A risk that gets closed without any corresponding change in the probability or magnitude of loss is a risk that got administered, not managed. The count goes down, the dashboard looks better, and the organization&#8217;s actual exposure is unchanged.</p><p>The 37 is not a measurement of risk. It is a count of tickets.</p><p><strong>For next time:</strong> A risk register entry should persist as long as the scenario is plausible, updated as the threat environment and your controls change. The number worth tracking is not how many items are open but whether the probability and expected loss for your top scenarios are moving in the right direction, and by how much.</p><div><hr></div><h2>&#9315; 84% Control Coverage: Coverage of What, Exactly?</h2><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8EhT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F894dc540-b1fe-46d0-877e-afc317fa171b_838x357.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8EhT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F894dc540-b1fe-46d0-877e-afc317fa171b_838x357.png 424w, https://substackcdn.com/image/fetch/$s_!8EhT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F894dc540-b1fe-46d0-877e-afc317fa171b_838x357.png 848w, https://substackcdn.com/image/fetch/$s_!8EhT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F894dc540-b1fe-46d0-877e-afc317fa171b_838x357.png 1272w, https://substackcdn.com/image/fetch/$s_!8EhT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F894dc540-b1fe-46d0-877e-afc317fa171b_838x357.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8EhT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F894dc540-b1fe-46d0-877e-afc317fa171b_838x357.png" width="496" height="211.30310262529832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/894dc540-b1fe-46d0-877e-afc317fa171b_838x357.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:357,&quot;width&quot;:838,&quot;resizeWidth&quot;:496,&quot;bytes&quot;:25273,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/192649637?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F894dc540-b1fe-46d0-877e-afc317fa171b_838x357.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8EhT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F894dc540-b1fe-46d0-877e-afc317fa171b_838x357.png 424w, https://substackcdn.com/image/fetch/$s_!8EhT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F894dc540-b1fe-46d0-877e-afc317fa171b_838x357.png 848w, https://substackcdn.com/image/fetch/$s_!8EhT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F894dc540-b1fe-46d0-877e-afc317fa171b_838x357.png 1272w, https://substackcdn.com/image/fetch/$s_!8EhT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F894dc540-b1fe-46d0-877e-afc317fa171b_838x357.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Coverage metrics are legitimate. Knowing whether a control is present is a valid input to vulnerability estimation, and FAIR practitioners use control presence as part of probabilistic risk analysis all the time. The interesting question is what coverage means when it is aggregated across a generic framework checklist and presented as a standalone indicator of risk posture.</p><p>At that level of abstraction, 84% cannot be converted to a probability, an expected loss, or a decision. The question it answers is &#8220;what percentage of framework line items are checked,&#8221; not &#8220;how much have we reduced the likelihood or magnitude of our top loss scenarios.&#8221; Those are different questions, and only the second one carries much weight in a board conversation.</p><p>A 16-point gap in a framework checklist could represent almost nothing, or it could represent the specific controls most relevant to your highest-consequence scenarios. The coverage percentage cannot tell you which, because it was never anchored to scenarios in the first place. Aggregate coverage against a checklist, with no scenario weighting, has no reliable relationship to scenario-specific loss reduction, and without that connection, the number has nowhere to go.</p><p><strong>For next time:</strong> Anchoring coverage to scenarios changes the conversation entirely. &#8220;Our ransomware scenario controls are 94% in place, reducing expected annual loss for that scenario from $8.4M to $5.1M. Closing the remaining gap to 99+% would cost $600K and reduce expected loss by a further $1.2M&#8221; is a coverage metric that connects directly to a decision about where to invest next. The percentage is still there, and now it means something.</p><div><hr></div><h2>&#9316; The Risk Matrix: A Math Crime Dressed in Traffic Light Colors</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!W8AB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c69328a-539d-4219-ab05-e87c1533de41_1095x792.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!W8AB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c69328a-539d-4219-ab05-e87c1533de41_1095x792.png 424w, https://substackcdn.com/image/fetch/$s_!W8AB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c69328a-539d-4219-ab05-e87c1533de41_1095x792.png 848w, https://substackcdn.com/image/fetch/$s_!W8AB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c69328a-539d-4219-ab05-e87c1533de41_1095x792.png 1272w, https://substackcdn.com/image/fetch/$s_!W8AB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c69328a-539d-4219-ab05-e87c1533de41_1095x792.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!W8AB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c69328a-539d-4219-ab05-e87c1533de41_1095x792.png" width="554" height="400.7013698630137" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7c69328a-539d-4219-ab05-e87c1533de41_1095x792.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:792,&quot;width&quot;:1095,&quot;resizeWidth&quot;:554,&quot;bytes&quot;:63235,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/192649637?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c69328a-539d-4219-ab05-e87c1533de41_1095x792.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!W8AB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c69328a-539d-4219-ab05-e87c1533de41_1095x792.png 424w, https://substackcdn.com/image/fetch/$s_!W8AB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c69328a-539d-4219-ab05-e87c1533de41_1095x792.png 848w, https://substackcdn.com/image/fetch/$s_!W8AB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c69328a-539d-4219-ab05-e87c1533de41_1095x792.png 1272w, https://substackcdn.com/image/fetch/$s_!W8AB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c69328a-539d-4219-ab05-e87c1533de41_1095x792.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Look at this chart for a moment before reading anything else. It has a grid, coordinates, color-coded zones, and named threats plotted at specific positions. It looks <em>exactly</em> like something that was calculated. That appearance is the problem.</p><p>The risk matrix is the most visually convincing measurement instrument in security that doesn't measure anything, and there is a substantial body of research to back that up. A good summary of that literature can be found in Hubbard&#8217;s <em><a href="https://www.amazon.com/Failure-Risk-Management-Why-Broken-dp-111952203X">The Failure of Risk Management</a></em>, but the three core problems are worth unpacking here because they are not obvious from looking at the chart.</p><ol><li><p><strong>The ordinal scale problem.</strong> You already know this one from the hot sauce problem above. Likelihood and Impact in a risk matrix are ordinal scales: they encode rank order only, saying nothing about the distance between levels. &#8220;Likely&#8221; is ranked above &#8220;Possible,&#8221; but by how much? Nobody knows, because the scale does not define it. You could relabel the five likelihood levels as 1, 7, 103, 500, and 8,000,000 and the ranking would be identical, but the positions on the grid would be wildly different. Any arithmetic that combines those levels is operating from faulty logic, and the grid coordinates that result are meaningless as a consequence.</p></li><li><p><strong>Range compression.</strong> A 5x5 matrix has 25 cells, which means every risk your organization faces gets forced into one of 25 buckets. A 3x3 grid obviously has even fewer buckets. A scenario with a 15% probability of occurring lands in the same cell as one with a 24% probability. A loss of $800K looks identical to a loss of $4M if they share a cell. The matrix not only fails to capture that variance; it actively hides it, which means the decisions made from it are based on less information than the underlying analysis contains.</p></li><li><p><strong>False precision.</strong> This is the one that makes the other two worse. Because the matrix produces a position, a color, and a label, it creates the appearance of a calculated result. The grid implies that something was measured and plotted. The colored zones imply that the boundaries between them were defined. None of that is true, and the visual language of the chart makes it harder to notice, not easier.</p></li></ol><p><strong>For next time:</strong> Probability and loss ranges per scenario give you something the matrix cannot. &#8220;Ransomware: 60% probability, $2M to $9M expected loss range&#8221; is a single row of a table. It is less dramatic than a 5x5 grid and considerably more useful, because it is a format that connects directly to a decision.</p><h2>&#9317; 37% Reduction in Cyber Risk: A Semi-Attached Figure</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jTdq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75883626-17ab-44f4-a79d-508c081a047d_1100x792.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jTdq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75883626-17ab-44f4-a79d-508c081a047d_1100x792.png 424w, https://substackcdn.com/image/fetch/$s_!jTdq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75883626-17ab-44f4-a79d-508c081a047d_1100x792.png 848w, https://substackcdn.com/image/fetch/$s_!jTdq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75883626-17ab-44f4-a79d-508c081a047d_1100x792.png 1272w, https://substackcdn.com/image/fetch/$s_!jTdq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75883626-17ab-44f4-a79d-508c081a047d_1100x792.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jTdq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75883626-17ab-44f4-a79d-508c081a047d_1100x792.png" width="500" height="360" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/75883626-17ab-44f4-a79d-508c081a047d_1100x792.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:792,&quot;width&quot;:1100,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:49660,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/192649637?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75883626-17ab-44f4-a79d-508c081a047d_1100x792.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jTdq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75883626-17ab-44f4-a79d-508c081a047d_1100x792.png 424w, https://substackcdn.com/image/fetch/$s_!jTdq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75883626-17ab-44f4-a79d-508c081a047d_1100x792.png 848w, https://substackcdn.com/image/fetch/$s_!jTdq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75883626-17ab-44f4-a79d-508c081a047d_1100x792.png 1272w, https://substackcdn.com/image/fetch/$s_!jTdq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75883626-17ab-44f4-a79d-508c081a047d_1100x792.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>You finish a long run, step on the scale, and you are down three pounds. The number is real and it went in the right direction, but it is measuring sweat and fluid loss, not fat. <strong>You did not get three pounds leaner.</strong> The scale measured something real, just not the thing you wanted to know.</p><p>Darrell Huff called this the <strong>semi-attached figure</strong> in the classic book <em><a href="https://www.amazon.com/How-Lie-Statistics-Darrell-Huff/dp/0393310728">How to Lie with Statistics</a></em>, and the 37% reduction on this dashboard is a textbook example. The bar chart shows a reduction in &#8220;Risk Score.&#8221; Risk Score is a composite of weighted indicators whose components and weights are not defined anywhere on the dashboard. The reduction of 37% tells you that a number went down, derived from other numbers, combined in a way that is not disclosed. Before you can measure a reduction in X, you need to define what X is, and &#8220;cyber risk&#8221; as expressed by an undisclosed composite is not a defined construct. The 37% is not a measurement of risk reduction; it is a measurement of a score that was named after something. The further you trace the number back, the further you get from the thing you want to know, which is whether the organization is less likely to suffer a material loss than it was a year ago.</p><p>&#8220;On Track&#8221; sits in a badge in the corner. Toward what, though? There is no target state anywhere on the dashboard, no defined destination, and no criterion for what &#8220;arrived&#8221; would look like. The chart is reporting progress toward a place it has never described.</p><p><strong>For next time:</strong> Define the target in real units first. &#8220;We aimed to reduce the probability of a loss exceeding $5M from 40% to 25% and are currently at 31%&#8221; is a bar chart that works well here because it <strong>attaches the figure to the thing you are trying to manage</strong>.</p><div><hr></div><h2>&#9318; 72/100 Cyber Resilience Score: Goodhart&#8217;s Law in a Speedometer</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ff4o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F570ada0d-1b69-49c2-8bdf-89c7926f7d4f_1045x724.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ff4o!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F570ada0d-1b69-49c2-8bdf-89c7926f7d4f_1045x724.png 424w, https://substackcdn.com/image/fetch/$s_!ff4o!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F570ada0d-1b69-49c2-8bdf-89c7926f7d4f_1045x724.png 848w, https://substackcdn.com/image/fetch/$s_!ff4o!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F570ada0d-1b69-49c2-8bdf-89c7926f7d4f_1045x724.png 1272w, https://substackcdn.com/image/fetch/$s_!ff4o!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F570ada0d-1b69-49c2-8bdf-89c7926f7d4f_1045x724.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ff4o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F570ada0d-1b69-49c2-8bdf-89c7926f7d4f_1045x724.png" width="500" height="346.41148325358853" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/570ada0d-1b69-49c2-8bdf-89c7926f7d4f_1045x724.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:724,&quot;width&quot;:1045,&quot;resizeWidth&quot;:500,&quot;bytes&quot;:54320,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/192649637?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F570ada0d-1b69-49c2-8bdf-89c7926f7d4f_1045x724.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ff4o!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F570ada0d-1b69-49c2-8bdf-89c7926f7d4f_1045x724.png 424w, https://substackcdn.com/image/fetch/$s_!ff4o!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F570ada0d-1b69-49c2-8bdf-89c7926f7d4f_1045x724.png 848w, https://substackcdn.com/image/fetch/$s_!ff4o!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F570ada0d-1b69-49c2-8bdf-89c7926f7d4f_1045x724.png 1272w, https://substackcdn.com/image/fetch/$s_!ff4o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F570ada0d-1b69-49c2-8bdf-89c7926f7d4f_1045x724.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There is a principle in economics called <a href="https://en.wikipedia.org/wiki/Goodhart%27s_law">Goodhart&#8217;s Law</a>: <strong>when a measure becomes a target, it ceases to be a good measure</strong>. When organizations find ways to move the number they are being measured on, the connection between that number and the underlying reality it was meant to represent loosens.</p><p>A cyber resilience score on a board dashboard is close to an ideal Goodhart trap. It is visible, it is tracked quarter over quarter, and it is labeled <strong>Good</strong> or <strong>Needs Improvement</strong> in terms that make optimization feel like progress. A score that can be influenced by checking off controls or shifting which inputs get counted, without any corresponding reduction in the actual probability or magnitude of loss, will reliably go in the right direction while telling you nothing about whether the organization has become more resilient in any meaningful sense.</p><p>The speedometer graphic makes this worse. The gauge is borrowed from physical systems like fuel levels and engine temperature, where the underlying measurement is real, continuous, and directly connected to what the needle is showing. Resilience has none of those properties, and the visual language of the gauge implies a precision and directness that the composite index behind it cannot deliver.</p><p>Underneath all of this is a measurement problem that the design problem obscures. When you aggregate heterogeneous indicators into a single number, you lose the information that would tell you how to act. For example, if your temperature, your blood pressure, and your white cell count are each concerning, a composite health score of 68 does not tell you whether to take aspirin, call a cardiologist, or start antibiotics. The more interesting question is what decision changes if this score is 68 instead of 72. That question has no answer, because the score was never meant to have one. It was designed to communicate that things are being monitored, which is a different purpose and a lower bar.</p><p><strong>For next time:</strong> The metrics that compose a score are almost always more useful than the score itself. &#8220;Ransomware scenario: 60% probability, $3.2M expected annual loss. Closing the top three control gaps would reduce expected loss to $1.8M.&#8221; Three numbers, each in a unit that means something, each connected to a decision. That is what disaggregation looks like on a board slide.</p><div><hr></div><h2>&#9319; The 3D Pie Chart: An Optical Illusion with a Data Problem</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!g7EQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139f6b33-82a7-4cf0-9900-68a77bd1a8a5_1177x572.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g7EQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139f6b33-82a7-4cf0-9900-68a77bd1a8a5_1177x572.png 424w, https://substackcdn.com/image/fetch/$s_!g7EQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139f6b33-82a7-4cf0-9900-68a77bd1a8a5_1177x572.png 848w, https://substackcdn.com/image/fetch/$s_!g7EQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139f6b33-82a7-4cf0-9900-68a77bd1a8a5_1177x572.png 1272w, https://substackcdn.com/image/fetch/$s_!g7EQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139f6b33-82a7-4cf0-9900-68a77bd1a8a5_1177x572.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g7EQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139f6b33-82a7-4cf0-9900-68a77bd1a8a5_1177x572.png" width="634" height="308.1121495327103" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/139f6b33-82a7-4cf0-9900-68a77bd1a8a5_1177x572.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:572,&quot;width&quot;:1177,&quot;resizeWidth&quot;:634,&quot;bytes&quot;:116318,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/192649637?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139f6b33-82a7-4cf0-9900-68a77bd1a8a5_1177x572.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!g7EQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139f6b33-82a7-4cf0-9900-68a77bd1a8a5_1177x572.png 424w, https://substackcdn.com/image/fetch/$s_!g7EQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139f6b33-82a7-4cf0-9900-68a77bd1a8a5_1177x572.png 848w, https://substackcdn.com/image/fetch/$s_!g7EQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139f6b33-82a7-4cf0-9900-68a77bd1a8a5_1177x572.png 1272w, https://substackcdn.com/image/fetch/$s_!g7EQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F139f6b33-82a7-4cf0-9900-68a77bd1a8a5_1177x572.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Phishing accounts for 28% of the data. Now look at how much of the chart it appears to occupy at the front of that tilted disk. It occupies more space than Ransomware, which is 34%.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bhwM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87e1de15-af01-43b6-a840-e20f0cb1fc19_512x377.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bhwM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87e1de15-af01-43b6-a840-e20f0cb1fc19_512x377.jpeg 424w, https://substackcdn.com/image/fetch/$s_!bhwM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87e1de15-af01-43b6-a840-e20f0cb1fc19_512x377.jpeg 848w, https://substackcdn.com/image/fetch/$s_!bhwM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87e1de15-af01-43b6-a840-e20f0cb1fc19_512x377.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!bhwM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87e1de15-af01-43b6-a840-e20f0cb1fc19_512x377.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bhwM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87e1de15-af01-43b6-a840-e20f0cb1fc19_512x377.jpeg" width="512" height="377" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87e1de15-af01-43b6-a840-e20f0cb1fc19_512x377.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:377,&quot;width&quot;:512,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:16281,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/192649637?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87e1de15-af01-43b6-a840-e20f0cb1fc19_512x377.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bhwM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87e1de15-af01-43b6-a840-e20f0cb1fc19_512x377.jpeg 424w, https://substackcdn.com/image/fetch/$s_!bhwM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87e1de15-af01-43b6-a840-e20f0cb1fc19_512x377.jpeg 848w, https://substackcdn.com/image/fetch/$s_!bhwM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87e1de15-af01-43b6-a840-e20f0cb1fc19_512x377.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!bhwM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87e1de15-af01-43b6-a840-e20f0cb1fc19_512x377.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">M&#252;ller-Lyer illusion</figcaption></figure></div><p>Before we get to the chart, look at the three lines above. They are identical in length. Your visual system insists otherwise, because it is responding to the arrow geometry rather than the actual measurement. This is the <a href="https://en.wikipedia.org/wiki/M%C3%BCller-Lyer_illusion">M&#252;ller-Lyer illusion</a>, and it is not a quirk or a trick that careful observers can avoid; it&#8217;s just how human vision works. The visual system applies depth cues automatically and universally, and almost always gets this wrong.</p><p>The 3D pie chart exploits exactly the same mechanism. What you are seeing when you look at that Phishing slice is <a href="https://nightingaledvs.com/the-lie-factor-and-the-baseline-paradox/">Tufte&#8217;s Lie Factor</a> in action: the ratio of the size of the visual effect in a graphic to the size of the actual effect in the data. A Lie Factor of 1 means the graphic represents the data faithfully, and a Lie Factor greater than 1 means the graphic is exaggerating. The 3D pie chart structurally cannot achieve a Lie Factor of 1, because the perspective projection that creates the illusion of depth physically inflates front slices and compresses back slices independently of what the data says. Rotate it 180 degrees, and Phishing would appear to be much smaller, with the data unchanged and only the geometry different.</p><p>3D Pie charts persist because they are intuitive and available in every charting tool. Nobody ever got fired for using one (that I know of). However, intuitive and accurate are not the same thing, and this one is working against you.</p><p><strong>For next time:</strong> A horizontal bar chart lets the eye compare lengths along a common baseline, which is the one perceptual task humans perform with any reliability. The comparison is immediate and exact; the 3D pie requires you to estimate it through distorted geometry.</p><div><hr></div><h2> &#9320;  Risk Posture Over Time: Improving Relative to Nothing</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!521f!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa1bf9b5-3421-4ba5-8490-6b03ad969709_2025x517.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!521f!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa1bf9b5-3421-4ba5-8490-6b03ad969709_2025x517.png 424w, https://substackcdn.com/image/fetch/$s_!521f!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa1bf9b5-3421-4ba5-8490-6b03ad969709_2025x517.png 848w, https://substackcdn.com/image/fetch/$s_!521f!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa1bf9b5-3421-4ba5-8490-6b03ad969709_2025x517.png 1272w, https://substackcdn.com/image/fetch/$s_!521f!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa1bf9b5-3421-4ba5-8490-6b03ad969709_2025x517.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!521f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa1bf9b5-3421-4ba5-8490-6b03ad969709_2025x517.png" width="1456" height="372" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fa1bf9b5-3421-4ba5-8490-6b03ad969709_2025x517.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:372,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:59858,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/192649637?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa1bf9b5-3421-4ba5-8490-6b03ad969709_2025x517.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!521f!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa1bf9b5-3421-4ba5-8490-6b03ad969709_2025x517.png 424w, https://substackcdn.com/image/fetch/$s_!521f!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa1bf9b5-3421-4ba5-8490-6b03ad969709_2025x517.png 848w, https://substackcdn.com/image/fetch/$s_!521f!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa1bf9b5-3421-4ba5-8490-6b03ad969709_2025x517.png 1272w, https://substackcdn.com/image/fetch/$s_!521f!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa1bf9b5-3421-4ba5-8490-6b03ad969709_2025x517.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The trend line descends from 82 to 52 across eight quarters, the footnote reads &#8220;Composite score based on weighted risk indicators,&#8221; and the label over the chart reads &#8220;Improving.&#8221;</p><p>The word &#8220;Improving&#8221; is doing a lot of heavy lifting on this chart. The organization&#8217;s own prior score on an undefined composite index went down, but threat actors did not stand still during those eight quarters. Ransomware groups got new tools and techniques, supply chain attack surfaces expanded considerably, and AI-assisted phishing scaled to the point where generating a convincing attack email dropped from hours to minutes. A score that improves monotonically through eight quarters of a changing threat landscape may indicate that risk declined, maybe via reductions in frequency or magnitude, or both, or it may indicate that the measurement system is insensitive to the things that changed most. The trend line cannot distinguish between those two explanations, and neither can anyone reading this dashboard.</p><p><strong>For next time:</strong> Trending risk metrics against the total risk landscape, rather than just against themselves, adds the context that makes a trend line meaningful. If expected loss for a ransomware scenario declined from $8M to $5M while ransomware frequency in your sector increased, that context belongs on the same chart. A trend line without a reference point is a line going somewhere, and somewhere is not enough for a board conversation.</p><div><hr></div><h2>Happy April Fools</h2><p>Happy April 1st. Please do not use this dashboard.<br><br>If any of the nine callouts sparked something and you want to go deeper, these are some additional resources:</p><ul><li><p>Darrell Huff, <em><a href="https://www.amazon.com/How-Lie-Statistics-Darrell-Huff/dp/0393310728">How to Lie with Statistics</a></em> &#8212; short, funny, and still the best introduction to how numbers mislead</p></li><li><p>Douglas Hubbard, <em><a href="https://www.amazon.com/Failure-Risk-Management-Why-Broken-dp-111952203X">The Failure of Risk Management</a></em><a href="https://www.amazon.com/Failure-Risk-Management-Why-Broken-dp-111952203X"> </a>&#8212; the most thorough takedown of risk matrices and qualitative methods in print</p></li><li><p>Douglas Hubbard and Richard Seiersen, <em><a href="https://www.amazon.com/How-Measure-Anything-Cybersecurity-Risk-ebook/dp/B0C1RJ9SR1/">How to Measure Anything in Cybersecurity Risk</a></em> &#8212; the practical companion, written specifically for this field</p></li><li><p>Edward Tufte, <em><a href="https://www.amazon.com/Visual-Display-Quantitative-Information/dp/0961392142">The Visual Display of Quantitative Information</a></em> &#8212; everything you need to know about why some charts work and most don&#8217;t</p></li><li><p>I wrote an essay <a href="https://www.tonym-v.com/blog/2018/8/6/the-semi-attached-figure-how-to-spot-manipulative-security-advertising-claims">here</a> on the Semi-Attached Figure</p></li></ul><div><hr></div><h1><strong>&#9993;&#65039; Contact</strong></h1><p>Have a question about this, or anything else? Here&#8217;s how to reach me:</p><ul><li><p>Reply to this newsletter if reading via email</p></li><li><p>Comment below</p></li><li><p>Connect with me on <a href="https://www.linkedin.com/in/tonymartinvegue/">LinkedIn</a></p></li><li><p><a href="https://www.tonym-v.com/contact">Contact form</a></p></li></ul><h1><strong>&#127760; Elsewhere</strong></h1><p>I share shorter thoughts on risk, metrics, and decision-making on <a href="https://www.linkedin.com/in/tonymartinvegue/">LinkedIn</a>.</p><p>Book updates, chapter summaries, tools, and downloads are at <a href="https://www.heatmapstohistograms.com/">www.heatmapstohistograms.com</a></p><p>My longer-form essays and older writing live at <a href="https://www.tonym-v.com/">www.tonym-v.com</a></p><h1><strong>&#10084;&#65039; How You Can Help</strong></h1><p>&#9989; Tell me what topics you want covered: beginner, advanced, tools, AI use, anything &#9989; Forward this to a colleague who&#8217;s curious about CRQ<br>&#9989; Click the &#10084;&#65039; or comment if you found this useful</p><p>If someone forwarded this to you, please subscribe to get future issues.</p><p>Thanks for reading.</p><p>&#8212;Tony</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Issue 10: How to Read a Loss Exceedance Curve]]></title><description><![CDATA[How to read, present, and anchor the chart that makes risk quantification click]]></description><link>https://newsletter.heatmapstohistograms.com/p/issue-10-how-to-read-a-loss-exceedance</link><guid isPermaLink="false">https://newsletter.heatmapstohistograms.com/p/issue-10-how-to-read-a-loss-exceedance</guid><dc:creator><![CDATA[Tony Martin-Vegue]]></dc:creator><pubDate>Mon, 16 Mar 2026 16:04:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ZxW6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27436d41-5aae-434d-ba39-29b8e66e3579_621x336.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>Issue 10: How to Read a Loss Exceedance Curve</h1><p><em>A step-by-step guide to the chart that connects your analysis to executive decisions</em></p><p><strong>In This Issue:</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><ul><li><p><strong>&#128214; Book Update</strong></p></li><li><p><strong>&#127908; Upcoming Talks</strong></p></li><li><p><strong>&#128221; How to Read a Loss Exceedance Curve</strong></p></li><li><p><strong>&#10067; Reader Question</strong></p></li></ul><div><hr></div><h2>&#128214; Book Update</h2><p>The finish line is here. <em><a href="https://www.heatmapstohistograms.com/">From Heatmaps to Histograms</a></em> is in its final production stages and the release is imminent. I have several book signings planned that I&#8217;ll announce in future issues, so there will be plenty of opportunities to connect in person.</p><p>If you&#8217;ve been thinking about pre-ordering, this is your last window. Pre-orders matter more than most people realize: they signal demand to retailers, influence how the book gets promoted, and give the launch real momentum from day one.</p><p><strong>I also have a special offer for newsletter subscribers:</strong> if you pre-order and s<a href="https://www.heatmapstohistograms.com/contact">end me a note</a> with your mailing address, I&#8217;ll mail you a set of my CRQ stickers. International mailing addresses are perfectly fine.</p><p>&#128279; <a href="https://www.amazon.com/Heatmaps-Histograms-Practical-Guide-Quantification/dp/B0FX7V3J7D">Pre-order on Amazon</a> | &#128279; <a href="https://www.heatmapstohistograms.com/">Book website</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L_Xr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe27daceb-2dae-47a0-afcb-09be84d41f5b_3585x2667.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L_Xr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe27daceb-2dae-47a0-afcb-09be84d41f5b_3585x2667.jpeg 424w, https://substackcdn.com/image/fetch/$s_!L_Xr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe27daceb-2dae-47a0-afcb-09be84d41f5b_3585x2667.jpeg 848w, https://substackcdn.com/image/fetch/$s_!L_Xr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe27daceb-2dae-47a0-afcb-09be84d41f5b_3585x2667.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!L_Xr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe27daceb-2dae-47a0-afcb-09be84d41f5b_3585x2667.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L_Xr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe27daceb-2dae-47a0-afcb-09be84d41f5b_3585x2667.jpeg" width="488" height="362.9835164835165" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e27daceb-2dae-47a0-afcb-09be84d41f5b_3585x2667.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1083,&quot;width&quot;:1456,&quot;resizeWidth&quot;:488,&quot;bytes&quot;:2859825,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/188956891?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe27daceb-2dae-47a0-afcb-09be84d41f5b_3585x2667.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!L_Xr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe27daceb-2dae-47a0-afcb-09be84d41f5b_3585x2667.jpeg 424w, https://substackcdn.com/image/fetch/$s_!L_Xr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe27daceb-2dae-47a0-afcb-09be84d41f5b_3585x2667.jpeg 848w, https://substackcdn.com/image/fetch/$s_!L_Xr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe27daceb-2dae-47a0-afcb-09be84d41f5b_3585x2667.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!L_Xr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe27daceb-2dae-47a0-afcb-09be84d41f5b_3585x2667.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>&#127908; Upcoming Talks</h2><p><strong>March 24, 2026</strong> &#8212; &#8220;The Future of Cyber Risk Intelligence&#8221; FAIR Institute Seminar at RSAC 2026, San Francisco</p><p>I&#8217;m closing out the FAIR Institute&#8217;s seminar at RSA with a session on the shift from backward-looking risk reporting to forward-looking risk intelligence. The FAIR seminar is always one of the best events of RSA week, and I&#8217;d encourage anyone attending the conference to make time for it.</p><p>&#128279; <a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1768233548571001SpDJ">More info</a></p><p><strong>April 21, 2026</strong> &#8212; &#8220;Did We Solve the Data Problem? Judgment, Beliefs, and Risk in the AI Age&#8221; SIRAcon 2026 &#8212; Keynote</p><p>I&#8217;m keynoting SIRAcon this year with a talk on why the real bottleneck in risk quantification was never data, it was judgment, and why AI makes that distinction more important than ever. SIRAcon remains my favorite conference because it is model-neutral, vendor-neutral, and entirely dedicated to advancing risk practices.</p><p>&#128279; <a href="https://web.cvent.com/event/fec816af-1cb3-46b3-b0dc-1895493777be/summary">More info</a></p><div><hr></div><h2>&#128221; How to Read a Loss Exceedance Curve</h2><p>I&#8217;ve shown the same chart to hundreds of people across different fields. Finance teams nod and start asking questions about the tail. MBAs recognize it from business school, and engineers start interpreting it and reading their interpretation back to me before I finish explaining the axes. When I show the exact same chart to information security professionals, I usually get blank stares.</p><div class="pullquote"><p>MBAs recognize it from business school, and engineers start interpreting it and reading their interpretation back to me before I finish explaining the axes.</p></div><p>The chart is a loss exceedance curve, and I&#8217;d argue it&#8217;s one of the most important visualizations in cyber risk quantification. It&#8217;s also the one that confuses security people the most, which is a problem because it&#8217;s the chart that executives already think in. They&#8217;ve seen it in insurance models, in business forecasts, in scenario planning. They just haven&#8217;t seen it come from a security team.</p><p>This might reframe how you feel about this chart if it&#8217;s unfamiliar to you: <strong>it&#8217;s not new.</strong> The exceedance curve has been around for over a century. Hydrologists were using it to model flood risk long before anyone was quantifying cyber threats, plotting the probability that a river would exceed a given height in a given year. Insurance companies have relied on it for decades to price policies and set reserves. Weather forecasters, structural engineers, and financial analysts all use the same underlying concept. The x-axis represents a magnitude of something (water height, wind speed, financial loss) and the y-axis represents the probability of exceeding that magnitude.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZxW6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27436d41-5aae-434d-ba39-29b8e66e3579_621x336.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZxW6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27436d41-5aae-434d-ba39-29b8e66e3579_621x336.png 424w, https://substackcdn.com/image/fetch/$s_!ZxW6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27436d41-5aae-434d-ba39-29b8e66e3579_621x336.png 848w, https://substackcdn.com/image/fetch/$s_!ZxW6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27436d41-5aae-434d-ba39-29b8e66e3579_621x336.png 1272w, https://substackcdn.com/image/fetch/$s_!ZxW6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27436d41-5aae-434d-ba39-29b8e66e3579_621x336.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZxW6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27436d41-5aae-434d-ba39-29b8e66e3579_621x336.png" width="621" height="336" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/27436d41-5aae-434d-ba39-29b8e66e3579_621x336.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:336,&quot;width&quot;:621,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:232155,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/188956891?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27436d41-5aae-434d-ba39-29b8e66e3579_621x336.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZxW6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27436d41-5aae-434d-ba39-29b8e66e3579_621x336.png 424w, https://substackcdn.com/image/fetch/$s_!ZxW6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27436d41-5aae-434d-ba39-29b8e66e3579_621x336.png 848w, https://substackcdn.com/image/fetch/$s_!ZxW6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27436d41-5aae-434d-ba39-29b8e66e3579_621x336.png 1272w, https://substackcdn.com/image/fetch/$s_!ZxW6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27436d41-5aae-434d-ba39-29b8e66e3579_621x336.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Flood-frequency plot for the Pemigewasset River at Plymouth, New Hampshire, reproduced from Allen Hazen, <em>Flood Flows: A Study of Frequencies and Magnitudes</em>. Based on a 39-year record ending in 1924, the figure shows a clear early precursor to the modern flood exceedance curve.</figcaption></figure></div><p>Cyber risk quantification didn&#8217;t invent this visualization. It borrowed a proven tool from fields that have been reasoning about uncertainty far longer than information security has existed. <strong>If the chart feels foreign to you, that&#8217;s on us, not on the chart.</strong> Security has spent decades trapped in qualitative frameworks, heat maps and red-yellow-green dashboards, and we never learned how other disciplines communicate risk along the way.</p><p>This issue is my attempt to fix that, at least for this one chart. It&#8217;s not complicated. It just hasn&#8217;t been taught well to security practitioners.</p><h1>Start with the Shape: The Histogram</h1><p><strong>Before you can understand a loss exceedance curve, you need to know what it&#8217;s built from.</strong></p><p>When you run a quantitative risk assessment using a framework like FAIR, the engine underneath is a Monte Carlo simulation. You provide estimated ranges that define probability distributions for your inputs, and the simulation samples from those distributions across thousands of trials, sometimes 10,000, sometimes 50,000 or more. A frequency distribution might be centered between 1 and 4 times per year, and a loss magnitude distribution might span $50,000 to $500,000. Each trial represents one possible version of next year. Most simulated years are unremarkable, a few are catastrophic, and the spread between those outcomes is where the interesting information lives.</p><p>The first way to visualize those results is a histogram. It groups the simulated outcomes into bins and displays them as a bar chart. The x-axis shows loss amounts and the y-axis shows the percentage of simulations that landed in each range.</p><p>The histogram shows you the <strong>shape of risk</strong>: where most losses cluster, how wide the spread is, and whether there&#8217;s a long tail of expensive outcomes stretching to the right. A narrow peak means the losses are fairly predictable. A wide spread or a long tail means there&#8217;s real uncertainty about how bad things could get, and that uncertainty demands different planning than a tight distribution does.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BwVg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb4bb2a2-91d2-4970-8327-f5f5045fa650_2017x1117.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BwVg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb4bb2a2-91d2-4970-8327-f5f5045fa650_2017x1117.png 424w, https://substackcdn.com/image/fetch/$s_!BwVg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb4bb2a2-91d2-4970-8327-f5f5045fa650_2017x1117.png 848w, https://substackcdn.com/image/fetch/$s_!BwVg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb4bb2a2-91d2-4970-8327-f5f5045fa650_2017x1117.png 1272w, https://substackcdn.com/image/fetch/$s_!BwVg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb4bb2a2-91d2-4970-8327-f5f5045fa650_2017x1117.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BwVg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb4bb2a2-91d2-4970-8327-f5f5045fa650_2017x1117.png" width="1456" height="806" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fb4bb2a2-91d2-4970-8327-f5f5045fa650_2017x1117.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:806,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:60110,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/188956891?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb4bb2a2-91d2-4970-8327-f5f5045fa650_2017x1117.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BwVg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb4bb2a2-91d2-4970-8327-f5f5045fa650_2017x1117.png 424w, https://substackcdn.com/image/fetch/$s_!BwVg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb4bb2a2-91d2-4970-8327-f5f5045fa650_2017x1117.png 848w, https://substackcdn.com/image/fetch/$s_!BwVg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb4bb2a2-91d2-4970-8327-f5f5045fa650_2017x1117.png 1272w, https://substackcdn.com/image/fetch/$s_!BwVg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffb4bb2a2-91d2-4970-8327-f5f5045fa650_2017x1117.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Distribution of 10,000 simulated annual loss outcomes. Most losses cluster below $500,000, with a long tail of increasingly rare but severe outcomes stretching past $3 million.</figcaption></figure></div><p>The y-axis on a histogram shows the percentage of simulations that produced different loss amounts. It does not show the probability of an incident happening. Think of each bar as answering the question &#8220;if something bad happens, here&#8217;s how bad it&#8217;s likely to be.&#8221; The frequency of the event itself is already baked into the annual loss exposure calculation.</p><p>The histogram is useful, though it has a limitation: it doesn&#8217;t answer the question that executives ask most often, which is &#8220;what are the chances we lose more than $X?&#8221; For that, you need the loss exceedance curve.</p><h1>How a Loss Exceedance Curve Is Built</h1><p>The math behind a loss exceedance curve is simpler than most people expect. If you can sort a column of numbers and do basic division, you already know how this works.</p><p>Imagine your Monte Carlo simulation produced 50,000 results, and they&#8217;re sitting in a spreadsheet column, one per row. Each number represents the total annual loss from one simulated year. Some are zero, some are modest, and a few are enormous.</p><p>To build the curve, you conceptually sort those 50,000 results from smallest to largest. Then, for any dollar amount you want to examine, you count how many of the 50,000 results exceeded that amount and divide by 50,000. That gives you the exceedance probability for that dollar amount.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!D91_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2f6ad1-7234-4267-ad2f-63db1c11ab46_2873x1310.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!D91_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2f6ad1-7234-4267-ad2f-63db1c11ab46_2873x1310.png 424w, https://substackcdn.com/image/fetch/$s_!D91_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2f6ad1-7234-4267-ad2f-63db1c11ab46_2873x1310.png 848w, https://substackcdn.com/image/fetch/$s_!D91_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2f6ad1-7234-4267-ad2f-63db1c11ab46_2873x1310.png 1272w, https://substackcdn.com/image/fetch/$s_!D91_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2f6ad1-7234-4267-ad2f-63db1c11ab46_2873x1310.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!D91_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2f6ad1-7234-4267-ad2f-63db1c11ab46_2873x1310.png" width="1456" height="664" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8e2f6ad1-7234-4267-ad2f-63db1c11ab46_2873x1310.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:664,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:174685,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/188956891?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2f6ad1-7234-4267-ad2f-63db1c11ab46_2873x1310.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!D91_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2f6ad1-7234-4267-ad2f-63db1c11ab46_2873x1310.png 424w, https://substackcdn.com/image/fetch/$s_!D91_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2f6ad1-7234-4267-ad2f-63db1c11ab46_2873x1310.png 848w, https://substackcdn.com/image/fetch/$s_!D91_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2f6ad1-7234-4267-ad2f-63db1c11ab46_2873x1310.png 1272w, https://substackcdn.com/image/fetch/$s_!D91_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e2f6ad1-7234-4267-ad2f-63db1c11ab46_2873x1310.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Building a loss exceedance curve from simulation results. Sort the outcomes, count how many exceed your dollar threshold, and divide by the total number of simulations.</figcaption></figure></div><p>If 10,000 of your 50,000 results exceeded $2 million, the exceedance probability at $2 million is 10,000 divided by 50,000, which is 20%. If 2,500 results exceeded $5 million, the exceedance probability at $5 million is 5%. Plot every dollar amount against its exceedance probability, and you get the curve.</p><p>That&#8217;s the entire construction. Just &#8220;what fraction of my simulated outcomes were worse than this amount?&#8221; repeated across every dollar value on the x-axis. The curve slopes downward from left to right because fewer and fewer simulations produce extreme outcomes as you move toward higher loss amounts.</p><p>I often spend extra time on the construction with skeptics because people trust a chart more when they understand what&#8217;s underneath it. When you can explain to someone that the curve is built from 50,000 simulated scenarios and each point represents a simple fraction, you&#8217;re building trust in not only the chart, but the underlying methodology and process.</p><p><strong>One caveat: </strong>the curve will faithfully reflect whatever you feed it. If your input distributions are poorly reasoned or pulled from thin air, the LEC will produce a polished, confident-looking result that points you in the wrong direction. The visualization doesn&#8217;t validate the analysis; that&#8217;s something you still need to do.</p><p>I built an interactive tool for the book&#8217;s companion site that lets you run through this entire construction yourself, from setting inputs to watching the histogram transform into an exceedance curve. <a href="https://tonym-v.github.io/heatmapstohistograms/loss-exceedance-curve.html">Try it here.</a></p><h3>What the Loss Exceedance Curve Shows</h3><p>The histogram and the LEC are built from the same simulation data, though they answer different questions. The histogram answers &#8220;what does the spread of outcomes look like?&#8221; The LEC answers &#8220;what are the chances we lose more than a given amount?&#8221;</p><p>I call the LEC the <strong>&#8220;What Are the Chances?&#8221;</strong> chart because that&#8217;s the question it answers in every conversation where it matters. <em>What are the chances we lose more than $10 million? What are the chances losses exceed our insurance coverage? What are the chances this risk is bigger than the project we&#8217;re considering?</em> Every one of those questions maps to a single point on the curve.</p><div class="pullquote"><p>I call it the &#8220;What Are the Chances?&#8221; chart because that&#8217;s the question it answers in every conversation where it matters. </p></div><p>This is why executives respond to it immediately. They&#8217;re accustomed to reasoning in terms of exposure and probability because every other risk function in the organization already communicates this way. Finance, insurance, and operational risk all speak this language, and security has been the holdout, bringing heat maps to a conversation where everyone else brings probabilities. The LEC gets you a seat at that table.</p><h3>How to Read It: Three Steps</h3><p>Reading a loss exceedance curve takes three steps.</p><p>The y-axis shows probabilities, running from 0% at the bottom to 100% at the top. The x-axis shows dollar amounts, increasing from left to right. The curve itself shows the probability of losses exceeding any given dollar amount.</p><p><strong>Step 1.</strong> Find your dollar amount of interest on the x-axis. Let&#8217;s use $35 million as our example.</p><p><strong>Step 2.</strong> Move straight up from that point until you hit the curve.</p><p><strong>Step 3.</strong> Move horizontally to the left and read the probability on the y-axis. In this example, you&#8217;d land at approximately 20%.</p><p>That gives you: &#8220;There is a 20% chance that losses will exceed $35 million.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uNnh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26a63a6c-7da4-4094-876f-6777e6e8f72c_4000x2250.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uNnh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26a63a6c-7da4-4094-876f-6777e6e8f72c_4000x2250.png 424w, https://substackcdn.com/image/fetch/$s_!uNnh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26a63a6c-7da4-4094-876f-6777e6e8f72c_4000x2250.png 848w, https://substackcdn.com/image/fetch/$s_!uNnh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26a63a6c-7da4-4094-876f-6777e6e8f72c_4000x2250.png 1272w, https://substackcdn.com/image/fetch/$s_!uNnh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26a63a6c-7da4-4094-876f-6777e6e8f72c_4000x2250.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uNnh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26a63a6c-7da4-4094-876f-6777e6e8f72c_4000x2250.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/26a63a6c-7da4-4094-876f-6777e6e8f72c_4000x2250.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:519578,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/188956891?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26a63a6c-7da4-4094-876f-6777e6e8f72c_4000x2250.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uNnh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26a63a6c-7da4-4094-876f-6777e6e8f72c_4000x2250.png 424w, https://substackcdn.com/image/fetch/$s_!uNnh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26a63a6c-7da4-4094-876f-6777e6e8f72c_4000x2250.png 848w, https://substackcdn.com/image/fetch/$s_!uNnh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26a63a6c-7da4-4094-876f-6777e6e8f72c_4000x2250.png 1272w, https://substackcdn.com/image/fetch/$s_!uNnh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26a63a6c-7da4-4094-876f-6777e6e8f72c_4000x2250.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Reading a loss exceedance curve in three steps. Find your dollar amount on the x-axis, move up to the curve, then read the probability on the y-axis. The shaded region represents all outcomes where losses exceed $35 million.</em></figcaption></figure></div><p>If you look at the shaded area above and to the right of the $35 million mark, that region represents the 20% probability zone, all the outcomes where losses exceed $35 million. The larger the shaded area at any given point, the higher the probability of exceeding that loss amount. As you move further to the right toward larger losses, the shaded area shrinks because fewer and fewer simulated outcomes reach those extremes.</p><h3>The Y-Axis Trap</h3><p>Misunderstanding the Y-axis is the most common mistake I encounter when people are new to the LEC.</p><p><strong>The y-axis does not show how often incidents occur.</strong> <strong>It shows the probability that losses exceed a particular dollar amount.</strong> The simulation already accounts for how often events happen; that&#8217;s built into the annual loss exposure before the curve is ever drawn.</p><p>The confusion makes sense when you think about where security professionals come from. We&#8217;re trained to think in terms of &#8220;will an attack happen?&#8221; The LEC answers a different question: &#8220;if something bad happens, how bad could it get?&#8221; If you mix those two up, the y-axis will mislead you.</p><h3>Loss Exceedance Statements</h3><p>I always accompany a loss exceedance curve with written statements that serve as a voiceover for people who aren&#8217;t comfortable reading probability graphs.</p><p>The format goes something like this:</p><ul><li><p>&#8220;There is a 20% chance that losses will exceed $2 million.&#8221;</p></li><li><p>&#8220;We have a 50/50 chance of losses exceeding $500,000.&#8221;</p></li><li><p>&#8220;There is only a 5% chance we would see losses above $8 million.&#8221;</p></li></ul><p>Each statement is a single point on the curve translated into plain language. You pick the dollar amounts that matter to your audience, read the corresponding probabilities, and write the sentences.</p><p>Here&#8217;s the presentation technique that I&#8217;ve found lands well: start with the loss exceedance statements, <em>then</em> show the curve. When you lead with the narrative, you prime your audience so they know what to look for before the chart appears on screen. They understand what the axes mean, they&#8217;re oriented, and the visual confirms what they&#8217;ve already absorbed. I&#8217;ve been doing it this way for years, and the difference in how people engage is night and day compared to showing the chart cold and trying to explain it after the fact.</p><h3>Anchoring the Curve to Real Decisions</h3><p>You should not pick an arbitrary dollar amount to point out to audiences. Pick amounts that matter to your organization. I use five anchors regularly.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mtRO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b771ba3-73dc-4739-a736-df18150bed18_4000x2250.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mtRO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b771ba3-73dc-4739-a736-df18150bed18_4000x2250.png 424w, https://substackcdn.com/image/fetch/$s_!mtRO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b771ba3-73dc-4739-a736-df18150bed18_4000x2250.png 848w, https://substackcdn.com/image/fetch/$s_!mtRO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b771ba3-73dc-4739-a736-df18150bed18_4000x2250.png 1272w, https://substackcdn.com/image/fetch/$s_!mtRO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b771ba3-73dc-4739-a736-df18150bed18_4000x2250.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mtRO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b771ba3-73dc-4739-a736-df18150bed18_4000x2250.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6b771ba3-73dc-4739-a736-df18150bed18_4000x2250.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:467431,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/188956891?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b771ba3-73dc-4739-a736-df18150bed18_4000x2250.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mtRO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b771ba3-73dc-4739-a736-df18150bed18_4000x2250.png 424w, https://substackcdn.com/image/fetch/$s_!mtRO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b771ba3-73dc-4739-a736-df18150bed18_4000x2250.png 848w, https://substackcdn.com/image/fetch/$s_!mtRO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b771ba3-73dc-4739-a736-df18150bed18_4000x2250.png 1272w, https://substackcdn.com/image/fetch/$s_!mtRO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b771ba3-73dc-4739-a736-df18150bed18_4000x2250.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Anchoring the curve to a risk tolerance threshold. The shaded region represents a 30% chance of losses exceeding the organization's stated tolerance &#8212; exposure beyond what it's prepared to absorb.</figcaption></figure></div><p><strong>Risk tolerance.</strong> Ask your board or CFO what the maximum loss the organization can absorb before it threatens operations. Use that number as your primary anchor point on the curve. If there&#8217;s a 30% chance of exceeding your stated risk tolerance, that&#8217;s a conversation worth having.</p><p><strong>Cyber insurance limit.</strong> Losses beyond the policy limit are uninsured, and the organization bears the full impact. Plot your insurance limit on the curve and read the exceedance probability. Keep in mind that exclusions and sub-limits for things like ransomware or regulatory fines may reduce the effective coverage, so the real exposure might start earlier than the headline policy number suggests.</p><p><strong>Budget thresholds.</strong> Compare the curve to your contingency or emergency reserves. If there&#8217;s a 60% chance of exceeding those reserves, your planning needs attention regardless of what the risk appetite statement says.</p><p><strong>SEC materiality.</strong> For public companies, ask legal at what loss level disclosure would likely be required. There&#8217;s no fixed dollar rule since materiality depends on context, though establishing a working threshold makes the curve actionable for your compliance team.</p><p><strong>Project costs.</strong> Compare loss probabilities to the cost of proposed security investments. If there&#8217;s a 40% chance of losses exceeding the cost of a $3 million project, the investment starts to look justified in a way that a heat map could never communicate.</p><p>Once you start overlaying these thresholds on the curve, the conversation changes. You&#8217;re answering questions your stakeholders already have, using numbers they already care about, and in my experience that&#8217;s the moment the LEC earns its place in every presentation you give.</p><h3>Closing</h3><p>The loss exceedance curve isn&#8217;t exotic. Hydrologists, insurers, and financial analysts have relied on it for over a century because it answers the question that matters most when you&#8217;re making decisions under uncertainty: <em><strong>what are the chances things get worse than this?</strong></em></p><p>Cyber risk quantification adopted it for the same reason. If this chart is new to you, you&#8217;re in good company. Most security professionals never encountered it because our field spent decades in qualitative frameworks that didn&#8217;t require it. Once you learn to read it, the way your executives engage with your work will look very different.</p><p>&#128279; <a href="https://tonym-v.github.io/heatmapstohistograms/loss-exceedance-curve.html">Interactive tool: Build and read a Loss Exceedance Curve</a></p><div><hr></div><h2>&#10067; Reader Question</h2><p><em>&#8220;I&#8217;m a security analyst thinking about moving into risk quantification. Is it worth getting the FAIR certification, or should I just start doing the work?&#8221;</em></p><p>Both, but start with the work. The certification will make more sense after you&#8217;ve worked on a few real assessments, because the concepts stick differently when you&#8217;ve already felt the pain of scoping a scenario or arguing over a frequency estimate. If you study for the exam first with no practical context, it reads like theory. If you do two or three assessments first, even rough ones, the material reads like answers to questions you already have.</p><p>That said, the FAIR certification is worth pursuing. It gives you a shared vocabulary and understanding with other practitioners, it signals to hiring managers that you&#8217;re serious about the discipline, and the study process will tighten your understanding of the taxonomy in ways that doing the work alone won&#8217;t. It&#8217;s not expensive, and it&#8217;s not a months-long commitment.</p><p>The bigger career advice is this: build a portfolio of work product. Run an assessment, document it, present the results internally, and refine your approach based on the questions you get. Three completed assessments with clear write-ups will do more for your career trajectory than any credential on its own.</p><div><hr></div><h1>&#9993;&#65039; Contact</h1><p>Have a question about this, or anything else? Here&#8217;s how to reach me:</p><ul><li><p>Reply to this newsletter if reading via email</p></li><li><p>Comment below</p></li><li><p>Connect with me on <a href="https://www.linkedin.com/in/tonymartinvegue/">LinkedIn</a></p></li><li><p><a href="https://www.tonym-v.com/contact">Contact form</a></p></li></ul><h1>&#127760; Elsewhere</h1><p>I share shorter thoughts on risk, metrics, and decision-making on <a href="https://www.linkedin.com/in/tonymartinvegue/">LinkedIn</a>.</p><p>Book updates, chapter summaries, tools, and downloads are at <a href="https://www.heatmapstohistograms.com/">www.heatmapstohistograms.com</a></p><p>My longer-form essays and older writing live at <a href="https://www.tonym-v.com/">www.tonym-v.com</a></p><h1>&#10084;&#65039; How You Can Help</h1><p>&#9989; Tell me what topics you want covered: beginner, advanced, tools, AI use, anything &#9989; Forward this to a colleague who&#8217;s curious about CRQ <br>&#9989; Click the &#10084;&#65039; or comment if you found this useful</p><p>If someone forwarded this to you, please subscribe to get future issues.</p><p>Thanks for reading. </p><p>&#8212;Tony</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Issue 9: Accuracy, Precision and the Obscured Target]]></title><description><![CDATA[Why Measurement Quality Matters]]></description><link>https://newsletter.heatmapstohistograms.com/p/issue-9-accuracy-precision-and-the</link><guid isPermaLink="false">https://newsletter.heatmapstohistograms.com/p/issue-9-accuracy-precision-and-the</guid><dc:creator><![CDATA[Tony Martin-Vegue]]></dc:creator><pubDate>Mon, 23 Feb 2026 20:24:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!JPBv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ce49ab4-0beb-4dc8-b1f1-b9d0b68eda64_4000x2250.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1><strong>In This Issue:</strong></h1><ul><li><p><strong>&#128214; Book Update: A Forecast, Revised</strong></p></li><li><p><strong>&#127908; Upcoming Talks</strong></p></li><li><p><strong>&#128221; The Obscured Target: Why Measurement Quality Matters</strong></p></li><li><p><strong>&#10067; Reader Question</strong></p></li></ul><div><hr></div><h1><strong>&#128214; Book Update: A Forecast, Revised</strong></h1><p>The official Amazon release date for <em><a href="https://www.amazon.com/Heatmaps-Histograms-Practical-Guide-Quantification/dp/B0FX7V3J7D">From Heatmaps to Histograms</a></em><a href="https://www.amazon.com/Heatmaps-Histograms-Practical-Guide-Quantification/dp/B0FX7V3J7D"> </a>is April 29, though we&#8217;d been pushing hard to get it out by early-March in time for RSA. I had a book signing planned at the RSA bookstore and a few other events lined up around the conference.</p><p>I got word late last week that mid-March isn&#8217;t going to happen. I&#8217;ll be honest, I went through all five stages of grief on this one. Denial was particularly convincing for about 48 hours.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The good news is that we&#8217;re only talking a few weeks, not months. Early April is the current target, which means RSA attendees will just have to settle for my sparkling personality instead of a signed copy.</p><p>Those of you who have been reading since Issue 8 may remember that I said I was &#8220;90% confident&#8221; the book would land between March 4 and 13. This is a good teaching moment. A 90% forecast means I believed there was roughly a one-in-ten chance the real date would fall outside that range, and that&#8217;s what happened. The Bayesian mindset doesn&#8217;t treat that as a defeat. New information came in, I updated my belief, and the estimate moved accordingly. That's forecasting working the way it should. If you never land outside your forecast ranges, your ranges are probably too wide, and you&#8217;re not being honest about your uncertainty.</p><p>In other news, I redesigned the website at <a href="https://www.heatmapstohistograms.com">heatmapstohistograms.com</a> and added full chapter descriptions, so if you want to know what&#8217;s inside the book, check out the &#8220;<a href="https://www.heatmapstohistograms.com/inside-the-book">Inside the Book</a>&#8221; section. I also sent the manuscript to a number of people across the industry and received some incredibly generous feedback. Here are three of my favorites:</p><blockquote><p><em>From Heatmaps to Histograms is a significant contribution to our profession, and would be required reading for anyone in my organization if I was still a CISO. Brilliantly written for those with little or no background in quantitative risk measurement, it also will be very useful to those with years of experience. This is just further evidence that Tony is one of the leading contributors to the future of our profession.</em></p><p><strong>-Jack Jones, Creator of FAIR</strong></p></blockquote><blockquote><p><em>I&#8217;ve been measuring various aspects of cyber risk for over 20 years. In the early days, I saw the lack of reliable data as the primary roadblock to the broad adoption of quantitative approaches to managing risk. I&#8217;m still a strong proponent of better data, but I now view practicality as the chief impediment. A recurring &#8220;Yeah, but how?&#8221; dominates conversations on cyber risk quantification, but practical answers and examples remain scarce. That&#8217;s why I&#8217;m so excited about this book. Tony strikes the perfect balance of what you need to know and what you need to do to make CRQ work for you.&#8221;</em></p><p><strong>-Wade Baker, Ph.D., Partner, Cyentia Institute and Professor, Virginia Tech</strong></p></blockquote><blockquote><p><em>Tony Martin-Vegue makes a strong case for replacing certain popular risk assessment methods and he goes further with practical approaches needed to implement better methods. He adds multiple case examples and step-by-step procedures with the primary goal of making even more quantitative concepts accessible to every reader. I highly recommend his book.</em></p><p><strong>-Douglas Hubbard, author and measurement expert</strong></p></blockquote><p>I&#8217;m thrilled that they liked the book, and I&#8217;m grateful for the time they spent reading it.</p><p>&#128279; <a href="https://www.amazon.com/">Pre-order on Amazon</a> | &#128279; <a href="https://www.heatmapstohistograms.com/">Book website</a></p><div><hr></div><h1><strong>&#127908; Upcoming Talks</strong></h1><p>I have a few events planned:</p><p><strong>March 24, 2026 &#8220;The Future of Cyber Risk Intelligence&#8221; <a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1768233548571001SpDJ">FAIR Institute Seminar </a>at RSAC 2026, San Francisco</strong></p><p>I&#8217;m closing out the FAIR Institute&#8217;s seminar at RSA with a session on what boards and regulators will expect next from cyber risk programs. The talk covers the shift from backward-looking risk reporting to forward-looking risk intelligence, where AI fits (and doesn&#8217;t), and the skills that will define the next generation of risk analysts. The FAIR seminar at RSA is always one of the best events of the week, and I&#8217;d encourage anyone attending the conference to make time for it.</p><p>&#128279; <a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1768233548571001SpDJ">More info</a></p><p><strong>April 21, 2026 &#8220;Did We Solve the Data Problem? Judgment, Beliefs, and Risk in the AI Age&#8221; SIRAcon 2026 &#8212; Keynote</strong></p><p>I&#8217;m honored to be keynoting SIRAcon this year. My talk argues that we never had a data problem in risk quantification; we had a judgment problem wearing a data costume. Now that AI has made data abundant and cheap, the real bottleneck is fully exposed: judgment under uncertainty. The session develops three ideas: risk estimates are beliefs rather than truths, uncertainty is not a data gap AI can close, and data must earn the right to influence belief before it shapes decisions.</p><p>SIRAcon is my favorite conference because it is model-neutral, vendor-neutral, and entirely dedicated to advancing risk practices. I&#8217;d encourage anyone serious about the craft to attend.</p><p>&#128279; <a href="https://web.cvent.com/event/fec816af-1cb3-46b3-b0dc-1895493777be/summary">More info</a></p><div><hr></div><h1>&#128221; The Obscured Target</h1><p><em>Why Measurement Quality Matters</em></p><p>A few months ago, I asked an LLM to help me research breach frequency data for a risk assessment I was running. It gave a very convincing response: a specific industry, a specific incident type, a time range, and a precise frequency. I was <em>almost </em>persuaded by the exact number, the clean citations, and a reference to what appeared to be a Ponemon report I hadn&#8217;t seen before. The output had that satisfying feeling of precision.</p><p>Nonetheless, I did what I <strong>always</strong> tell people to do. I checked the sources.</p><p>The Ponemon report didn&#8217;t exist. It wasn&#8217;t a miscited year or a different title. The report was completely fabricated (a hallucination). In human parlance, we would call that a <em>lie</em>.</p><p>Here&#8217;s the disturbing thing: I am very well-versed in industry reports, especially data breach frequency. My spidey sense tingled, though I think for many other subjects I would have a hard time distinguishing a good output from a hallucination. My brain was ready to accept it and move on. If I&#8217;d been any less disciplined, those fake numbers would have gone straight into my model.</p><p>That experience sent me back to something I&#8217;d been teaching for years without fully appreciating its implications. AI introduces a new dimension into how we think about the accuracy and precision of our measurements.</p><h3>Accuracy and Precision: The Four Targets</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JPBv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ce49ab4-0beb-4dc8-b1f1-b9d0b68eda64_4000x2250.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JPBv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ce49ab4-0beb-4dc8-b1f1-b9d0b68eda64_4000x2250.png 424w, https://substackcdn.com/image/fetch/$s_!JPBv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ce49ab4-0beb-4dc8-b1f1-b9d0b68eda64_4000x2250.png 848w, https://substackcdn.com/image/fetch/$s_!JPBv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ce49ab4-0beb-4dc8-b1f1-b9d0b68eda64_4000x2250.png 1272w, https://substackcdn.com/image/fetch/$s_!JPBv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ce49ab4-0beb-4dc8-b1f1-b9d0b68eda64_4000x2250.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JPBv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ce49ab4-0beb-4dc8-b1f1-b9d0b68eda64_4000x2250.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5ce49ab4-0beb-4dc8-b1f1-b9d0b68eda64_4000x2250.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:480606,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/188087864?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ce49ab4-0beb-4dc8-b1f1-b9d0b68eda64_4000x2250.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JPBv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ce49ab4-0beb-4dc8-b1f1-b9d0b68eda64_4000x2250.png 424w, https://substackcdn.com/image/fetch/$s_!JPBv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ce49ab4-0beb-4dc8-b1f1-b9d0b68eda64_4000x2250.png 848w, https://substackcdn.com/image/fetch/$s_!JPBv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ce49ab4-0beb-4dc8-b1f1-b9d0b68eda64_4000x2250.png 1272w, https://substackcdn.com/image/fetch/$s_!JPBv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5ce49ab4-0beb-4dc8-b1f1-b9d0b68eda64_4000x2250.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If you&#8217;ve spent any time studying <a href="https://en.wikipedia.org/wiki/Metrology">metrology</a>, the science of measurement, or any field that draws from it, like decision science, risk quantification, and many others, you&#8217;ve probably seen the four targets.</p><p>It&#8217;s a teaching aid used to illustrate a foundational concept in measurement: accuracy and precision. The typical image shows four bullseyes, four shot patterns with each one illustrating a different combination of accuracy and precision. It&#8217;s one of those visuals that&#8217;s been around forever because it works so well, and you see it once and you get it.</p><p>As I mentioned earlier, this concept comes from metrology. Metrology is about how we know what we know when we measure things. <em>How do you know your scale is correct? How do you know your thermometer isn&#8217;t drifting? How do you know the number you&#8217;re looking at reflects reality?</em></p><p>These questions matter every time you make a decision based on a measurement. In cyber risk quantification, we&#8217;re making decisions based on continuous measurements, such as loss estimates, frequency ranges, and confidence intervals. It all depends on whether our measurement process is working. Keep in mind that risk quantification, including FAIR, is a forecast, and a forecast is a type of measurement.</p><p>I teach the concepts of accuracy and precision using the four-targets analogy whenever I teach FAIR. It&#8217;s one of the first concepts I cover because it reframes how people think about estimates. Most people walk in thinking the goal is to get the &#8220;right&#8221; number, and the four targets help them see that measurement quality is more nuanced than that.</p><p>Let me walk through them quickly, because you need all four to understand the fifth.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ouc2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9437f97e-2875-4e68-b59c-10072174142a_2222x545.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ouc2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9437f97e-2875-4e68-b59c-10072174142a_2222x545.png 424w, https://substackcdn.com/image/fetch/$s_!Ouc2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9437f97e-2875-4e68-b59c-10072174142a_2222x545.png 848w, https://substackcdn.com/image/fetch/$s_!Ouc2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9437f97e-2875-4e68-b59c-10072174142a_2222x545.png 1272w, https://substackcdn.com/image/fetch/$s_!Ouc2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9437f97e-2875-4e68-b59c-10072174142a_2222x545.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ouc2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9437f97e-2875-4e68-b59c-10072174142a_2222x545.png" width="728" height="178.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9437f97e-2875-4e68-b59c-10072174142a_2222x545.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:357,&quot;width&quot;:1456,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:99575,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/188087864?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9437f97e-2875-4e68-b59c-10072174142a_2222x545.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Ouc2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9437f97e-2875-4e68-b59c-10072174142a_2222x545.png 424w, https://substackcdn.com/image/fetch/$s_!Ouc2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9437f97e-2875-4e68-b59c-10072174142a_2222x545.png 848w, https://substackcdn.com/image/fetch/$s_!Ouc2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9437f97e-2875-4e68-b59c-10072174142a_2222x545.png 1272w, https://substackcdn.com/image/fetch/$s_!Ouc2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9437f97e-2875-4e68-b59c-10072174142a_2222x545.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><strong>Accurate and Precise.</strong> Tight grouping, dead center. This is the ideal. Your estimates cluster close together and they&#8217;re centered on the true value. In CRQ terms, your model is well-calibrated and your inputs are solid. If and when the results of forecasts are known, the forecasts land consistently where they should.</p><p>This can be expensive, though. Getting here requires good data, experienced analysts, validated models, and time. If you&#8217;re chasing this standard for every assessment, you&#8217;ll burn through resources fast. It&#8217;s like insisting on a gourmet meal when a solid sandwich would get you through the day just fine. Save the five-star treatment for the risks that justify the investment.</p><p><strong>Accurate and Imprecise.</strong> Scattered shots, centered on the target. Your estimates vary widely, though <em>on average</em> you&#8217;re in the right zone.</p><p>This is the sweet spot for early-stage analysis. You&#8217;re not nailing down exact numbers, you&#8217;re just figuring out if this risk matters. Does it change your decision if the loss is $2 million or $8 million when you&#8217;re comparing it to something that might cost $200 million? Probably not. Wide yet accurate ranges can drive good decisions, so don&#8217;t let the pursuit of precision slow you down when direction is what you need.</p><p><strong>Precise and Inaccurate.</strong> Tight grouping, off to the side. This is bias. Your estimates are consistent, consistently wrong. Maybe you&#8217;re anchoring on a vendor report, your SME has a blind spot, or your measurements have a structural flaw.</p><p>This one is dangerous because it feels like you&#8217;re doing well. The numbers look clean and cluster nicely, but you&#8217;re missing the target entirely, and I&#8217;ve seen this one in the wild many times: a team producing beautifully consistent assessments quarter after quarter, all anchored in the same flawed assumption no one questions. The precision gives you false confidence, and you might never go looking for the problem.</p><p><strong>Inaccurate and Imprecise.</strong> Scattered shots, nowhere near the center. You&#8217;re all over the place and not even close. Your measurement process is broken.</p><p>The irony is that this is also expensive. You&#8217;re spending time and effort producing numbers that mean nothing. You might as well not measure at all, or rather it&#8217;s worse than not measuring, because at least then you know you&#8217;re guessing. Here, you think you&#8217;re doing analysis.</p><h3>The Obscured Target</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8ehQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64e6500-a3cb-4681-9d84-35e14fb5d9bc_595x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8ehQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64e6500-a3cb-4681-9d84-35e14fb5d9bc_595x600.png 424w, https://substackcdn.com/image/fetch/$s_!8ehQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64e6500-a3cb-4681-9d84-35e14fb5d9bc_595x600.png 848w, https://substackcdn.com/image/fetch/$s_!8ehQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64e6500-a3cb-4681-9d84-35e14fb5d9bc_595x600.png 1272w, https://substackcdn.com/image/fetch/$s_!8ehQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64e6500-a3cb-4681-9d84-35e14fb5d9bc_595x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8ehQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64e6500-a3cb-4681-9d84-35e14fb5d9bc_595x600.png" width="381" height="384.20168067226894" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e64e6500-a3cb-4681-9d84-35e14fb5d9bc_595x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:595,&quot;resizeWidth&quot;:381,&quot;bytes&quot;:55684,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/188087864?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64e6500-a3cb-4681-9d84-35e14fb5d9bc_595x600.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8ehQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64e6500-a3cb-4681-9d84-35e14fb5d9bc_595x600.png 424w, https://substackcdn.com/image/fetch/$s_!8ehQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64e6500-a3cb-4681-9d84-35e14fb5d9bc_595x600.png 848w, https://substackcdn.com/image/fetch/$s_!8ehQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64e6500-a3cb-4681-9d84-35e14fb5d9bc_595x600.png 1272w, https://substackcdn.com/image/fetch/$s_!8ehQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe64e6500-a3cb-4681-9d84-35e14fb5d9bc_595x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>These four states cover most of what can go wrong with a measurement process. Bias, variance, systematic error, random noise: it all maps somewhere on this framework.</p><p>All four targets share one assumption, though: you can see where the shots landed.</p><p>You shoot. You walk up to the target. You look. The holes are there. Maybe they&#8217;re clustered, maybe they&#8217;re scattered, though you can verify the result against reality. You have access to ground truth.</p><p><strong>With AI as your measurement instrument, that assumption breaks down.</strong></p><p>When you ask an LLM to estimate breach frequency, pull loss data from a report, or synthesize threat intelligence, it gives you an answer, often a confident-sounding answer with citations. Unless you are disciplined enough to verify, you have no idea if those shots hit anything real.</p><p>This isn&#8217;t a precision problem. It&#8217;s not a bias problem. It&#8217;s something else entirely.</p><p>I call it the <em><strong>obscured target.</strong></em></p><p>Picture a tight grouping, dead center. It&#8217;s textbook accurate and precise, except the target is hidden behind fog. You can&#8217;t see where the shots landed. You&#8217;re trusting the instrument&#8217;s report of where it hit.</p><p>Here&#8217;s an example: imagine stepping on a scale that always reads 165 pounds. Every time you weigh yourself, you get a consistent number. It looks accurate, it looks precise. There&#8217;s a problem you don&#8217;t know about, though: the display is disconnected from the sensor. It&#8217;s just showing you a stored value. The number has the shape of a measurement and feels like a measurement, yet nothing is being weighed in reality. Day to day, as your weight fluctuates, the instrument is wrong. It doesn&#8217;t have a measurement problem you can fix, like bias you can correct or imprecision you can average out. It has something worse: no measurement is happening at all. That&#8217;s what happened to me with those fake Ponemon numbers. The output wasn&#8217;t inaccurate in the normal sense. It was invented.</p><h3>The &#8220;Obscured Target&#8221; Is a Validity Threat</h3><p>The four targets describe properties of a measurement system: accuracy, precision, and bias. These properties are diagnostic, meant to help you evaluate whether your instrument is working. Metrologists would tell us the correct response to AI hallucination is the same response you&#8217;d give to any suspect instrument: calibrate it. Check the output against known values. Validate. If it&#8217;s wrong, fix it or stop using it.</p><p>They would be right.</p><p>If you can&#8217;t verify the output directly, decompose the estimate into components you can verify. Don&#8217;t treat the LLM as an oracle. Treat it as one input and calibrate it against known reference data, the same way you&#8217;d calibrate any instrument. This is a calibration and decomposition problem, and measurement science has solved such problems for a long time.</p><p>The framework works; the question is whether practitioners know to apply it when the output looks this good.</p><p>The obscured target isn&#8217;t a new measurement quality quadrant. It&#8217;s a <a href="https://en.wikipedia.org/wiki/Category_mistake">category error</a> to put it on the same level as accuracy and precision. What it is, in measurement theory terms, is a validity threat: a condition that undermines your ability to evaluate the instrument at all.</p><p><strong>Think of it this way</strong>. The four targets all assume you can walk up to the bullseye and look. That&#8217;s the prerequisite. If you can see where the shots landed, you can diagnose accuracy, precision, bias, whatever. The obscured target breaks that prerequisite. It&#8217;s not telling you something new about the instrument&#8217;s performance. It&#8217;s telling you that you can&#8217;t evaluate the instrument&#8217;s performance in the first place.</p><p>When someone hands you a biased estimate, you can detect it and correct it. When someone hands you an imprecise estimate, you can invest in better data. The danger comes when the output looks so complete that you don&#8217;t think to verify it. You can always pull back the curtain, check the source, find the original data, validate the citation. The problem isn&#8217;t that verification is impossible. It&#8217;s that nothing about the output signals that verification is necessary.</p><p>Before you ask whether your AI-assisted estimate is accurate or precise, ask the more basic question: can I see the target? That question comes first.</p><h3>What This Means for CRQ</h3><p>We&#8217;re increasingly using AI to support risk analysis: estimating frequencies, interpreting incident data, extracting figures from documents, summarizing threat reports, just to name a few. I&#8217;ve written extensively about how AI can accelerate risk work and I use it every day.</p><p>The problem isn&#8217;t that AI is inaccurate. Sometimes it is, sometimes it isn&#8217;t. The harder question is whether we can tell which situation we're in.</p><p>The risk isn&#8217;t uniform across all AI-assisted tasks, either. Asking an LLM to extract a number from a report you provide is relatively low risk, since the source document is right there and you can check. Asking it to generate a breach frequency estimate from its training data is where the obscured target lives. The AI is producing a number with no source document behind it. Know which situation you&#8217;re in before you decide how much verification the output needs.</p><p>The classic four targets assume observability. We can validate results and compare what the instrument reported to what happened. AI breaks that feedback loop by giving you high apparent precision with no built-in signal that verification is needed.</p><p>In my book, <em><a href="https://www.heatmapstohistograms.com/">From Heatmaps to Histograms: A Practical Guide to Cyber Risk Quantification</a></em>, I have an easy-to-remember rule on how to think about AI: Jack Sparrow from Pirates of the Caribbean. AI, like Jack Sparrow, is charming, fast, and brilliant at what it does, though it&#8217;s optimized for completing the adventure (or the conversation). Neither will tell you when it&#8217;s making things up. At least Jack Sparrow knows when he&#8217;s lying. Current AI systems will hand you fabricated data with the same confidence as verified facts, and there&#8217;s no flashing warning light. The supervision has to come from you.</p><p>Before you evaluate whether your AI-assisted estimate is accurate or precise, ask a more basic question: can I see the target?</p><p>If the answer is no, you&#8217;re not measuring. You&#8217;re trusting.</p><p>We&#8217;re relying on AI more and more to assist with, and in many cases perform, our measurements. That&#8217;s a massive improvement in CRQ and a real time saver. As we hand more of the measurement process to AI, though, we take on a new responsibility, which is making sure what comes back is real.</p><div><hr></div><h1><strong>&#10067; Reader Question</strong></h1><blockquote><p><em>I&#8217;ve started using AI to help with risk assessments and my team loves it because it&#8217;s fast, but my manager is skeptical and says we can&#8217;t trust the outputs. How do I find the middle ground?</em></p></blockquote><p>Your manager isn&#8217;t wrong, and you&#8217;re not wrong either. The answer depends on which part of the workflow you&#8217;re handing to AI.</p><p>I think about this as a question of where the information is coming from. When the AI is working with something you provided, like summarizing a report you uploaded or generating Monte Carlo code from parameters you specified, the risk is low because you can check the output against your own inputs. The source material is sitting right there. If the AI gets something wrong, you&#8217;ll probably catch it.</p><p>The risk changes when the AI is generating information from its training data. Estimating breach frequencies, citing industry studies, producing loss figures: these are the tasks where the obscured target lives. You have no way to verify the output without going and finding the original source yourself, which is the step that feels redundant when the AI&#8217;s answer looks so polished. That feeling is the danger.</p><p>The middle ground your manager is looking for is a workflow where verification scales with risk. Use AI freely for the tasks where your inputs are the source of truth. When the AI is the source, treat the output the way you&#8217;d treat a claim from a colleague you&#8217;ve never worked with before: interesting, possibly useful, not yet trusted. Verify before it goes into your model.</p><p>If you can explain that distinction to your manager, you&#8217;ll probably find more common ground than you expect.</p><div><hr></div><h1><strong>&#9993;&#65039; Contact</strong></h1><p>Have a question about this, or anything else? Here&#8217;s how to reach me:</p><ul><li><p>Reply to this newsletter if reading via email</p></li><li><p>Comment below</p></li><li><p>Connect with me on <a href="https://www.linkedin.com/in/tonymartinvegue/">LinkedIn</a></p></li><li><p><a href="https://www.tonym-v.com/contact">Contact form</a></p></li></ul><h1><strong>&#127760; Elsewhere</strong></h1><p>I share shorter thoughts on risk, metrics, and decision-making on <a href="https://www.linkedin.com/in/tonymartinvegue/">LinkedIn</a>.</p><p>Book updates, chapter summaries, tools, and downloads are at <a href="https://www.heatmapstohistograms.com/">www.heatmapstohistograms.com</a></p><p>My longer-form essays and older writing live at <a href="https://www.tonym-v.com/">www.tonym-v.com</a></p><h1><strong>&#10084;&#65039; How You Can Help</strong></h1><p>&#9989; Tell me what topics you want covered: beginner, advanced, tools, AI use, anything &#9989; Forward this to a colleague who&#8217;s curious about CRQ <br>&#9989; Click the &#10084;&#65039; or comment if you found this useful</p><p>If someone forwarded this to you, please subscribe to get future issues.</p><p>Thanks for reading. <br><br>&#8212;Tony</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Issue 8: Why "Risk-Based Security" Remains Elusive]]></title><description><![CDATA[Lessons from a week on Reddit: why the field still confuses compliance with risk]]></description><link>https://newsletter.heatmapstohistograms.com/p/issue-8-why-risk-based-security-remains</link><guid isPermaLink="false">https://newsletter.heatmapstohistograms.com/p/issue-8-why-risk-based-security-remains</guid><dc:creator><![CDATA[Tony Martin-Vegue]]></dc:creator><pubDate>Thu, 15 Jan 2026 16:59:09 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d28b6e8b-8a42-42df-bba9-9a367082069e_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1><strong>In This Issue:</strong></h1><ul><li><p><strong>&#128214; Book Update: Production and Pre-Orders</strong></p></li><li><p><strong>&#127908; Upcoming Webinars</strong></p></li><li><p><strong>&#128221; Why "Risk-Based Security" Remains Elusive</strong></p></li><li><p><strong>&#10067; Reader Question</strong></p></li></ul><div><hr></div><h1><strong>&#128214; Book Update: Production and Pre-Orders</strong></h1><p><em>From Heatmaps to Histograms</em> has officially entered production with <a href="https://www.apress.com/gp">Apress</a>. The Amazon pre-order date has moved up to Friday, April 3, but we&#8217;re still targeting an early March release. I&#8217;m 90% confident it&#8217;ll land between March 4&#8211;13, just in time for RSA. Ebook and international ordering options are coming soon.</p><p>It even briefly hit #1 in Amazon&#8217;s Network Security category, which was a fun surprise.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6lyk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ec90e6e-c86e-47ea-89d6-25940657de2f_2016x842.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6lyk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ec90e6e-c86e-47ea-89d6-25940657de2f_2016x842.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6lyk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ec90e6e-c86e-47ea-89d6-25940657de2f_2016x842.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6lyk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ec90e6e-c86e-47ea-89d6-25940657de2f_2016x842.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6lyk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ec90e6e-c86e-47ea-89d6-25940657de2f_2016x842.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6lyk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ec90e6e-c86e-47ea-89d6-25940657de2f_2016x842.jpeg" width="1456" height="608" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3ec90e6e-c86e-47ea-89d6-25940657de2f_2016x842.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:608,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:130858,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/182910261?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ec90e6e-c86e-47ea-89d6-25940657de2f_2016x842.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!6lyk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ec90e6e-c86e-47ea-89d6-25940657de2f_2016x842.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6lyk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ec90e6e-c86e-47ea-89d6-25940657de2f_2016x842.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6lyk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ec90e6e-c86e-47ea-89d6-25940657de2f_2016x842.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6lyk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ec90e6e-c86e-47ea-89d6-25940657de2f_2016x842.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>&#128279; <a href="https://www.amazon.com/Heatmaps-Histograms-Practical-Guide-Quantification/dp/B0FX7V3J7D/">Pre-order on Amazon</a>  &#128279; <a href="www.heatmapstohistograms.com">Book website</a></strong></p><div><hr></div><h1><strong>&#127908; Upcoming Webinars</strong></h1><p><strong>January 21, 2026 at 12:00 PM EST</strong> <strong>&#8220;The Six Levers That Actually Move Risk (Hint: It&#8217;s Not Just Controls)&#8221;</strong> <em>Greater Ohio Chapter, FAIR Institute</em></p><p>This was one of the top-rated talks at FAIRcon in November. If you missed it, here&#8217;s your chance to see it. I&#8217;ll share lessons learned from building Netflix&#8217;s FAIR-based CRQ program, starting from the premise that controls are just one lever, and often not the biggest one. Most changes in risk come from forces far outside your walls. This presentation identifies six environmental forces acting on cyber risk and how each affects loss event frequency and loss magnitude.</p><p>This virtual webinar is open to anyone. You don&#8217;t need to be a member of the Ohio chapter or live in Ohio.</p><p><a href="https://cisco.webex.com/weblink/register/r53a2d3d5dec791a774a4a5ce8323e778">Register here</a></p><p><strong>January 29, 2026 at 12:00 PM EST</strong> <strong>&#8220;From Gut Feel to Good Data: How AI Can (and Can&#8217;t) Transform Risk Management&#8221;</strong> <em>FAIR Institute</em></p><p>Artificial intelligence promises faster, richer insights for cyber risk quantification, but it also brings hallucinations, biases, and overconfidence. This talk explores where AI truly adds value in transforming gut-feel estimates into usable data, and where human judgment and validation remain essential. Attendees will leave with practical strategies to integrate AI into their risk workflows without losing rigor or credibility.</p><p><a href="https://lnkd.in/dvmykk5A">Register here</a></p><div><hr></div><h1><strong>&#128221; Why &#8220;Risk-Based Security&#8221; Remains Elusive</strong></h1><p>Over the holidays, I did a <a href="https://www.reddit.com/r/cybersecurity/comments/1pmdyd5/im_a_security_professional_who_transitioned_our/">Reddit AMA</a> on <a href="https://www.reddit.com/r/cybersecurity/">r/cybersecurity</a> with three CISOs. The topic was :<strong>&#8220;I&#8217;m a security professional who transitioned our security program from compliance-driven to risk-based. Ask Me Anything.&#8221;</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SF4s!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6673404-59d0-43d3-8bd1-b8b98594b569_4032x3024.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SF4s!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6673404-59d0-43d3-8bd1-b8b98594b569_4032x3024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!SF4s!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6673404-59d0-43d3-8bd1-b8b98594b569_4032x3024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!SF4s!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6673404-59d0-43d3-8bd1-b8b98594b569_4032x3024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!SF4s!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6673404-59d0-43d3-8bd1-b8b98594b569_4032x3024.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SF4s!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6673404-59d0-43d3-8bd1-b8b98594b569_4032x3024.jpeg" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c6673404-59d0-43d3-8bd1-b8b98594b569_4032x3024.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1981149,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/182910261?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6673404-59d0-43d3-8bd1-b8b98594b569_4032x3024.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SF4s!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6673404-59d0-43d3-8bd1-b8b98594b569_4032x3024.jpeg 424w, https://substackcdn.com/image/fetch/$s_!SF4s!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6673404-59d0-43d3-8bd1-b8b98594b569_4032x3024.jpeg 848w, https://substackcdn.com/image/fetch/$s_!SF4s!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6673404-59d0-43d3-8bd1-b8b98594b569_4032x3024.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!SF4s!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6673404-59d0-43d3-8bd1-b8b98594b569_4032x3024.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I expected the usual questions about tools, metrics, and getting executive buy-in, and perhaps some pushback on quantitative methods in general. I expected to dig deep into techniques and maybe a bit of mythbusting. It is Reddit, after all, a notoriously tough crowd. What I got instead was a bit more revealing and personally enlightening.</p><p>The AMA brought into the forefront something I wrote about extensively in the <a href="https://www.heatmapstohistograms.com/">book</a>, but sometimes lose sight of on a day-to-day basis, because I work with clients almost exclusively who are already doing some level of quantification. The gap between &#8220;compliance-based security programs&#8221; and &#8220;risk-based thinking&#8221; is wider than even the quantification community acknowledges. We&#8217;ve been focused on teaching people how to build models, even though many still don&#8217;t understand why models are necessary. That&#8217;s a pedagogy problem, not a technical one.</p><p>What made the week interesting wasn&#8217;t that everyone was confused. The thread was divided between people who immediately understood what we were talking about and people who believed they were already doing a risk-based program, but weren&#8217;t. Understanding what separated those two groups taught me more about the state of the field than any conference presentation I&#8217;ve given.</p><h3><strong>The Scoring System That Wasn&#8217;t Risk Management</strong></h3><p>Early in the thread, someone asked for practical examples. I walked through a ransomware scenario with frequency estimates, loss components in dollars, and the options leadership was choosing between. Basic and standard CRQ work.</p><p>Another commenter jumped in with their own example: an elaborate scoring system where applications were assessed against control frameworks, weighted by criticality, filtered through review processes, then bucketed into high, medium, and low categories. The description was detailed and clearly took real effort. They walked through how apps scored on a 1-100 scale using weighted formulas for vulnerabilities, control implementation, test cadence, and audit findings. The scores were precise, applications ranked cleanly, leadership got quarterly reports showing movement.</p><p>They believed they were describing risk management. I had to explain why they weren&#8217;t:</p><blockquote><p><em>&#8220;This is a well thought out scoring and governance system, but it&#8217;s still measuring control posture, not risk. All the &#8216;math&#8217; happens in ordinal space, so at the end you know which app is &#8216;higher&#8217; than another, not how much loss you&#8217;re exposed to or what you bought down by fixing it. High/Medium/Low doesn&#8217;t tell leadership whether Control A was a better investment than Control B, only that something moved. That&#8217;s fine for standardization and audits. It hits a ceiling the moment the question becomes tradeoffs, ROI, or &#8216;was this worth the money.&#8217;&#8221;</em></p></blockquote><p>Risk, at its core, has two components: probability (how often something happens; likelihood, frequency, chances) and impact (how bad it is when it does; magnitude, loss, consequence). If your assessment can&#8217;t tell you both of those things in terms that support decisions, you&#8217;re measuring something else. This scoring system measured control coverage. It&#8217;s useful for passing audits, but it couldn&#8217;t answer the question every executive cares about: <em>If we spend money here, how much safer are we?</em></p><p>This pattern repeated throughout the week. People used &#8220;risk-based&#8221; to describe prioritization frameworks, vulnerability triage workflows, compliance programs that measured control posture, and GRC tools that tracked remediation. It&#8217;s all useful work, some even necessary, but none of it was risk management.</p><h3><strong>The Questions That Never Came</strong></h3><p>Midway through I decided to stop and write a definitional post that described what &#8220;risk-based security&#8221; is in practice. I realized the conversations were drifting and we weren&#8217;t talking about the same thing:</p><blockquote><p><em>&#8220;At its core, risk management is about decision-making under uncertainty. Risk itself is a future event. A risk assessment is a forecast about something adverse that might happen, how often it could happen, and how bad it would be if it does. It&#8217;s not a list of issues, gaps, concerns, audit findings, controls, or aspirations. Those are inputs, not risk. When a risk register starts to look like a to-do list, what you really have is a compliance tracking system with risk language layered on top.&#8221;</em></p></blockquote><p>The questions I wanted never really materialized:</p><ul><li><p>How do you validate your loss estimates?</p></li><li><p>When does quantification provide enough decision value to justify the effort?</p></li><li><p>How do you handle scenarios where you have no data?</p></li><li><p>What&#8217;s the right level of precision for different types of decisions?</p></li></ul><p>These are hard questions with nuanced answers. They require deep thinking about uncertainty, imperfect information, reasoning through problems, and the limits of modeling. These are the conversations that move the field forward. However, you can&#8217;t ask them if you think &#8220;risk-based&#8221; means moving your compliance tracking from red-yellow-green to a 1-5 scale with decimals.</p><h3><strong>The Skeptical Argument Worth Engaging With</strong></h3><p>Near the end of the week, someone posted something completely different. User Competitive-Coma shared a conversation they&#8217;d had about CRQ that had stumped them:</p><blockquote><p><em>&#8220;Risk quantification is a poor forecasting tool without deep, high quality historical data -- the kind actuaries rely on. This is why the forecasts are never right.</em></p><p><em>If it were an effective forecasting method, stock traders would already use it successfully. Historical results show that those applying quantitative risk models to trading fail to outperform the market over time (e.g., S&amp;P 500).</em></p><p><em>Its primary contribution appears to be limited to structured discussion of risks, which is a benefit that does not require formal risk quantification to achieve. If anything, the $$$ distracts from the points at hand.&#8221;</em></p></blockquote><p>They added: &#8220;The problem I have is that this jives with my experience with FAIR and HDR, so I don&#8217;t have a rebuttal. That said, I am seeking to understand so please correct my thinking if I got any of that wrong.&#8221;</p><p>This was the best question in the entire thread. It was a genuine challenge <em><strong>and</strong></em> the original skeptic and the person asking understood what CRQ claims to be. They weren&#8217;t confusing prioritization with risk management. They understood CRQ attempts to characterize uncertainty to support decisions, and they&#8217;d encountered someone skeptical that it delivers enough value to justify the complexity. They wanted help engaging with that argument.</p><p>That&#8217;s the conversation the field should be having. My response tried to address each point directly. Here&#8217;s my response to the stock trading challenge:</p><blockquote><p><em>&#8220;The comparison to stock trading is a category error. Markets are adversarial and reflexive systems. The moment you act on a model (buy stock), you change the system itself. A ransomware attacker does not change their behavior because you ran a Monte Carlo simulation, but markets absolutely respond to trading strategies. They also answer very different questions. In trading, the question is &#8216;can this beat the S&amp;P 500.&#8217; In CRQ, the question is &#8216;can this model help us make better tradeoffs under uncertainty?&#8217; Those are fundamentally different problems.&#8221;</em></p></blockquote><p>And then I had to acknowledge the elephant in the room:</p><blockquote><p><em>&#8220;Finally, there is snake oil everywhere. Cybersecurity has plenty of it, and cyber risk quantification is not immune. If a person, vendor, or product is selling FAIR or HDR as accurate predictions or precise forecasts, they are overselling it at best or lying at worst. That is not what CRQ is for. CRQ is a decision support tool. It helps compare options, test sensitivity, understand uncertainty, and identify where uncertainty matters, where and why we care. When it is used that way, it is doing exactly what it is supposed to do.&#8221;</em></p></blockquote><p>What separated this exchange from the rest of the thread was conceptual depth. This person had encountered a real critique of risk quantification and wanted to understand how to respond. The scoring system folks from earlier in the week didn&#8217;t know they were missing anything.</p><h3><strong>The Pedagogical Problem</strong></h3><p>The practitioners who posted thoughtful scoring systems aren&#8217;t the problem. They&#8217;re doing good work within real constraints. The problem is we, as a field, told them that better compliance tracking is risk management without changing how they think about the underlying problem.</p><p>What separated the people who got it from those who didn&#8217;t wasn&#8217;t intelligence or experience. It was exposure to decision science, actuarial thinking, forecasting, and statistics, disciplines that most cybersecurity training doesn&#8217;t cover. The CISSP still teaches asset-based quantitative risk methods from the 1980s that make CRQ seem either an impossible level of precision or mathematical theater. No wonder people are confused.</p><p>This is why I wrote <em><a href="https://www.heatmapstohistograms.com/">From Heatmaps to Histograms</a></em>. I&#8217;m not trying to convince sophisticated skeptics that quantification is perfect, because it isn&#8217;t, but I <em>can</em> help practitioners see that the &#8220;risk programs&#8221; they&#8217;re running are often compliance programs with better labels, and show them what the actual shift looks like. The conversation we need isn&#8217;t &#8220;is quantification worth it?&#8221; It&#8217;s &#8220;do we understand what risk management actually is?&#8221; Until we get that foundation right, we&#8217;re still passing audits, not managing risk.</p><p>The <a href="https://www.reddit.com/r/cybersecurity/comments/1pmdyd5/im_a_security_professional_who_transitioned_our/">full Reddit AMA</a> is still up on r/cybersecurity. It&#8217;s worth reading to see where the field actually is versus where we think it is.</p><div><hr></div><h1><strong>&#10067; Reader Question</strong></h1><blockquote><p><em>&#8220;I&#8217;m a college student studying cybersecurity and I&#8217;m interested in risk management, but I&#8217;m afraid AI will make it obsolete. Should I still pursue this path?&#8221;</em></p></blockquote><p>I think risk quantification is one of the better bets for job security right now, for a specific reason.</p><p>Compliance-based risk work is already being automated, and AI is surprisingly good at it. Scoring vulnerabilities, tracking controls, filling out risk registers, mapping to frameworks are pattern-matching exercises. If your job is maintaining heat maps or running compliance reports, that work is disappearing fast.</p><p>Decisions under uncertainty are different. Judgments about tradeoffs, opportunity costs, and what risks are worth taking are harder to automate because they require business context that changes constantly. CRQ means translating technical risk into financial terms and helping executives choose between competing uses of capital. AI helps with parts of that workflow, but it can&#8217;t replace the judgment required to do it well.</p><p>If I were starting out today, I'd learn FAIR.  It teaches you to think about risk in terms of decisions rather than scores. FAIR is widely recognized, has a thriving and growing community through the FAIR Institute, is taught in colleges and universities, and has extensive documentation and books available. It's easy to find help and mentors, and it fits well with existing risk frameworks. There's solid documentation on how to integrate it with ISO, NIST, and others. FAIR isn't the only model of course, but if I were starting out, I'd immerse myself in this. Understanding probability, impact, and how to communicate uncertainty to non-technical leaders is what keeps you relevant as the field changes.</p><p>I think in the next few years, practitioners doing rote compliance work will struggle. If you can translate risk into business language and help organizations make better decisions, you'll have work.</p><div><hr></div><h1><strong>&#9993;&#65039; Contact</strong></h1><p>Have a question about this, or anything else? Here&#8217;s how to reach me:</p><ul><li><p>Reply to this newsletter if reading via email</p></li><li><p>Comment below</p></li><li><p>Connect with me on <a href="https://www.linkedin.com/in/tonymartinvegue/">LinkedIn</a></p></li><li><p><a href="https://www.tonym-v.com/contact">Contact form</a></p></li></ul><h4><strong>Elsewhere</strong></h4><ul><li><p>I share shorter thoughts on risk, metrics, and decision-making on <a href="https://www.linkedin.com/in/tonymartinvegue/">LinkedIn</a>.</p></li><li><p>Book updates, chapter summaries, tools, and downloads are at<br><strong><a href="http://www.heatmapstohistograms.com/">www.heatmapstohistograms.com</a></strong></p></li><li><p>My longer-form essays and older writing live at <strong><a href="http://www.tonym-v.com/">www.tonym-v.com</a></strong></p></li></ul><div><hr></div><h2><strong>&#10084;&#65039; How You Can Help</strong></h2><p>&#9989; Tell me what topics you want covered: beginner, advanced, tools, AI use, anything<br>&#9989; Forward this to a colleague who&#8217;s curious about CRQ<br>&#9989; Click the &#10084;&#65039; or comment if you found this useful</p><p>If someone forwarded this to you, please subscribe to get future issues.</p><p>Thanks for reading.<br>&#8212;Tony</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Issue 7: The Risk Workshop Survival Guide]]></title><description><![CDATA[How to keep risk workshops from drifting into philosophy, edge cases, and noise]]></description><link>https://newsletter.heatmapstohistograms.com/p/issue-7-the-risk-workshop-survival</link><guid isPermaLink="false">https://newsletter.heatmapstohistograms.com/p/issue-7-the-risk-workshop-survival</guid><dc:creator><![CDATA[Tony Martin-Vegue]]></dc:creator><pubDate>Fri, 12 Dec 2025 18:02:32 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5c81020c-cffa-48e1-8a51-6b5b1d9aa07a_1722x1134.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1><strong>In This Issue:</strong></h1><ul><li><p><strong>&#128214; Book Update: The Manuscript Is Done</strong></p></li><li><p><strong>&#128296; The Risk Workshop Survival Guide</strong></p></li><li><p><strong>&#128083; What I&#8217;m reading</strong></p></li><li><p><strong>&#10067;Reader Question</strong></p></li></ul><p></p><div><hr></div><h2><strong>&#128214; Book Update: The Manuscript Is Done</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LrbW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8a1a4e-2a7c-4e24-8da8-1d3cdf06ec9b_2152x3112.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LrbW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8a1a4e-2a7c-4e24-8da8-1d3cdf06ec9b_2152x3112.png 424w, https://substackcdn.com/image/fetch/$s_!LrbW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8a1a4e-2a7c-4e24-8da8-1d3cdf06ec9b_2152x3112.png 848w, https://substackcdn.com/image/fetch/$s_!LrbW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8a1a4e-2a7c-4e24-8da8-1d3cdf06ec9b_2152x3112.png 1272w, https://substackcdn.com/image/fetch/$s_!LrbW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8a1a4e-2a7c-4e24-8da8-1d3cdf06ec9b_2152x3112.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LrbW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8a1a4e-2a7c-4e24-8da8-1d3cdf06ec9b_2152x3112.png" width="318" height="459.85873605947955" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/db8a1a4e-2a7c-4e24-8da8-1d3cdf06ec9b_2152x3112.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:3112,&quot;width&quot;:2152,&quot;resizeWidth&quot;:318,&quot;bytes&quot;:1283513,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/175215165?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e55e4bc-4fdc-48f4-9cd1-52a6187d397b_2152x3112.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LrbW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8a1a4e-2a7c-4e24-8da8-1d3cdf06ec9b_2152x3112.png 424w, https://substackcdn.com/image/fetch/$s_!LrbW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8a1a4e-2a7c-4e24-8da8-1d3cdf06ec9b_2152x3112.png 848w, https://substackcdn.com/image/fetch/$s_!LrbW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8a1a4e-2a7c-4e24-8da8-1d3cdf06ec9b_2152x3112.png 1272w, https://substackcdn.com/image/fetch/$s_!LrbW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8a1a4e-2a7c-4e24-8da8-1d3cdf06ec9b_2152x3112.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I crossed a big finish line earlier this week, and it still feels a little unreal to say it out loud: the manuscript is officially complete. After living with this book every day for months, in outlines, in messy notes, in drafts that did not survive the edit, there was a strange mix of relief and momentum when I typed the final line. The work is done, and somehow things are moving even faster now.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The manuscript also went through technical review by <a href="https://www.linkedin.com/in/rdbrown3/">Robert D. Brown III</a>, one of the sharpest thinkers in decision science. Working with Rob strengthened the book in ways I did not expect. Some of his comments made me laugh and wonder what I was thinking when I first drafted a chapter; others made me rethink how I explain key ideas so they land cleanly for readers. It was the kind of collaboration that leaves the work stronger and leaves you a better thinker than when you started.</p><p><strong>From pre-orders alone, </strong><em><strong>From Heatmaps to Histograms</strong></em><strong> hit #1 in Amazon&#8217;s Network Security category.</strong></p><p>Next up is copyediting, then printing, then launch. Ok, it&#8217;s real now.</p><p><strong>&#127881; Preorders are open for </strong><em><strong>From Heatmaps to Histograms: A Practical Guide to Cyber Risk Quantification.</strong><br></em> (Apress / Springer Nature, publishing March 2026)</p><p>If you have been following this journey, preorders help more than you might think. They signal demand to the publisher and the retailers.</p><p><strong>&#128279; </strong><em><strong><a href="https://www.heatmapstohistograms.com/">The book&#8217;s official website</a></strong></em><strong><br> &#128073; </strong><em><strong><a href="https://www.amazon.com/Heatmaps-Histograms-Practical-Guide-Quantification/dp/B0FX7V3J7D/">Amazon preorder link</a></strong></em></p><div><hr></div><h1><strong>The Risk Workshop Survival Guide</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VtjN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79737e69-a16a-4945-a8bd-c63369fdf8da_1055x784.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VtjN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79737e69-a16a-4945-a8bd-c63369fdf8da_1055x784.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VtjN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79737e69-a16a-4945-a8bd-c63369fdf8da_1055x784.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VtjN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79737e69-a16a-4945-a8bd-c63369fdf8da_1055x784.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VtjN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79737e69-a16a-4945-a8bd-c63369fdf8da_1055x784.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VtjN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79737e69-a16a-4945-a8bd-c63369fdf8da_1055x784.jpeg" width="572" height="425.0691943127962" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/79737e69-a16a-4945-a8bd-c63369fdf8da_1055x784.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:784,&quot;width&quot;:1055,&quot;resizeWidth&quot;:572,&quot;bytes&quot;:279792,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VtjN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79737e69-a16a-4945-a8bd-c63369fdf8da_1055x784.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VtjN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79737e69-a16a-4945-a8bd-c63369fdf8da_1055x784.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VtjN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79737e69-a16a-4945-a8bd-c63369fdf8da_1055x784.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VtjN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F79737e69-a16a-4945-a8bd-c63369fdf8da_1055x784.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Detail from Raphael&#8217;s</em> School of Athens <em>(1509&#8211;1511)</em></figcaption></figure></div><p>A risk workshop exists for a simple reason: before you can analyze risk, you have to decide which risks are worth analyzing. Its job is to surface candidate scenarios, align on what matters, and provide structure to uncertainty before anyone starts modeling.</p><p>When it works, a risk workshop creates shared understanding. People leave with a clearer sense of what could happen, why it matters, and where analysis would inform a decision.</p><p>I have hosted more of these sessions than I can count. Over time, I learned that the difficult part is not the modeling that comes later, but the conversation in the room. If no one actively takes responsibility for the shape of that conversation, it will drift toward whatever is most interesting, provocative, or philosophically defensible in the moment.</p><p>That is how otherwise well-intentioned workshops end up debating nation-state-sponsored supply chain attacks and mega tsunamis in Nebraska.</p><p>These are the moves I have learned, often the hard way, to keep risk workshops focused and productive.</p><h2><strong>Survival Skill 1</strong></h2><p><strong>Eliminate the impossible</strong></p><p>After a workshop or GenAI brainstorm, you often end up with a very healthy list of risk statements. Sometimes too healthy. I have seen sessions produce fifty statements for a single asset class. No analyst is going to run fifty full assessments, nor should they.</p><p>Before you invest hours in scoping, run a quick quality check. Look at each risk statement and ask:</p><blockquote><p>&#8220;Could this actually happen in the real world, given how the world works now?&#8221;</p></blockquote><p>Some scenarios are impossible in the sense that matters for our work.</p><ul><li><p>A hurricane cannot be the cause of a data breach via SQL injection.</p></li><li><p>A tsunami cannot destroy a datacenter in Omaha.</p></li><li><p>Natural disasters do not directly exploit technical vulnerabilities.</p></li></ul><p>This first pass should be quick. You are not assigning probability. You are filtering reality from noise.</p><div><hr></div><h2><strong>Survival Skill 2</strong></h2><p><strong>Handle &#8220;impossible&#8221; pushback with philosophy</strong></p><p>There is always someone who will ask, <em>&#8220;But what if you are wrong</em>?&#8221;</p><p>Fair question. When analysts say &#8220;impossible,&#8221; we do not mean&nbsp;<em>logically impossible,</em>&nbsp;like a square circle, or&nbsp;<em>physically impossible,</em>&nbsp;like faster than light travel. We mean <em>practically impossible</em>: so far outside the range of the world we live in that modeling it would not help anyone make a decision.</p><p>Practical impossibility is about stewardship of attention. We focus on possibilities that can inform decisions within the constraints of the next quarter, next year, or the current budget cycle. As <a href="https://en.wikipedia.org/wiki/William_James">William James</a> put it, beliefs are judged by their practical consequences. A mega tsunami reaching Omaha does not help a CISO allocate next year&#8217;s security budget.</p><p>Risk analysis is an exercise in practical wisdom. We bracket extreme theoretical scenarios not because we can prove they will never happen, but because including them makes our analysis less useful.</p><div><hr></div><h2><strong>Survival Skill 3</strong></h2><p><strong>Prioritize plausible before possible</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3swN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f71bfdf-ad10-4da1-af2d-868e3be86d39_2247x1124.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3swN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f71bfdf-ad10-4da1-af2d-868e3be86d39_2247x1124.png 424w, https://substackcdn.com/image/fetch/$s_!3swN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f71bfdf-ad10-4da1-af2d-868e3be86d39_2247x1124.png 848w, https://substackcdn.com/image/fetch/$s_!3swN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f71bfdf-ad10-4da1-af2d-868e3be86d39_2247x1124.png 1272w, https://substackcdn.com/image/fetch/$s_!3swN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f71bfdf-ad10-4da1-af2d-868e3be86d39_2247x1124.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3swN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f71bfdf-ad10-4da1-af2d-868e3be86d39_2247x1124.png" width="1456" height="728" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7f71bfdf-ad10-4da1-af2d-868e3be86d39_2247x1124.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:728,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:165602,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/175215165?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f71bfdf-ad10-4da1-af2d-868e3be86d39_2247x1124.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3swN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f71bfdf-ad10-4da1-af2d-868e3be86d39_2247x1124.png 424w, https://substackcdn.com/image/fetch/$s_!3swN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f71bfdf-ad10-4da1-af2d-868e3be86d39_2247x1124.png 848w, https://substackcdn.com/image/fetch/$s_!3swN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f71bfdf-ad10-4da1-af2d-868e3be86d39_2247x1124.png 1272w, https://substackcdn.com/image/fetch/$s_!3swN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7f71bfdf-ad10-4da1-af2d-868e3be86d39_2247x1124.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Now you are left with things that <em>could</em> happen. The trick is choosing which ones deserve your time.</p><p>Consider two data breach scenarios:</p><ul><li><p><strong>A: Cybercriminals exploit an unpatched web application vulnerability.</strong></p></li><li><p><strong>B: A nation-state deploys a custom zero-day against proprietary middleware.</strong></p></li></ul><p>Both are <em>possible</em>. The question is which is more <em>plausible</em> for your organization.</p><p>Unless you are a defense contractor, Scenario A is usually the better use of time. It requires fewer special conditions and matches patterns we see in actual incident reports. Scenario B is not wrong. It is simply a poorer investment if you are trying to understand your most likely risks.</p><div><hr></div><h2><strong>Survival Skill 4</strong></h2><p><strong>Use Ockham&#8217;s Razor before you scope</strong></p><p>When choosing between scenarios that could happen, ask:</p><ul><li><p>Which happens more often in organizations like ours</p></li><li><p>Which requires fewer unusual circumstances</p></li><li><p>Which a reasonable security professional would worry about first</p></li></ul><p>This is <a href="https://en.wikipedia.org/wiki/Occam%27s_razor">Ockham&#8217;s Razor</a> applied to risk analysis. Favor the explanation that makes the fewest assumptions. If a scenario requires multiple unlikely events to align just right or assumes sophisticated attackers for a very typical target, it probably belongs lower on your list. You are not trying to impress anyone with complexity. You are trying to be useful.<br><br><em>(Note: I wrote more about <a href="https://www.tonym-v.com/blog/how-a-14th-century-english-monk-can-improve-your-decision-making?rq=razor">Ockham&#8217;s Razor on my blog</a>.)</em></p><div><hr></div><h2><strong>Survival Skill 5</strong></h2><p><strong>Correct for &#8220;cool threat&#8221; bias</strong></p><p>Security teams are uniquely talented at jumping straight to the sophisticated edge case. It is part of the job and part of the fun. But many of these scenarios are the cybersecurity equivalent of an espionage thriller. They look great on the whiteboard, but they are rarely what hurts us.</p><p>If the room is stuck, pull up your own incident logs or skim the <a href="https://www.verizon.com/business/resources/reports/dbir/">Verizon DBIR</a>. In most organizations, the most likely threat is not an APT. It is Sam from Accounting, who clicks on anything that looks like an invoice.</p><p>Availability bias pulls us toward the dramatic. Workshop discipline pulls us back to reality.</p><div><hr></div><h3><strong>Survival Skill 6</strong></h3><p><strong>Bracket and move on</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uv1r!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d31aab4-6a08-40a1-bc08-cde07c5bdb16_2104x757.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uv1r!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d31aab4-6a08-40a1-bc08-cde07c5bdb16_2104x757.png 424w, https://substackcdn.com/image/fetch/$s_!uv1r!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d31aab4-6a08-40a1-bc08-cde07c5bdb16_2104x757.png 848w, https://substackcdn.com/image/fetch/$s_!uv1r!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d31aab4-6a08-40a1-bc08-cde07c5bdb16_2104x757.png 1272w, https://substackcdn.com/image/fetch/$s_!uv1r!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d31aab4-6a08-40a1-bc08-cde07c5bdb16_2104x757.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uv1r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d31aab4-6a08-40a1-bc08-cde07c5bdb16_2104x757.png" width="1456" height="524" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2d31aab4-6a08-40a1-bc08-cde07c5bdb16_2104x757.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:524,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:90852,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/175215165?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d31aab4-6a08-40a1-bc08-cde07c5bdb16_2104x757.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uv1r!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d31aab4-6a08-40a1-bc08-cde07c5bdb16_2104x757.png 424w, https://substackcdn.com/image/fetch/$s_!uv1r!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d31aab4-6a08-40a1-bc08-cde07c5bdb16_2104x757.png 848w, https://substackcdn.com/image/fetch/$s_!uv1r!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d31aab4-6a08-40a1-bc08-cde07c5bdb16_2104x757.png 1272w, https://substackcdn.com/image/fetch/$s_!uv1r!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d31aab4-6a08-40a1-bc08-cde07c5bdb16_2104x757.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Every so often a workshop takes a philosophical turn. Someone will say:</p><ul><li><p>&#8220;Nothing is truly knowable.&#8221;</p></li><li><p>&#8220;Why model a breach at all? The world might end tomorrow.&#8221;</p></li><li><p>&#8220;What if the real threat is something we have not imagined yet?&#8221;</p></li></ul><p>Technically, none of these is wrong. They are simply not helpful.</p><p>This is where <a href="https://en.wikipedia.org/wiki/Bracketing_(phenomenology)">bracketing</a> is your friend. It suspends judgment on the unresolvable questions so you can focus on what is actionable today.</p><p>My go-to line:</p><blockquote><p>&#8220;You are right that anything could happen. For the purpose of this exercise, let us <em>bracket</em> that. Given what we know, today, what is the most <strong>plausible</strong> and <strong>decision useful</strong> scenario we can build?&#8221;</p></blockquote><p>It validates the concern and keeps the session moving.</p><div><hr></div><h2><strong>What You Do Next</strong></h2><p>Next workshop you run, use this mental checklist to keep things on track.</p><ul><li><p><strong>Eliminate the impossible.</strong><br>Don&#8217;t debate philosophy when judgment will do.</p></li><li><p><strong>Prioritize the plausible.</strong><br>Possible is cheap. Attention is not.</p></li><li><p><strong>Favor simpler explanations.</strong><br>Start with what requires fewer assumptions.</p></li><li><p><strong>Watch for &#8220;cool threat&#8221; bias.</strong><br>Interesting is not the same as likely.</p></li><li><p><strong>Bracket what we can&#8217;t resolve here.</strong><br>Set it aside and keep moving.</p></li><li><p><strong>Aim attention at the risks that matter.</strong><br>The rest can wait.</p></li></ul><p>When someone takes responsibility for the room, the workshop usually does what it&#8217;s supposed to do.</p><div><hr></div><h2><strong>&#128218; What I&#8217;m Reading</strong></h2><p>Here are a few pieces I&#8217;ve really enjoyed the last few weeks</p><p><strong><a href="https://www.linkedin.com/pulse/how-model-enterprise-operational-risk-graeme-keith-bqzof/?trackingId=kOBLhhDuRHW4YD15Qoba1w%3D%3D">How to Model Enterprise Operational Risk</a> | <a href="https://www.linkedin.com/in/graeme-keith-bbb52822/">Graeme Keith</a><br></strong>I treat Graeme&#8217;s pieces the same way my wife treats her Sunday New York Times crossword. When one appears in my feed, I save it for the right window so I can <em>really</em>  think and absorb it. Thoughtful and worth your full attention.</p><p><strong><a href="https://www.linkedin.com/pulse/six-most-common-challenges-organizations-face-when-prometheus-3nwwc/?trackingId=t8WRRtXaQRaPJ2dNQjfyDA%3D%3D">Six Common Challenges in Cyber Risk Quantification</a> | <a href="https://www.linkedin.com/in/prometheusyang/">Prometheus Yang</a><br></strong> A useful summary of the organizational friction points that quietly derail CRQ programs. Always helpful to see how others frame the same challenges we face.</p><p><strong><a href="https://www.amazon.com/Against-Gods-Remarkable-Story-Risk-ebook/dp/B00BV6RTUG/">Against the Gods</a> | Peter Bernstein (re-read)<br></strong> I revisited parts of this classic while finishing the early chapters of the book. Bernstein&#8217;s storytelling about probability, uncertainty, and the invention of risk still holds up. A rewarding slow burn.</p><div><hr></div><h1><strong>&#10067; Reader Question (via LinkedIn)</strong></h1><blockquote><p>&#8220;I&#8217;m comfortable doing one-off quantitative analyses, but leadership keeps asking why we don&#8217;t have a single &#8220;cyber risk number&#8221; for the whole organization. Is that a reasonable expectation, or a misunderstanding of what CRQ can actually do?&#8221;</p></blockquote><h2>My Answer</h2><p>This question comes up a lot, especially once leadership starts to see value in quantitative analysis.</p><p>The short answer is that a single enterprise-wide cyber risk number is usually the <em>wrong abstraction</em>, even if the question behind it is reasonable.</p><p>What leaders are really asking is to <em>understand scale</em>. <strong>Are we talking about hundreds of thousands, tens of millions, or something that could threaten the business?</strong> That&#8217;s a fair question, and CRQ can absolutely help answer it.</p><p>Where things go wrong is when that curiosity gets collapsed into a single number.</p><p>In practice, cyber risk does not behave like <em>one thing.</em> It behaves like a portfolio of distinct loss scenarios: ransomware, data breaches, operational outages, fraud, regulatory action. Each has different drivers, different controls, different time horizons, and different decision levers. Rolling all of that into a single figure hides trade-offs, masks opportunity costs, and makes capital conversations harder, not easier.</p><p>What I&#8217;ve found works far better is a <strong>small, enterprise-wide portfolio of material loss scenarios</strong>, usually six to ten scenarios, expressed in financial terms and tied directly to real decisions. That structure makes it possible to have meaningful capital conversations: how much loss the organization could absorb, how much is transferred through insurance, and where coverage stops short.</p><p>That nuance matters, because not all cyber losses are insured, and not all policies respond the same way. Ransom payments, business interruption, regulatory fines, legal costs, and recovery expenses behave very differently under coverage. Collapsing all of that into a single number hides exactly the trade-offs leaders need to see.</p><p>If someone insists on a single number, I&#8217;m careful about how it&#8217;s framed. At best, it&#8217;s a rough summary of exposure, not a scorecard, target, or KPI. The moment it becomes something you try to optimize directly, it starts obscuring more than it reveals.</p><p>In my experience, once leaders see the portfolio view, they stop asking for a single number. Not because it&#8217;s impossible to calculate, but because they can finally see what&#8217;s driving risk, where money changes outcomes, and what trade-offs they&#8217;re being asked to make.</p><p>That&#8217;s a much more useful conversation.</p><div><hr></div><h1><strong>&#9993;&#65039; Contact</strong></h1><p>Have a question about this, or anything else? Here&#8217;s how to reach me:</p><ul><li><p>Reply to this newsletter if reading via email</p></li><li><p>Comment below</p></li><li><p>Connect with me on <a href="https://www.linkedin.com/in/tonymartinvegue/">LinkedIn</a></p></li><li><p><a href="https://www.tonym-v.com/contact">Contact form</a></p></li></ul><h4>Elsewhere</h4><ul><li><p>I share shorter thoughts on risk, metrics, and decision-making on <a href="https://www.linkedin.com/in/tonymartinvegue/">LinkedIn</a>.</p></li><li><p>Book updates, chapter summaries, tools, and downloads are at <br><strong><a href="http://www.heatmapstohistograms.com">www.heatmapstohistograms.com</a></strong></p></li><li><p>My longer-form essays and older writing live at <strong><a href="http://www.tonym-v.com">www.tonym-v.com</a></strong></p></li></ul><div><hr></div><h2><strong>&#10084;&#65039; How You Can Help</strong></h2><p>&#9989; Tell me what topics you want covered: beginner, advanced, tools, AI use, anything<br>&#9989; Forward this to a colleague who&#8217;s curious about CRQ<br>&#9989; Click the &#10084;&#65039; or comment if you found this useful</p><p>If someone forwarded this to you, please subscribe to get future issues.</p><p>Thanks for reading. <br> &#8212;Tony</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Issue 6: Preorders Are Live! Plus, Thanksgiving Meal KRIs and KPIs]]></title><description><![CDATA[Book updates, pre-order links, and a metrics-driven Thanksgiving]]></description><link>https://newsletter.heatmapstohistograms.com/p/issue-6-preorders-are-live-plus-thanksgiving</link><guid isPermaLink="false">https://newsletter.heatmapstohistograms.com/p/issue-6-preorders-are-live-plus-thanksgiving</guid><dc:creator><![CDATA[Tony Martin-Vegue]]></dc:creator><pubDate>Wed, 26 Nov 2025 08:34:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BbYJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F951a430e-975d-466d-8737-d7583e166df8_3266x2078.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BbYJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F951a430e-975d-466d-8737-d7583e166df8_3266x2078.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BbYJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F951a430e-975d-466d-8737-d7583e166df8_3266x2078.png 424w, https://substackcdn.com/image/fetch/$s_!BbYJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F951a430e-975d-466d-8737-d7583e166df8_3266x2078.png 848w, https://substackcdn.com/image/fetch/$s_!BbYJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F951a430e-975d-466d-8737-d7583e166df8_3266x2078.png 1272w, https://substackcdn.com/image/fetch/$s_!BbYJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F951a430e-975d-466d-8737-d7583e166df8_3266x2078.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BbYJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F951a430e-975d-466d-8737-d7583e166df8_3266x2078.png" width="1456" height="926" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/951a430e-975d-466d-8737-d7583e166df8_3266x2078.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:926,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:745941,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/178522686?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F951a430e-975d-466d-8737-d7583e166df8_3266x2078.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BbYJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F951a430e-975d-466d-8737-d7583e166df8_3266x2078.png 424w, https://substackcdn.com/image/fetch/$s_!BbYJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F951a430e-975d-466d-8737-d7583e166df8_3266x2078.png 848w, https://substackcdn.com/image/fetch/$s_!BbYJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F951a430e-975d-466d-8737-d7583e166df8_3266x2078.png 1272w, https://substackcdn.com/image/fetch/$s_!BbYJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F951a430e-975d-466d-8737-d7583e166df8_3266x2078.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><strong>&#128214; Book Update: Book cover and pre-order links are out!</strong></p></li><li><p><strong>&#128161; Metrics for Thanksgiving Dinner</strong></p></li></ul><div><hr></div><p>Hi everyone,<br>I have several very exciting book updates in this issue. Things are moving quickly with the book, and I&#8217;m excited to share the latest news with you all.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Here in the US, it&#8217;s Thanksgiving, my favorite holiday of the year. To celebrate, I updated one of my old blog posts from years ago on metrics for a typical American Thanksgiving meal, complete with a key risk indicator (KRIs) and several key performance indicators (KPIs). It&#8217;s a fun, lighthearted post, but the underlying message is demonstrating how to measure both tangibles and intangibles.</p><p>To those who celebrate, Happy Thanksgiving!</p><p>Tony</p><div><hr></div><h1><strong>&#128214; Book Update: Cover &amp; Pre-Order Links!</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sDOW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c8a5b44-c425-4802-ac97-313322bfa9d5_4861x3472.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sDOW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c8a5b44-c425-4802-ac97-313322bfa9d5_4861x3472.png 424w, https://substackcdn.com/image/fetch/$s_!sDOW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c8a5b44-c425-4802-ac97-313322bfa9d5_4861x3472.png 848w, https://substackcdn.com/image/fetch/$s_!sDOW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c8a5b44-c425-4802-ac97-313322bfa9d5_4861x3472.png 1272w, https://substackcdn.com/image/fetch/$s_!sDOW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c8a5b44-c425-4802-ac97-313322bfa9d5_4861x3472.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sDOW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c8a5b44-c425-4802-ac97-313322bfa9d5_4861x3472.png" width="1456" height="1040" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c8a5b44-c425-4802-ac97-313322bfa9d5_4861x3472.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1040,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1881204,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/178522686?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c8a5b44-c425-4802-ac97-313322bfa9d5_4861x3472.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sDOW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c8a5b44-c425-4802-ac97-313322bfa9d5_4861x3472.png 424w, https://substackcdn.com/image/fetch/$s_!sDOW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c8a5b44-c425-4802-ac97-313322bfa9d5_4861x3472.png 848w, https://substackcdn.com/image/fetch/$s_!sDOW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c8a5b44-c425-4802-ac97-313322bfa9d5_4861x3472.png 1272w, https://substackcdn.com/image/fetch/$s_!sDOW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c8a5b44-c425-4802-ac97-313322bfa9d5_4861x3472.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It feels so strange to make this post. This book, as a concept, notes, and blog posts to test ideas, has been rattling in my head for years, and it finally feels real to me.</p><p>When I started writing <em>From Heatmaps to Histograms</em>, I just wanted to make sense of cyber risk quantification; to write the book I couldn&#8217;t find anywhere else. Along the way, it became something bigger: a practical, readable guide for anyone who wants to really learn this stuff. I start from the very beginning, and we walk through a quantitative risk analysis step-by-step, one concept at a time, until we&#8217;ve built a real-life analysis together. I do remain a bit worried that the book will frustrate advanced practitioners, but I&#8217;ve sent out draft chapters as early reads to folks, and the feedback has been very positive. There is something for everyone, with techniques you won&#8217;t find in other cyber risk books.</p><p>&#127881; <strong>Preorders are officially live for my book, </strong><em><strong>From Heatmaps to Histograms: A Practical Guide to Cyber Risk Quantification.</strong></em><br><em>(Published by Apress/Springer Nature; release date March 2026)</em></p><h3><strong>&#128073; You can <a href="https://www.amazon.com/Heatmaps-Histograms-Practical-Guide-Quantification/dp/B0FX7V3J7D/">pre-order it on Amazon here</a>.</strong></h3><p>The release date on Amazon (June) is a placeholder; we&#8217;re pushing hard to get it released before the RSA Conference in late March. The price and release date will be updated as we get closer.</p><div><hr></div><h2><strong>What&#8217;s Inside</strong></h2><p>A big portion of the book tackles the hardest problem in CRQ: data. I show you how to find, normalize, and blend internal, external, and SME data using practical tools and AI-assisted techniques. Part 3, Solving the Data Problem, spans about 100 pages and focuses on these concepts. Here&#8217;s what&#8217;s covered: </p><h3><strong>Finding and Understanding the Right Data</strong></h3><ul><li><p>How to identify the <em>minimum viable dataset</em> for any scenario</p></li><li><p>The Three-Source Model (External, Internal, SME) and when each one matters</p></li><li><p>Data you already have but don&#8217;t realize you can use</p></li><li><p>How to find external benchmarks quickly, cheaply, and with quality checks</p></li></ul><h3><strong>Vetting and Trusting Data (The Missing Skill in CRQ)</strong></h3><ul><li><p>A complete data-quality scoring method (Relevance, Verifiability, Applicability, Coverage)</p></li><li><p>How to widen or tighten ranges depending on confidence</p></li><li><p>How to spot bias and overfitting in vendor reports</p></li><li><p>How to handle conflicting data without freezing or restarting</p></li></ul><h3><strong>Normalizing and Transforming Evidence</strong></h3><ul><li><p>Turning messy operational logs into analyzable frequency signals</p></li><li><p>Converting external single-point medians into three-point ranges</p></li><li><p>Using internal telemetry to adjust industry-based rates</p></li><li><p>When (and how) to drop unreliable data without breaking the model</p></li></ul><h3><strong>Working With Subject-Matter Experts (Without Getting Garbage Inputs)</strong></h3><ul><li><p>A repeatable elicitation method: P5/P50/P95, how to run a workshop, lightning-fast calibration</p></li><li><p>How to correct for anchoring and overconfidence</p></li><li><p>Structured interviews that produce defensible inputs</p></li><li><p>The &#8220;SME &#8594; Range Converter&#8221; method that turns intuition into modeling data</p></li></ul><h3><strong>Blending Data Using Bayesian Reasoning (In Plain English)</strong></h3><ul><li><p>A simple process for merging external data, internal signals, and SME judgment</p></li><li><p>How to update your belief transparently as new evidence arrives</p></li><li><p>Examples of real-world blended frequency and magnitude inputs</p></li><li><p>How Bayesian thinking prevents analysis paralysis and perfectionism</p></li></ul><h3><strong>AI-Forward Tools and Techniques</strong></h3><ul><li><p>Using LLMs to standardize data vetting, summarize telemetry, and generate SME prompts</p></li><li><p>Safe workflows to minimize hallucinations and maintain auditability</p></li><li><p>AI-assisted parsing of reports, logs, audit findings, and threat intel</p></li><li><p>Using GenAI to simulate synthetic incidents for practice and modeling</p></li></ul><h3><strong>Preparing Data for Modeling</strong></h3><ul><li><p>How to structure inputs for Monte Carlo simulations</p></li><li><p>Methods for checking logic before touching a spreadsheet</p></li><li><p>How to document traceability so your work survives scrutiny</p></li></ul><div><hr></div><h2>Why This Matters</h2><p>Part 3 is the heart of the book because <strong>data, not math, is what so many people tell me is their barrier to CRQ</strong>.</p><p>And this section gives readers the one thing practitioners desperately lack: <br><strong>a practical, step-by-step playbook for finding, fixing, trusting, and blending data in the real world.</strong></p><div><hr></div><h3><strong>Gratitude</strong></h3><p>This book wouldn&#8217;t exist without the SIRA and FAIR communities, the book&#8217;s technical reviewer <a href="https://www.linkedin.com/in/rdbrown3/">Rob Brown</a>, and the many people who pushed, challenged, and inspired me over the years. Rob&#8217;s depth of experience in decision analysis and quantitative modeling shaped some of the most important chapters in this book. His feedback was clear, candid, and always grounded in real practice; the kind that makes the work stronger, not just different. I&#8217;m grateful for his rigor, his patience, and his willingness to work through ideas with me until they held up under real-world scrutiny.</p><p>Thank you all for believing that better risk analysis is possible</p><div><hr></div><p>This isn&#8217;t just a book about risk, it&#8217;s about decisions, data, and how we understand uncertainty.</p><p>If my work has ever helped you think differently about risk, I hope you&#8217;ll <a href="https://www.amazon.com/Heatmaps-Histograms-Practical-Guide-Quantification/dp/B0FX7V3J7D/">preorder a copy</a> and help spread the word.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PEb-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89fe443d-5c7f-4db5-8230-d1f6dbb6c542_1280x722.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PEb-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89fe443d-5c7f-4db5-8230-d1f6dbb6c542_1280x722.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PEb-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89fe443d-5c7f-4db5-8230-d1f6dbb6c542_1280x722.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PEb-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89fe443d-5c7f-4db5-8230-d1f6dbb6c542_1280x722.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PEb-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89fe443d-5c7f-4db5-8230-d1f6dbb6c542_1280x722.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PEb-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89fe443d-5c7f-4db5-8230-d1f6dbb6c542_1280x722.jpeg" width="1280" height="722" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/89fe443d-5c7f-4db5-8230-d1f6dbb6c542_1280x722.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:722,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;And Now for Something Completely Different (1971) | MUBI&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="And Now for Something Completely Different (1971) | MUBI" title="And Now for Something Completely Different (1971) | MUBI" srcset="https://substackcdn.com/image/fetch/$s_!PEb-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89fe443d-5c7f-4db5-8230-d1f6dbb6c542_1280x722.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PEb-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89fe443d-5c7f-4db5-8230-d1f6dbb6c542_1280x722.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PEb-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89fe443d-5c7f-4db5-8230-d1f6dbb6c542_1280x722.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PEb-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F89fe443d-5c7f-4db5-8230-d1f6dbb6c542_1280x722.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h1>The Most Basic Thanksgiving Turkey Recipe - with Metrics!</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uM6j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc91621d-000a-4c0b-8b09-fab09d2ebbec_500x376.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uM6j!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc91621d-000a-4c0b-8b09-fab09d2ebbec_500x376.gif 424w, https://substackcdn.com/image/fetch/$s_!uM6j!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc91621d-000a-4c0b-8b09-fab09d2ebbec_500x376.gif 848w, https://substackcdn.com/image/fetch/$s_!uM6j!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc91621d-000a-4c0b-8b09-fab09d2ebbec_500x376.gif 1272w, https://substackcdn.com/image/fetch/$s_!uM6j!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc91621d-000a-4c0b-8b09-fab09d2ebbec_500x376.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uM6j!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc91621d-000a-4c0b-8b09-fab09d2ebbec_500x376.gif" width="500" height="376" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bc91621d-000a-4c0b-8b09-fab09d2ebbec_500x376.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:376,&quot;width&quot;:500,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Tom And Jerry Happy Thanksgiving GIF - Tom And Jerry Happy Thanksgiving  November - Discover &amp; Share GIFs&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Tom And Jerry Happy Thanksgiving GIF - Tom And Jerry Happy Thanksgiving  November - Discover &amp; Share GIFs" title="Tom And Jerry Happy Thanksgiving GIF - Tom And Jerry Happy Thanksgiving  November - Discover &amp; Share GIFs" srcset="https://substackcdn.com/image/fetch/$s_!uM6j!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc91621d-000a-4c0b-8b09-fab09d2ebbec_500x376.gif 424w, https://substackcdn.com/image/fetch/$s_!uM6j!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc91621d-000a-4c0b-8b09-fab09d2ebbec_500x376.gif 848w, https://substackcdn.com/image/fetch/$s_!uM6j!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc91621d-000a-4c0b-8b09-fab09d2ebbec_500x376.gif 1272w, https://substackcdn.com/image/fetch/$s_!uM6j!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc91621d-000a-4c0b-8b09-fab09d2ebbec_500x376.gif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I love Thanksgiving. Most cultures have a day of gratitude or a harvest festival, and this is ours. I also love cooking. I am moderately good at it, and when we host Thanksgiving, I always take on the turkey. It brings me great joy, not only because it tastes great, but because it is a genuinely hard problem. Cooking a turkey is easy. Cooking a great turkey is not.</p><p>I have gathered years of evidence from my own attempts and from watching my mother and grandmother. I treat the turkey like a high-stakes project with risk factors, mitigations, and real metrics. Metrics let me evaluate how things went and improve year over year.</p><h2>Turkey Cooking Objectives</h2><p>A successful Thanksgiving turkey checks four boxes:</p><ul><li><p>The bird is fully cooked and has no undercooked pockets.</p></li><li><p>It avoids the opposite failure mode of a dry, inedible breast. The challenge is navigating the narrow corridor between raw and dry.</p></li><li><p>It tastes good and has real flavor.</p></li><li><p>It finishes inside a predictable window, so the turkey and the sides all hit the table together.</p></li></ul><h2>My Turkey Golden Rules</h2><p><strong>Brining is optional, not mandatory</strong><br>People swear by wet brines, dry brines, or minimal seasoning. All can work. The only way to know what you prefer is to practice periodically throughout the year. I personally like a wet brine with salt, herbs, and spices.</p><p><strong>Keep the cavity mostly empty</strong><br>Stuffing the cavity with apples or onions smells amazing, but it slows cooking. Faster cooking helps keep the breast moist, so I recommend skipping this.</p><p><strong>Skip basting</strong><br>Opening the oven drops the temperature and lengthens cooking time. That creates more variation in the breast and thigh temperatures. Butter under the skin does more for moisture than basting.</p><h2>The Most Basic Recipe</h2><h3>Tools</h3><ul><li><p>Turkey lacer kit</p></li><li><p>Roasting pan and rack</p></li><li><p>Real thermometer, probe, or instant read</p></li></ul><h3>Ingredients</h3><ul><li><p>Turkey</p></li><li><p>Salt</p></li><li><p>Herb butter (butter mixed with thyme, rosemary, sage or whatever you like)</p></li></ul><h2>Prep Work</h2><ul><li><p>Thaw thoroughly. The USDA guidance is 24 hours in the refrigerator per 4 to 5 pounds.</p></li><li><p>Preheat to 325 F.</p></li><li><p>Remove packaging or brine bag and make sure the cavity is empty.</p></li><li><p>Lightly salt the inside and outside. Go lighter if you brined.</p></li><li><p>Loosen the breast skin and insert herb butter underneath.</p></li><li><p>Brush the outside with melted butter.</p></li><li><p>Pin the wings and tie the legs.</p></li><li><p>Estimate cooking time. At 325 F, 13 to 15 minutes per pound is a reasonable baseline.</p></li><li><p><strong>Optional</strong>: add a small amount of herbs or lemon to the cavity. Not too much or it slows airflow.</p></li><li><p><strong>Not Optional</strong>: <a href="https://stressbaking.com/how-to-calibrate-your-oven/">calibrate your oven</a>. Accuracy matters more than people think.</p></li></ul><h2>Cooking</h2><ul><li><p>Place the turkey in the oven.</p></li><li><p>Halfway through, tent the breast with foil to keep it from overcooking.</p></li><li><p>About 15 minutes before your projected finish time, start taking temperatures.</p><ul><li><p>Innermost part of the thigh</p></li><li><p>Thickest part of the breast</p></li></ul></li><li><p>Target temperature: USDA says 165 F in the breast. Some cooks pull the turkey at 160 F and let it rest, since carryover heat will finish the job. I usually stick to 165 for simplicity and food safety.</p></li><li><p>Let the turkey rest for 15 to 20 minutes before carving.</p></li></ul><div><hr></div><h1>The Metrics (KPIs and KRIs)</h1><p>If you are going to approach a turkey like a project, measurement is part of the fun. Metrics tell you whether the turkey hit the intended outcomes. KPIs tell you how the performance went. KRIs help you predict failures before they happen.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VbQH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6aa4bc1-fe70-4ddf-abf3-d79e1e826218_3647x1310.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VbQH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6aa4bc1-fe70-4ddf-abf3-d79e1e826218_3647x1310.png 424w, https://substackcdn.com/image/fetch/$s_!VbQH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6aa4bc1-fe70-4ddf-abf3-d79e1e826218_3647x1310.png 848w, https://substackcdn.com/image/fetch/$s_!VbQH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6aa4bc1-fe70-4ddf-abf3-d79e1e826218_3647x1310.png 1272w, https://substackcdn.com/image/fetch/$s_!VbQH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6aa4bc1-fe70-4ddf-abf3-d79e1e826218_3647x1310.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VbQH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6aa4bc1-fe70-4ddf-abf3-d79e1e826218_3647x1310.png" width="1456" height="523" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e6aa4bc1-fe70-4ddf-abf3-d79e1e826218_3647x1310.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:523,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:272272,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/178522686?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6aa4bc1-fe70-4ddf-abf3-d79e1e826218_3647x1310.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VbQH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6aa4bc1-fe70-4ddf-abf3-d79e1e826218_3647x1310.png 424w, https://substackcdn.com/image/fetch/$s_!VbQH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6aa4bc1-fe70-4ddf-abf3-d79e1e826218_3647x1310.png 848w, https://substackcdn.com/image/fetch/$s_!VbQH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6aa4bc1-fe70-4ddf-abf3-d79e1e826218_3647x1310.png 1272w, https://substackcdn.com/image/fetch/$s_!VbQH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6aa4bc1-fe70-4ddf-abf3-d79e1e826218_3647x1310.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here are the KPIs and one KRI I use.</p><h2>KPI #1: Cooking time accuracy</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DqnH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd681bd49-9eac-47d2-a90d-adc69753e993_2632x998.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DqnH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd681bd49-9eac-47d2-a90d-adc69753e993_2632x998.png 424w, https://substackcdn.com/image/fetch/$s_!DqnH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd681bd49-9eac-47d2-a90d-adc69753e993_2632x998.png 848w, https://substackcdn.com/image/fetch/$s_!DqnH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd681bd49-9eac-47d2-a90d-adc69753e993_2632x998.png 1272w, https://substackcdn.com/image/fetch/$s_!DqnH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd681bd49-9eac-47d2-a90d-adc69753e993_2632x998.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DqnH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd681bd49-9eac-47d2-a90d-adc69753e993_2632x998.png" width="1456" height="552" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d681bd49-9eac-47d2-a90d-adc69753e993_2632x998.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:552,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:96694,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/178522686?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd681bd49-9eac-47d2-a90d-adc69753e993_2632x998.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DqnH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd681bd49-9eac-47d2-a90d-adc69753e993_2632x998.png 424w, https://substackcdn.com/image/fetch/$s_!DqnH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd681bd49-9eac-47d2-a90d-adc69753e993_2632x998.png 848w, https://substackcdn.com/image/fetch/$s_!DqnH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd681bd49-9eac-47d2-a90d-adc69753e993_2632x998.png 1272w, https://substackcdn.com/image/fetch/$s_!DqnH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd681bd49-9eac-47d2-a90d-adc69753e993_2632x998.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>The turkey should finish within plus or minus 15 minutes of your forecasted cooking time. Too early or too late means your thermometer, your oven, or your recipe was off.</p><h2>KPI #2: Undercooked areas</h2><p>This is a binary metric. If any slice reveals pink or translucent meat, the KPI fails. Either the thermometer was off, you measured the wrong place or the bird was still partially frozen.</p><h2>KPIs for the subjective quality of the turkey</h2><p>Intangibles can be measured using observable signals from your guests. The next 4 KPIs measure guest sentiment.</p><h3>KPI #3: Percentage of people getting second helpings</h3><p>Some guests always get seconds and some never do. Compare to your historical baseline. If fewer than about 20 percent of guests get seconds, moisture or flavor were off target.</p><h3>KPI #4: Percentage of people overusing gravy</h3><p>Gravy is a masking agent for dry turkey. If more than about 40 percent of people are drowning their plates, the turkey is on the dry side. Adjust your threshold based on how gravy obsessed your family is.</p><h3>KPI #5: Percentage of kids refusing to eat it</h3><p>Kids under 10 do not hide their opinions. If half of them will not take a second bite, the turkey is dry, bland or both.</p><h3>KPI #6: Leftover disposition</h3><p>Great turkey gets eaten cold from the fridge. Mediocre turkey becomes soup. Bad turkey gets thrown out after a few days. If more than about 60 percent of your leftovers convert to soup or trash, the outcome missed the mark.</p><h3>KPI 7: Oven Temperature Stability </h3><p>This metric measures how much the oven&#8217;s actual temperature fluctuated around the target of 325&#176;F during cooking. Even well-calibrated ovens drift, and that variability affects cooking time, moisture, and predictability. This KPI captures how stable the heat source was throughout the roast.</p><h2>Predictive KRI: October sentiment check</h2><p>If in late October more than 50 percent of your household says things like &#8220;Let&#8217;s just order Chinese this year&#8221; or &#8220;Maybe we can keep it simple,&#8221; that is a valid early warning indicator. Past performance influences stakeholder confidence.</p><div><hr></div><h1>Final Thoughts</h1><p>Adjust thresholds based on your family&#8217;s preferences. Your KPIs will look different if you have gravy lovers, leftover hoarders or children who only eat food shaped like nuggets. The goal is not perfection. The goal is a predictable, enjoyable, low risk Thanksgiving.</p><p>Wishing you a delicious and successful holiday.</p><div><hr></div><h1><strong>&#9993;&#65039; Contact</strong></h1><p>Have a question about this, or anything else? Here&#8217;s how to reach me:</p><ul><li><p>Reply to this newsletter if reading via email</p></li><li><p>Comment below</p></li><li><p>Connect with me on <a href="https://www.linkedin.com/in/tonymartinvegue/">LinkedIn</a></p></li><li><p><a href="https://www.tonym-v.com/contact">Contact form</a></p></li></ul><div><hr></div><h1><strong>&#10084;&#65039; How You Can Help</strong></h1><p>&#9989; Share your questions or feedback in the comments below<br>&#9989; Forward this to a colleague<br>&#9989; Click the &#10084;&#65039; if you liked this issue</p><p>Thank you for reading. This Thanksgiving, I&#8217;m grateful for the support this community has given me.</p><p>&#8212;Tony</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Issue 5: What You Can't See Can Still Hurt You]]></title><description><![CDATA[How to quantify zero-event risks, emerging threats, and the unimaginable]]></description><link>https://newsletter.heatmapstohistograms.com/p/issue-5-what-you-cant-see-can-still</link><guid isPermaLink="false">https://newsletter.heatmapstohistograms.com/p/issue-5-what-you-cant-see-can-still</guid><dc:creator><![CDATA[Tony Martin-Vegue]]></dc:creator><pubDate>Tue, 28 Oct 2025 16:23:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Fq91!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb034cb91-adca-4714-84b2-69f0e4fa6985_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1><strong>&#128214; In This Month&#8217;s Issue:</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Fq91!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb034cb91-adca-4714-84b2-69f0e4fa6985_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Fq91!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb034cb91-adca-4714-84b2-69f0e4fa6985_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Fq91!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb034cb91-adca-4714-84b2-69f0e4fa6985_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Fq91!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb034cb91-adca-4714-84b2-69f0e4fa6985_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Fq91!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb034cb91-adca-4714-84b2-69f0e4fa6985_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Fq91!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb034cb91-adca-4714-84b2-69f0e4fa6985_1024x1024.png" width="506" height="506" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b034cb91-adca-4714-84b2-69f0e4fa6985_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:506,&quot;bytes&quot;:1664761,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/174805183?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb034cb91-adca-4714-84b2-69f0e4fa6985_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Fq91!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb034cb91-adca-4714-84b2-69f0e4fa6985_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Fq91!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb034cb91-adca-4714-84b2-69f0e4fa6985_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Fq91!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb034cb91-adca-4714-84b2-69f0e4fa6985_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Fq91!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb034cb91-adca-4714-84b2-69f0e4fa6985_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><strong>&#128203; Book update</strong>: Scenario building and measurable scope</p></li><li><p>&#129504; Three ways to quantify never-happened risks</p></li><li><p><strong>&#128215; Book excerpt:</strong> Handling &#8220;impossible&#8221; scenarios in workshops</p></li><li><p>&#9993;&#65039; Contact and how you can help</p></li></ul><div><hr></div><p>Hey there,</p><p><strong>Welcome to Issue 5!</strong> If you&#8217;ve ever been asked to quantify a risk your organization has never experienced, you know that sinking feeling. No internal data. No precedent. Just a blank Word doc and a decision-maker waiting for an answer.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>This issue gives you the framework. It won&#8217;t make the work easy, but it will make it possible.</p><div><hr></div><h1>&#128214; Book Update: The Art of Keeping Scope Tight</h1><p>I just finished up a rewrite of the scenario-building chapter, and it is turning into one of the most important parts of the entire book. This isn&#8217;t about dreaming up dramatic threat stories. It is about creating scenarios that keep stakeholders focused and give analysts something they can actually measure.</p><p>A beautifully crafted scenario is worthless if you cannot quantify it. The entire book builds from this foundation. Once we define a clear, measurable scenario, the next chapters show exactly how to estimate each component.</p><p>This is where risk analysis turns from speculation into numbers that support real decisions.</p><h2>A Cover, A Reviewer, and Some Gratitude</h2><p>Last week I spent a few hours going through cover image options with the publisher, and <strong>we picked a great one</strong>. I can&#8217;t share it yet, but I love it!</p><p>I&#8217;m incredibly grateful for the team at <a href="https://www.apress.com/us">Apress</a> for all their support throughout this process. Special thanks to <strong><a href="https://www.linkedin.com/in/rdbrown3/">Robert Brown</a></strong>, who is serving as the book&#8217;s technical reviewer. You might know him from his fantastic book, <em><a href="https://www.routledge.com/Business-Statistics-with-R/Brown/p/book/9780367460488">Business Statistics with R</a></em>. He&#8217;s been an invaluable sanity check on everything I&#8217;m writing.</p><h2>The Post-it Note Philosophy</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Q7OG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F055ca292-1328-4564-a33b-c5a4dd74c233_2761x2477.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Q7OG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F055ca292-1328-4564-a33b-c5a4dd74c233_2761x2477.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Q7OG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F055ca292-1328-4564-a33b-c5a4dd74c233_2761x2477.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Q7OG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F055ca292-1328-4564-a33b-c5a4dd74c233_2761x2477.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Q7OG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F055ca292-1328-4564-a33b-c5a4dd74c233_2761x2477.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Q7OG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F055ca292-1328-4564-a33b-c5a4dd74c233_2761x2477.jpeg" width="1456" height="1306" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/055ca292-1328-4564-a33b-c5a4dd74c233_2761x2477.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1306,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1860187,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/174805183?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F055ca292-1328-4564-a33b-c5a4dd74c233_2761x2477.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Q7OG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F055ca292-1328-4564-a33b-c5a4dd74c233_2761x2477.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Q7OG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F055ca292-1328-4564-a33b-c5a4dd74c233_2761x2477.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Q7OG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F055ca292-1328-4564-a33b-c5a4dd74c233_2761x2477.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Q7OG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F055ca292-1328-4564-a33b-c5a4dd74c233_2761x2477.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I posted this on LinkedIn a few weeks ago, and it encapsulates my philosophy behind my writing process. </p><p>There&#8217;s a Post-it note on my monitor that says: <strong>&#8220;Don&#8217;t melt the reader&#8217;s brain.&#8221;</strong></p><p>This simple reminder drives every page I write in my new book on cyber risk quantification.</p><p>Einstein said it best: &#8220;If you can&#8217;t explain it simply, you don&#8217;t understand it well enough.&#8221; In cybersecurity risk, we&#8217;ve become so accustomed to complexity that we&#8217;ve forgotten this fundamental truth.</p><p>My book &#8220;From Heatmaps to Histograms&#8221; takes the <strong>Lego block approach</strong>: </p><p>&#8594; Start with fundamentals (coin flips, basic probability)<br>&#8594; Build one concept on the last<br>&#8594; No brain-melting allowed</p><p>I&#8217;ve found that if you break complex ideas into small enough pieces, anyone can understand them. I learned this the hard way, struggling through textbooks at my kitchen counter until probability finally clicked.</p><p>Writing this book taught me that <strong>the biggest breakthrough in cyber risk isn&#8217;t more sophisticated math</strong>. It&#8217;s making quantitative thinking accessible to practitioners who need it most.</p><p>I&#8217;m constantly looking at that Post-it note, reminding myself who I&#8217;m writing for: <strong>it&#8217;s me 15 years ago, and everyone else who&#8217;s been there too.</strong></p><div><hr></div><h2><strong>&#129504; </strong>How to Quantify What You&#8217;ve Never Seen: A Taxonomy of Unknown Risks</h2><h3>A Practical Taxonomy for Risks We Haven&#8217;t Lived Yet</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1609870494386-4eaf3fd22580?fm=jpg&amp;q=60&amp;w=3000&amp;ixlib=rb-4.1.0&amp;ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1609870494386-4eaf3fd22580?fm=jpg&amp;q=60&amp;w=3000&amp;ixlib=rb-4.1.0&amp;ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D 424w, https://images.unsplash.com/photo-1609870494386-4eaf3fd22580?fm=jpg&amp;q=60&amp;w=3000&amp;ixlib=rb-4.1.0&amp;ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D 848w, https://images.unsplash.com/photo-1609870494386-4eaf3fd22580?fm=jpg&amp;q=60&amp;w=3000&amp;ixlib=rb-4.1.0&amp;ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D 1272w, https://images.unsplash.com/photo-1609870494386-4eaf3fd22580?fm=jpg&amp;q=60&amp;w=3000&amp;ixlib=rb-4.1.0&amp;ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1609870494386-4eaf3fd22580?fm=jpg&amp;q=60&amp;w=3000&amp;ixlib=rb-4.1.0&amp;ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D" width="3000" height="4500" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1609870494386-4eaf3fd22580?fm=jpg&amp;q=60&amp;w=3000&amp;ixlib=rb-4.1.0&amp;ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4500,&quot;width&quot;:3000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;grayscale photo of bridge on mountain&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="grayscale photo of bridge on mountain" title="grayscale photo of bridge on mountain" srcset="https://images.unsplash.com/photo-1609870494386-4eaf3fd22580?fm=jpg&amp;q=60&amp;w=3000&amp;ixlib=rb-4.1.0&amp;ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D 424w, https://images.unsplash.com/photo-1609870494386-4eaf3fd22580?fm=jpg&amp;q=60&amp;w=3000&amp;ixlib=rb-4.1.0&amp;ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D 848w, https://images.unsplash.com/photo-1609870494386-4eaf3fd22580?fm=jpg&amp;q=60&amp;w=3000&amp;ixlib=rb-4.1.0&amp;ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D 1272w, https://images.unsplash.com/photo-1609870494386-4eaf3fd22580?fm=jpg&amp;q=60&amp;w=3000&amp;ixlib=rb-4.1.0&amp;ixid=M3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%3D%3D 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Most risk programs live comfortably inside the obvious: phishing, ransomware, and BEC. But what about the risks that haven&#8217;t happened to you, or to anyone? This post explores how to think and model at the edge of experience, where data ends.</p><div><hr></div><p>This idea surfaced while I was writing the risk scenario chapter of my book. That chapter focuses on the obvious: phishing, ransomware, business email compromise, the kinds of risks that, in most organizations, happen most often.</p><p>But as I wrote, a question kept lingering in the margins. What about the other kinds of risk, the ones that haven&#8217;t happened yet? Do we have a place for them?</p><p>We do, but it&#8217;s harder to get there. That&#8217;s the edge of scenario thinking, where imagination meets quantification and where the data ends, but the analysis doesn&#8217;t.</p><p>Every risk analyst eventually faces the same uncomfortable question: <strong>How do we quantify a risk that&#8217;s never happened to us?</strong></p><p>It&#8217;s one of the most complex problems in our field because it exposes a truth we don&#8217;t often say out loud. We&#8217;re expected to be rigorous and data-driven, yet much of our work extends beyond firsthand experience.</p><p>We model what we&#8217;ve seen: incident tickets, logs, audit findings, but we also have to model what we haven&#8217;t seen: a supply chain attack that&#8217;s hit peers but not us, an AI-driven threat that hasn&#8217;t materialized yet, or a failure type no one has imagined.</p><p>These aren&#8217;t the same analytical problem. Treating them as if they are is where many risk programs go wrong. A risk that&#8217;s happened to others but not to you demands a very different approach than one no one has experienced, which again differs from one no one can even conceive of.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lpDi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2bab241-f879-4247-837a-7ed2a469af1e_3000x2250.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lpDi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2bab241-f879-4247-837a-7ed2a469af1e_3000x2250.png 424w, https://substackcdn.com/image/fetch/$s_!lpDi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2bab241-f879-4247-837a-7ed2a469af1e_3000x2250.png 848w, https://substackcdn.com/image/fetch/$s_!lpDi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2bab241-f879-4247-837a-7ed2a469af1e_3000x2250.png 1272w, https://substackcdn.com/image/fetch/$s_!lpDi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2bab241-f879-4247-837a-7ed2a469af1e_3000x2250.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lpDi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2bab241-f879-4247-837a-7ed2a469af1e_3000x2250.png" width="728" height="546" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d2bab241-f879-4247-837a-7ed2a469af1e_3000x2250.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:307330,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/174805183?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2bab241-f879-4247-837a-7ed2a469af1e_3000x2250.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lpDi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2bab241-f879-4247-837a-7ed2a469af1e_3000x2250.png 424w, https://substackcdn.com/image/fetch/$s_!lpDi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2bab241-f879-4247-837a-7ed2a469af1e_3000x2250.png 848w, https://substackcdn.com/image/fetch/$s_!lpDi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2bab241-f879-4247-837a-7ed2a469af1e_3000x2250.png 1272w, https://substackcdn.com/image/fetch/$s_!lpDi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2bab241-f879-4247-837a-7ed2a469af1e_3000x2250.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Through experience, I&#8217;ve come to see these as <strong>three distinct levels of &#8220;never happened&#8221; risk</strong>, each requiring its own mindset and method.</p><h2><strong>The Three Levels of &#8220;Never Happened&#8221; Risk</strong></h2><h3><strong>1. Unexperienced but Observable</strong></h3><p><em>(It hasn&#8217;t happened to us, but it has to others.)</em></p><p>This is the most common and the easiest to quantify. These are the zero-event risks in your organization, scenarios that exist elsewhere in the world but haven&#8217;t touched you yet.</p><p>Your stance here is empirical. Treat the world as your dataset. Pull base rates from peers, incident databases, or industry research. Adjust for your own context, such as size, control maturity, and exposure, and you can build a defensible range.</p><p>When SolarWinds was disclosed in 2020, many companies hadn&#8217;t been hit but were clearly exposed. We built models using published incident counts, vendor integration data, and internal telemetry to estimate local probability and impact. The result wasn&#8217;t perfect, but it was grounded in evidence.</p><p>The mistake is assuming that because it hasn&#8217;t happened here, it can&#8217;t happen here.</p><p><strong>Key mindset:</strong> the absence of local evidence doesn&#8217;t mean the risk is zero.</p><h3><strong>2. Unrealized but Conceivable</strong></h3><p><em>(It hasn&#8217;t happened to anyone yet, but we can describe how it could.)</em></p><p>This is the analytical frontier. Plausible, but unobserved. Examples include quantum decryption of current algorithms or AI-generated polymorphic malware that learns as it attacks.</p><p>Your stance here is analogical. You reason by pattern and proximity. Look at adjacent technologies or transitions: how quickly did similar systems in the past move from secure to compromised? Use expert elicitation to fill data gaps, but structure it using calibrated ranges rather than gut-check opinions.</p><p>In 2013, I modeled the risk of blockchain wallet compromise before any major exchange hacks had occurred. I used online banking fraud frequencies as a proxy, then adjusted for immaturity and control gaps. A year later, the first major breaches confirmed the model's direction.</p><p>The trap here is cherry-picking analogies that confirm fear or bias. The antidote is breadth: collect multiple comparables, build a distribution, and reason from the middle.</p><p><strong>Key mindset:</strong> analogical reasoning isn&#8217;t guessing; it&#8217;s disciplined extrapolation.</p><h3><strong>3. Inconceivable and Unimaginable</strong></h3><p><em>(We can&#8217;t yet describe it because we can&#8217;t yet imagine it.)</em></p><p>This is the domain of true surprise, the &#8220;how did no one see this coming?&#8221; events. Before 9/11, few imagined coordinated hijackings as guided missiles. Before Stuxnet, few imagined air-gapped industrial systems being sabotaged via USB. This is the core subject of Taleb&#8217;s book, <em><a href="https://www.amazon.com/Black-Swan-Improbable-Robustness-Fragility/dp/081297381X">The Black Swan</a>.</em></p><p>You can&#8217;t model the probability of something you can&#8217;t conceive, but you can model your resilience to it.</p><p>Your stance here is architectural. Focus on designing systems that can absorb shocks and adapt. Build redundancy, strengthen detection, and practice incident response. Model impact categories rather than specific causes, such as availability, integrity, confidentiality, productivity, fines, and reputation.</p><p>When you can&#8217;t quantify the odds, quantify your capacity to recover.</p><p><strong>Key mindset:</strong> when you reach the edge of prediction, move to resilience.</p><h2><strong>Universal Lessons</strong></h2><p>No matter which level of &#8220;never happened&#8221; risk you&#8217;re dealing with, three principles hold true.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dAmb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb02a48-5f33-4b20-b254-4157701b3cf0_2307x2108.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dAmb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb02a48-5f33-4b20-b254-4157701b3cf0_2307x2108.png 424w, https://substackcdn.com/image/fetch/$s_!dAmb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb02a48-5f33-4b20-b254-4157701b3cf0_2307x2108.png 848w, https://substackcdn.com/image/fetch/$s_!dAmb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb02a48-5f33-4b20-b254-4157701b3cf0_2307x2108.png 1272w, https://substackcdn.com/image/fetch/$s_!dAmb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb02a48-5f33-4b20-b254-4157701b3cf0_2307x2108.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dAmb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb02a48-5f33-4b20-b254-4157701b3cf0_2307x2108.png" width="1456" height="1330" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cb02a48-5f33-4b20-b254-4157701b3cf0_2307x2108.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1330,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:266080,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/174805183?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb02a48-5f33-4b20-b254-4157701b3cf0_2307x2108.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dAmb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb02a48-5f33-4b20-b254-4157701b3cf0_2307x2108.png 424w, https://substackcdn.com/image/fetch/$s_!dAmb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb02a48-5f33-4b20-b254-4157701b3cf0_2307x2108.png 848w, https://substackcdn.com/image/fetch/$s_!dAmb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb02a48-5f33-4b20-b254-4157701b3cf0_2307x2108.png 1272w, https://substackcdn.com/image/fetch/$s_!dAmb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cb02a48-5f33-4b20-b254-4157701b3cf0_2307x2108.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ol><li><p><strong>Start with the decision.</strong> Know what choice the analysis is meant to inform. If the decision wouldn&#8217;t change whether the probability is 0.1% or 1%, stop polishing decimals.<br></p></li><li><p><strong>Use structured expert judgment.</strong> Calibrate experts with seed questions, capture ranges (P5, P50, P95), and reward accuracy, not seniority.<br></p></li><li><p><strong>Measure when more precision matters.</strong> If perfect information wouldn&#8217;t change the decision, it&#8217;s not worth chasing.</p></li></ol><h2><strong>The Deeper Lesson</strong></h2><p>The most dangerous risks aren&#8217;t always the unimaginable ones. They&#8217;re the obvious ones we&#8217;ve seen elsewhere, but we convince ourselves that they don&#8217;t apply.</p><p>What makes great risk analysis isn&#8217;t omniscience, it&#8217;s clarity. Knowing what kind of &#8220;never happened&#8221; risk you&#8217;re facing tells you which tools will work and which will waste time.</p><p>Quantification doesn&#8217;t end where experience stops. It just changes form.</p><div><hr></div><h2><strong>&#128215; Book Excerpt: The Philosophy of &#8220;Impossible&#8221; Risk Scenarios</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!c5ee!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7447c24c-43c5-447e-a5ae-0f200a43c003_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!c5ee!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7447c24c-43c5-447e-a5ae-0f200a43c003_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!c5ee!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7447c24c-43c5-447e-a5ae-0f200a43c003_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!c5ee!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7447c24c-43c5-447e-a5ae-0f200a43c003_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!c5ee!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7447c24c-43c5-447e-a5ae-0f200a43c003_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!c5ee!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7447c24c-43c5-447e-a5ae-0f200a43c003_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7447c24c-43c5-447e-a5ae-0f200a43c003_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!c5ee!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7447c24c-43c5-447e-a5ae-0f200a43c003_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!c5ee!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7447c24c-43c5-447e-a5ae-0f200a43c003_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!c5ee!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7447c24c-43c5-447e-a5ae-0f200a43c003_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!c5ee!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7447c24c-43c5-447e-a5ae-0f200a43c003_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>&#8220;You just said a tsunami can&#8217;t destroy a datacenter in Omaha. What about a mega-tsunami?&#8221;</em></p><p>If you have ever run a risk brainstorming workshop, you know how quickly the conversation can drift into philosophical debates about what is truly possible. </p><p>I&#8217;ve been in this meeting many times. We're talking about website outage scenarios, and suddenly, we are discussing asteroid impacts and mega-tsunamis instead of the actual decisions a CISO needs to make next quarter.</p><p>This piece is about getting the room back on track. It explains why we bracket remote scenarios and focus our limited time and attention where it matters. I ended up cutting and condensing this section for the chapter, but it stands well on its own. I will share a couple of the other trimmed pieces in the next issue.</p><blockquote><p>This pushback on absolute claims is philosophically valid. When analysts say something is &#8220;impossible,&#8221; they&#8217;re not claiming logical impossibility (like a square circle) or even physical impossibility (like faster-than-light travel).</p><p>They&#8217;re talking about practical impossibility: scenarios so remote that modeling them would waste resources better spent on actionable risks. This connects to practical reason: cognitive and analytical resources are finite, so analysts must focus on possibilities that could meaningfully inform decisions.</p><p>As philosopher William James noted, beliefs should be judged by their practical consequences. A &#8220;mega-tsunami reaching Omaha&#8221; scenario might be theoretically possible via Earth-altering events (e.g., planetary impact, complete crust displacement) but it fails the pragmatic test: it won&#8217;t help a CISO allocate next year&#8217;s security budget.</p><p>Risk analysis is an exercise in practical wisdom (what Aristotle called phronesis), not exhaustive enumeration of every conceivable threat. Analysts set aside (called bracketing) extremely remote possibilities not because they can prove they&#8217;re impossible, but because doing so helps them focus on scenarios that actually matter for business decisions.</p></blockquote><div><hr></div><h2><strong>&#128218; What I&#8217;m Reading</strong></h2><ul><li><p><strong><a href="https://www.linkedin.com/pulse/curiosity-didnt-kill-cat-inquiry-based-learning-risk-erin-eilers-y4wxe/?trackingId=tpP7WCAkSxehWX8AjITxNA%3D%3D">Curiosity Didn&#8217;t Kill the Cat</a></strong> by <a href="https://www.linkedin.com/in/erineilers/">Erin Eilers</a></p><p>A reminder that great risk identification starts with great questions. AI can surface patterns, but human curiosity reveals the blind spots.</p></li><li><p><strong><a href="https://diffuser.substack.com/p/outside-in-and-inside-out-superforecasting">Outside In and Inside Out Superforecasting</a></strong> by <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a></p><p>A great reminder that even strong models need human judgment. Forecasting is not about precision for its own sake. It is about making decisions with the uncertainty we have.</p></li></ul><div><hr></div><h2><strong>&#9993;&#65039; Contact</strong></h2><p>Have a question about risk analysis, or have a general question? Here&#8217;s how to contact me:</p><ul><li><p>Reply to this newsletter if you received it via email</p></li><li><p>Comment below</p></li><li><p>Connect on <a href="https://www.linkedin.com/in/tonymartinvegue/">LinkedIn</a></p></li><li><p><a href="https://www.heatmapstohistograms.com/contact">Contact form</a></p></li></ul><p>What specific risk analysis challenges are you facing? Hit reply and let me know.</p><div><hr></div><h2><strong>&#10084;&#65039; How You Can Help</strong></h2><p>&#9989; Tell me what topics you want covered: beginner, advanced, tools, AI use, anything<br>&#9989; Forward this to a colleague who&#8217;s curious about CRQ<br>&#9989; Click the &#10084;&#65039; or comment if you found this useful</p><p>If someone forwarded this to you, please subscribe to get future issues.</p><p>&#8212; Tony</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Issue 4: Beyond the Hammer]]></title><description><![CDATA[Smarter ways to frame risk, and the skills analysts need in the age of AI]]></description><link>https://newsletter.heatmapstohistograms.com/p/issue-4-beyond-the-hammer</link><guid isPermaLink="false">https://newsletter.heatmapstohistograms.com/p/issue-4-beyond-the-hammer</guid><dc:creator><![CDATA[Tony Martin-Vegue]]></dc:creator><pubDate>Tue, 16 Sep 2025 15:02:36 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Tolv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad895bb-8d44-4654-a9f7-14d2d01613ba_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1><strong>In This Issue:</strong></h1><ul><li><p><strong>&#128214; Book Update: Part 2 Complete</strong></p></li><li><p><strong>&#127919; The First Thing I Do When Someone Asks for a Risk Analysis</strong></p></li><li><p><strong>&#128161; Risk Analyst Skills Evolution</strong></p></li><li><p>&#128172;  <strong>Reader Question:</strong> <strong>Which skills do you think will matter most for risk analysts in the next five years?</strong></p></li></ul><div><hr></div><p>Hi!<br>I&#8217;m still experimenting with shorter, more frequent newsletter issues. Please let me know your thoughts. Drop a comment below, or just like this post.</p><h1><strong>&#128214; Book Update: Part 2 Complete</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Tolv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad895bb-8d44-4654-a9f7-14d2d01613ba_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Tolv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad895bb-8d44-4654-a9f7-14d2d01613ba_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Tolv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad895bb-8d44-4654-a9f7-14d2d01613ba_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Tolv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad895bb-8d44-4654-a9f7-14d2d01613ba_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Tolv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad895bb-8d44-4654-a9f7-14d2d01613ba_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Tolv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad895bb-8d44-4654-a9f7-14d2d01613ba_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9ad895bb-8d44-4654-a9f7-14d2d01613ba_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2074841,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/173626074?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad895bb-8d44-4654-a9f7-14d2d01613ba_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Tolv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad895bb-8d44-4654-a9f7-14d2d01613ba_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!Tolv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad895bb-8d44-4654-a9f7-14d2d01613ba_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!Tolv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad895bb-8d44-4654-a9f7-14d2d01613ba_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!Tolv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ad895bb-8d44-4654-a9f7-14d2d01613ba_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Part 2 sets the foundations for quantitative risk analysis, demystifies the Monte Carlo method, and walks readers through what may be their first quantitative risk analysis. I&#8217;m writing the book out of order, tackling the hardest chapters first. It&#8217;s 20 chapters, and I have 14 done. Getting close!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Here&#8217;s a quick snapshot of what Part 2 covers.</p><h3>Chapter 4: Foundations</h3><p><strong>Building the Right Mindset for Risk Assessment</strong></p><p>This chapter establishes the core philosophy that risk assessment exists to support better decisions, not create compliance theater. Key concepts include adopting a "less wrong" mindset that acknowledges all models are imperfect yet useful, understanding that uncertainty is valuable information rather than a flaw, and learning essential vocabulary, such as the distinction between frequency and probability. The chapter emphasizes starting small with one decision and one scenario rather than trying to revolutionize everything at once.</p><h3>Chapter 5: Your First Quantitative Risk Assessment</h3><p><strong>From Theory to Practice with Monte Carlo</strong></p><p>Chapter 5 walks readers through their first hands-on quantitative assessment using a practical example of forecasting lost or broken mobile phones. It introduces the fundamental concepts of frequency (how often bad things happen) and magnitude (how much they cost), then combines them using Monte Carlo simulation in Excel. This chapter bridges the gap between theory and practice, showing how to build confidence through a simple, real-world exercise that demonstrates the basic risk equation in action.</p><h3>Chapter 6: Interpreting and Communicating Results</h3><p><strong>Turning Numbers into Clear Risk Stories</strong></p><p>This chapter focuses on what to do with quantitative results once you have them. It teaches essential statistical concepts like mean, median, and percentiles, then introduces key visualization tools including histograms, box plots, and loss exceedance curves. The chapter also provides practical guidance on communicating findings to executives while avoiding common reporting pitfalls.<br><strong><br>Pre-order links are coming any day now. Check <a href="http://www.heatmapstohistograms.com/">www.heatmapstohistograms.com</a></strong></p><div><hr></div><h1>The First Thing I Do When Someone Asks for a Risk Analysis</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LDWM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6230189-055b-4e62-94be-217ef27c0fa5_1024x683.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LDWM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6230189-055b-4e62-94be-217ef27c0fa5_1024x683.jpeg 424w, https://substackcdn.com/image/fetch/$s_!LDWM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6230189-055b-4e62-94be-217ef27c0fa5_1024x683.jpeg 848w, https://substackcdn.com/image/fetch/$s_!LDWM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6230189-055b-4e62-94be-217ef27c0fa5_1024x683.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!LDWM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6230189-055b-4e62-94be-217ef27c0fa5_1024x683.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LDWM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6230189-055b-4e62-94be-217ef27c0fa5_1024x683.jpeg" width="1024" height="683" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f6230189-055b-4e62-94be-217ef27c0fa5_1024x683.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:683,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:354218,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/173626074?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6230189-055b-4e62-94be-217ef27c0fa5_1024x683.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LDWM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6230189-055b-4e62-94be-217ef27c0fa5_1024x683.jpeg 424w, https://substackcdn.com/image/fetch/$s_!LDWM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6230189-055b-4e62-94be-217ef27c0fa5_1024x683.jpeg 848w, https://substackcdn.com/image/fetch/$s_!LDWM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6230189-055b-4e62-94be-217ef27c0fa5_1024x683.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!LDWM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff6230189-055b-4e62-94be-217ef27c0fa5_1024x683.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">"<a href="https://www.flickr.com/photos/45409431@N00/14481855815">decisions ( #cc )</a>" by <a href="https://www.flickr.com/photos/45409431@N00">marfis75</a> is licensed under <a href="https://creativecommons.org/licenses/by-sa/2.0/?ref=openverse">CC BY-SA 2.0</a>.</figcaption></figure></div><p>When someone asks me to &#8220;<strong>do a risk analysis</strong>,&#8221; the first thing I try to do is talk myself out of it.</p><p>That may sound strange. Risk analysis is <strong>what I do</strong>, and I have built my career around it. I have also learned the hard way that risk analysis is not always the right tool. Sometimes the most helpful thing I can do is pause and ask a few questions before I ever start modeling.</p><h2>A Painful Lesson</h2><p>Early in my career, I ran what I thought was an excellent risk assessment. I spent weeks pulling data, interviewing stakeholders, and running simulations. When I finally presented the results, the decision maker looked at me politely and said, <em>&#8220;This is interesting, but we already decided what we are going to do.&#8221;</em></p><p>That moment stuck with me. My analysis was technically solid but practically useless, because the decision had already been made. I had answered a question nobody was asking.</p><p>Ever since, I have developed a habit: when someone requests a risk analysis, I first try to <strong>talk myself out of it</strong>.</p><h2>The Hammer and the Nail</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KnYd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3672b906-2aa6-4fcd-b565-82e1c8728bb3_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KnYd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3672b906-2aa6-4fcd-b565-82e1c8728bb3_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!KnYd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3672b906-2aa6-4fcd-b565-82e1c8728bb3_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!KnYd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3672b906-2aa6-4fcd-b565-82e1c8728bb3_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!KnYd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3672b906-2aa6-4fcd-b565-82e1c8728bb3_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KnYd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3672b906-2aa6-4fcd-b565-82e1c8728bb3_1024x1024.png" width="458" height="458" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3672b906-2aa6-4fcd-b565-82e1c8728bb3_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:458,&quot;bytes&quot;:1603685,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/173626074?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3672b906-2aa6-4fcd-b565-82e1c8728bb3_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!KnYd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3672b906-2aa6-4fcd-b565-82e1c8728bb3_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!KnYd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3672b906-2aa6-4fcd-b565-82e1c8728bb3_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!KnYd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3672b906-2aa6-4fcd-b565-82e1c8728bb3_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!KnYd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3672b906-2aa6-4fcd-b565-82e1c8728bb3_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The Law of the Instrument: if all you have is a hammer, everything looks like a nail</figcaption></figure></div><p>There is a bias I try to keep in check. Psychologists call it the <strong><a href="https://en.wikipedia.org/wiki/Law_of_the_instrument">Law of the Instrument</a></strong>, sometimes referred to as Maslow&#8217;s Hammer. <em>If all you have is a hammer, everything looks like a nail.</em> For me, risk analysis is that hammer. It is powerful. However, not every problem is a nail.</p><p>Before I swing it, I ask: <em>What problem are we really trying to solve?</em></p><h2>My Field Notes: If You Are Asking for That&#8230; Try This Instead</h2><p>Over time, I have built a giant notebook filled with scribbles on the alternatives to risk analysis.  In other words: &#8220;if you ask for this, what you may need is this.&#8221; Here are some of the most common ones I see:</p><ul><li><p><em>Document a decision you already made</em> &#8594; <strong>Decision log</strong></p></li><li><p><em>Could this threat group break in?</em> &#8594; <strong>Threat modeling or red team</strong></p></li><li><p><em>What&#8217;s the consequences if a system goes down?</em> &#8594; <strong>Business impact analysis or continuity plan</strong></p></li><li><p><em>What happens if ransomware hits us?</em> &#8594; <strong>Tabletop exercise</strong></p></li><li><p><em>Which vulnerabilities should we prioritize?</em> &#8594; <strong>Vulnerability management and threat intel</strong></p></li><li><p><em>Are we compliant with regulation X?</em> &#8594; <strong>Gap assessment or audit</strong></p></li><li><p><em>Prove the program is effective</em> &#8594; <strong>Metrics and KPIs</strong></p></li><li><p><em>Where are we most exposed?</em> &#8594; <strong>Attack surface mapping</strong></p></li><li><p><em>Compare vendors</em> &#8594; <strong>Third-party risk management</strong></p></li><li><p><em>Forecast budget needs</em> &#8594; <strong>Scenario planning or financial modeling</strong></p></li><li><p><em>Help us choose between two strategies</em> &#8594; <strong>Decision matrix or Multiple-criteria decision analysis</strong></p></li><li><p><em>Where are our process weaknesses?</em> &#8594; <strong>SWOT or root cause analysis</strong></p></li><li><p><em>Justify an initiative to executives</em> &#8594; <strong>Business case</strong></p></li><li><p><em>Estimate the cost of an incident after the fact</em> &#8594; <strong>Post-incident review</strong></p></li><li><p><em>Show how we compare to peers</em> &#8594; <strong>Benchmarking</strong></p></li></ul><p>These tools are not dead ends. They are on-ramps. A tabletop may surface uncertainty about the probability and magnitude of ransomware losses. A business case may expose unclear alternatives or competing preferences. A compliance gap assessment may highlight trade-offs between risk reduction and business friction. </p><p>Each of these is an opportunity to turn the conversation into a quantitative risk analysis once the uncertainty is clear and the decision is tied to objectives.</p><p>The real payoff is cooperation. Working with continuity teams on a BIA, with compliance on a gap assessment, or with finance on scenario modeling creates shared language. It shows security is not just a critic on the sidelines, but a partner helping the business connect the dots. That is how we expand influence and make risk analysis something the whole organization values.</p><h2>When a Risk Analysis Is Warranted</h2><p>A risk analysis is justified only when a decision is made that matters, tied to organizational objectives, and faces material uncertainty about a future event whose probability and impact can be estimated well enough to inform action.</p><p>That means several conditions need to be true:</p><ol><li><p><strong>Clear decision statement</strong> &#8211; The problem can be framed as a real choice between alternatives (&#8220;Should we do A, B, or C?&#8221;).</p></li><li><p><strong>Link to objectives</strong> &#8211; The decision is directly connected to the organization's goals, mission, or priorities.</p></li><li><p><strong>Decision owner</strong> &#8211; Someone is accountable for making the call and acting on the results.</p></li><li><p><strong>Uncertainty that matters</strong> &#8211; There is genuine uncertainty about the outcome, and reducing it would influence the decision.</p></li><li><p><strong>Defined preferences</strong> &#8211; We understand what matters in choosing between alternatives (cost, uptime, safety, growth).</p></li><li><p><strong>Meaningful information</strong> &#8211; We have, or can generate, enough data to credibly estimate probability and impact.</p></li><li><p><strong>Actionability</strong> &#8211; The results will drive behavior or resource allocation, not sit on a shelf.</p></li><li><p><strong>Stopping rule</strong> &#8211; We know when additional analysis no longer changes the decision.</p></li></ol><p>If a request does not pass these tests, it usually belongs in one of the alternative tools above. If it does, then a risk analysis can truly add value.</p><h2>When Risk Analysis Really Matters</h2><p>When those tests are satisfied, that is when risk analysis shines.</p><ul><li><p>It is the right tool when we need to allocate resources and compare competing investments. </p></li><li><p>It is the right tool when we are setting risk tolerance and need to understand plausible loss ranges. </p></li><li><p>It is the right tool when we are evaluating a high-stakes initiative like a cloud migration or an acquisition.</p></li><li><p>It is the right tool when leadership asks, &#8220;If I give you $X, how much risk does it reduce?&#8221; </p></li><li><p>It is the right tool when we want to see how risks add up across the enterprise. </p></li><li><p>It is the right tool when we are negotiating insurance.</p></li><li><p>It is the right tool when we need to show the board not just what might happen, but how likely and how big.</p></li></ul><p>Those are the moments when probabilistic modeling earns its keep.</p><h2>The Discipline of Saying No</h2><p>Trying to talk myself out of a risk analysis is not a sign of cynicism. It is discipline. It forces me to check decision quality, ownership, and alignment with organizational priorities. It helps me resist the hammer-and-nail bias. It also ensures that when I do deliver a risk analysis, it answers a real question that matters.</p><p>The result is sharper insights, stronger cooperation across teams, and decisions that leaders are willing to act on.</p><p>That, to me, is the craft.</p><div><hr></div><h1>The Risk Analyst Skills Evolution</h1><p>I recently gave a talk at the <strong><a href="https://www.societyinforisk.org/">Society of Information Risk Analysis</a> (SIRA)</strong> annual conference, SIRAcon 2025. My session was titled <em>&#8220;Quantifying in the Age of Hallucination: How I Learned to Stop Worrying and Trust the AI (Sometimes).&#8221;</em> It explored how AI is changing the way we do risk analysis, what it is good at, where it is dangerous, and how our skills as analysts are evolving.</p><p>If you are not a member of SIRA, you should consider joining. It is a great community focused on advancing the practice of risk analysis. If you are already a member, the video of my talk should be up soon.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3wi_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2874331-b3ab-4d5e-967b-578644c84ced_720x540.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3wi_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2874331-b3ab-4d5e-967b-578644c84ced_720x540.jpeg 424w, https://substackcdn.com/image/fetch/$s_!3wi_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2874331-b3ab-4d5e-967b-578644c84ced_720x540.jpeg 848w, https://substackcdn.com/image/fetch/$s_!3wi_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2874331-b3ab-4d5e-967b-578644c84ced_720x540.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!3wi_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2874331-b3ab-4d5e-967b-578644c84ced_720x540.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3wi_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2874331-b3ab-4d5e-967b-578644c84ced_720x540.jpeg" width="580" height="435" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f2874331-b3ab-4d5e-967b-578644c84ced_720x540.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:720,&quot;resizeWidth&quot;:580,&quot;bytes&quot;:226593,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/173626074?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2874331-b3ab-4d5e-967b-578644c84ced_720x540.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3wi_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2874331-b3ab-4d5e-967b-578644c84ced_720x540.jpeg 424w, https://substackcdn.com/image/fetch/$s_!3wi_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2874331-b3ab-4d5e-967b-578644c84ced_720x540.jpeg 848w, https://substackcdn.com/image/fetch/$s_!3wi_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2874331-b3ab-4d5e-967b-578644c84ced_720x540.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!3wi_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2874331-b3ab-4d5e-967b-578644c84ced_720x540.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When I think about the future of our field, this is the slide that keeps me up at night.</p><p>AI is already handling a lot of what used to be core to our jobs. It excels at routine calculations, summarizing reports, creating first drafts, building simple visualizations, and even assisting with compliance checks. These are things I used to spend hours on earlier in my career, but now I can ask an AI tool to take a first pass, and it often does a decent job. The time savings are real, but it also makes me pause. <em>If AI is doing this now, what will be left in five years?</em></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jlAn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F004f2878-1f70-4f1d-8d02-370f32bc4e6b_720x540.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jlAn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F004f2878-1f70-4f1d-8d02-370f32bc4e6b_720x540.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jlAn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F004f2878-1f70-4f1d-8d02-370f32bc4e6b_720x540.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jlAn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F004f2878-1f70-4f1d-8d02-370f32bc4e6b_720x540.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jlAn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F004f2878-1f70-4f1d-8d02-370f32bc4e6b_720x540.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jlAn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F004f2878-1f70-4f1d-8d02-370f32bc4e6b_720x540.jpeg" width="720" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/004f2878-1f70-4f1d-8d02-370f32bc4e6b_720x540.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:720,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:89673,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/173626074?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F004f2878-1f70-4f1d-8d02-370f32bc4e6b_720x540.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jlAn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F004f2878-1f70-4f1d-8d02-370f32bc4e6b_720x540.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jlAn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F004f2878-1f70-4f1d-8d02-370f32bc4e6b_720x540.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jlAn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F004f2878-1f70-4f1d-8d02-370f32bc4e6b_720x540.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jlAn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F004f2878-1f70-4f1d-8d02-370f32bc4e6b_720x540.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The skills that are rising in value are the ones that are harder to automate:</p><ul><li><p>Critical thinking and synthesis</p></li><li><p>Framing risk in a strategic context</p></li><li><p>Deciding which risks actually matter</p></li><li><p>Influencing decision makers</p></li><li><p>Bringing in ethical judgment</p></li></ul><p>These are not just nice to have; they are the very things that will define the best risk analysts in the future.</p><p>In my own work, I already see this shift. Two years ago, I would spend a full afternoon finding peer company incident data for use in an analysis. Today, I let AI do the research, and then I spend my time refining the narrative and making sure the analysis actually connects to the business decision at hand. The AI is faster at the chart, but it cannot decide which story matters. That is still on me, and that is where my real value lies.</p><p>One other point I made in the talk is about <strong>prompt engineering</strong>. Right now it feels like an essential skill. Knowing how to craft the right prompt can make the difference between a useful output and complete nonsense. But we should not fool ourselves into thinking prompt engineering will remain a differentiator for long. Models are already starting to generate and refine their own prompts. AI will eventually take this work out of our hands. For now it is important, but soon it will fade into the background.</p><p>The bottom line: risk analysts who cling to tasks that are being automated will find themselves automated out. Risk analysts who invest in human differentiators like judgment, synthesis, and influence will thrive. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yXii!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3856f8f8-0072-4294-b4d5-562b8349f150_720x540.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yXii!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3856f8f8-0072-4294-b4d5-562b8349f150_720x540.jpeg 424w, https://substackcdn.com/image/fetch/$s_!yXii!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3856f8f8-0072-4294-b4d5-562b8349f150_720x540.jpeg 848w, https://substackcdn.com/image/fetch/$s_!yXii!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3856f8f8-0072-4294-b4d5-562b8349f150_720x540.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!yXii!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3856f8f8-0072-4294-b4d5-562b8349f150_720x540.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yXii!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3856f8f8-0072-4294-b4d5-562b8349f150_720x540.jpeg" width="720" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3856f8f8-0072-4294-b4d5-562b8349f150_720x540.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:720,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:61440,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/173626074?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3856f8f8-0072-4294-b4d5-562b8349f150_720x540.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yXii!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3856f8f8-0072-4294-b4d5-562b8349f150_720x540.jpeg 424w, https://substackcdn.com/image/fetch/$s_!yXii!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3856f8f8-0072-4294-b4d5-562b8349f150_720x540.jpeg 848w, https://substackcdn.com/image/fetch/$s_!yXii!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3856f8f8-0072-4294-b4d5-562b8349f150_720x540.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!yXii!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3856f8f8-0072-4294-b4d5-562b8349f150_720x540.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>AI will not replace risk analysts, but risk analysts who use AI effectively will replace those who do not.</p><div><hr></div><h1><strong>Reader Question</strong></h1><div class="poll-embed" data-attrs="{&quot;id&quot;:376224}" data-component-name="PollToDOM"></div><div><hr></div><h1><strong>&#9993;&#65039; Contact</strong></h1><p>Have a question about this, or anything else? Here's how to reach me:</p><ul><li><p>Reply to this newsletter if reading via email</p></li><li><p>Comment below</p></li><li><p>Connect with me on <a href="https://www.linkedin.com/in/tonymartinvegue/">LinkedIn</a></p></li><li><p><a href="https://www.tonym-v.com/contact">Contact form</a></p></li></ul><div><hr></div><h1><strong>&#10084;&#65039; How You Can Help</strong></h1><p>&#9989; Share your questions or feedback in the comments below<br>&#9989; Forward this to a colleague<br>&#9989; Click the &#10084;&#65039; if you liked this issue</p><p>Thank you for reading, and remember: quantitative risk analysis is a&nbsp;<strong>valuable</strong>&nbsp;tool, but not the <strong>only</strong> tool.</p><p>&#8212;Tony</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Issue 3: From "We Can't Measure This" to "Good Enough to Decide" ]]></title><description><![CDATA[Estimating the Real Risk of Getting Your Phone Hacked at DEF CON]]></description><link>https://newsletter.heatmapstohistograms.com/p/issue-3-from-we-cant-measure-this</link><guid isPermaLink="false">https://newsletter.heatmapstohistograms.com/p/issue-3-from-we-cant-measure-this</guid><dc:creator><![CDATA[Tony Martin-Vegue]]></dc:creator><pubDate>Tue, 02 Sep 2025 23:50:08 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9a99558f-f373-4669-a9a0-cf0f865578ad_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1><strong>In This  Issue:</strong></h1><ul><li><p><strong>&#128214; Book Update</strong></p></li><li><p><strong>&#127919; A Practical Introduction to Risk Measurement</strong></p></li><li><p><strong>&#128218; What I&#8217;m Reading</strong></p></li></ul><div><hr></div><p>Hey there,</p><p><strong>This issue is focused on one core technique, with immediate applications you can try this week,</strong> instead of several ones.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Let me know what you think of this format. I'm genuinely curious whether this hits better than the longer, packed emails.</p><h1><strong>&#128214; Book Update: Part 1 Complete!</strong></h1><p><strong>A big milestone this month: Part 1 of "From Heatmaps to Histograms" is now complete and has been submitted to the publisher.</strong> Additionally, I'm more than halfway through the first drafts of the entire book. Here's what's in the can:</p><p><strong>Part 1</strong> covers everything, from my embarrassing "red/yellow/green" moment at a San Francisco bank (while other teams spoke in actual dollars) to why our industry inadvertently created two completely different things, both called "risk management." </p><p>The best part might be Chapter 3 on GenAI; current AI is more like Jack Sparrow (charming but needs boundaries) rather than Data from Star Trek (perfectly trustworthy) and proper AI guardrails for use in risk analysis. </p><p><strong>Next up:</strong> Part 2 gets into the actual step-by-step techniques you need to do this work.</p><p><strong>Timeline update</strong>: Still targeting early 2026 for publication, with pre-orders likely available in a few weeks.</p><p>Saving the best for last&#8230;<strong><br><br>The book&#8217;s website is up! Check it out: <a href="http://www.heatmapstohistograms.com">www.heatmapstohistograms.com</a></strong></p><div><hr></div><h1><strong>&#127919; A Practical Introduction to Risk Measurement</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wFdE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bc0643b-6132-4bb1-a8cd-2106691a5859_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wFdE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bc0643b-6132-4bb1-a8cd-2106691a5859_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!wFdE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bc0643b-6132-4bb1-a8cd-2106691a5859_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!wFdE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bc0643b-6132-4bb1-a8cd-2106691a5859_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!wFdE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bc0643b-6132-4bb1-a8cd-2106691a5859_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wFdE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bc0643b-6132-4bb1-a8cd-2106691a5859_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8bc0643b-6132-4bb1-a8cd-2106691a5859_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1594632,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/172442627?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bc0643b-6132-4bb1-a8cd-2106691a5859_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wFdE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bc0643b-6132-4bb1-a8cd-2106691a5859_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!wFdE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bc0643b-6132-4bb1-a8cd-2106691a5859_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!wFdE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bc0643b-6132-4bb1-a8cd-2106691a5859_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!wFdE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bc0643b-6132-4bb1-a8cd-2106691a5859_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>If you're learning cyber risk quantification (CRQ), you've probably heard this before: <em>"You can't measure cyber risk. It's too uncertain, too complex, too subjective."</em></p><p>This mindset stops many risk professionals from even trying quantitative approaches. However, we simply need to apply concepts from <em>metrology</em>, the science of measurement, and techniques from decision science, as well as other relevant disciplines, to this problem.</p><p><em><strong>Measurement</strong></em><strong> is a core discipline utilized across various fields, including science, medicine, finance, and engineering.</strong> Astronomers calculate the mass of planets they'll never touch. Epidemiologists estimate infection risks across populations they can't fully observe. Engineers estimate failure rates for systems with millions of components. None has perfect information; all work with uncertainty ranges and probabilistic thinking.</p><p>The same techniques work for cyber risk. The goal isn't precision for its own sake; it's moving from "we know nothing" to "we know enough to make better decisions."</p><div><hr></div><h2><strong>The Challenge: From LinkedIn Skepticism to Practical Measurement</strong></h2><p>Here&#8217;s the inspiration for this issue. I recently saw this post on LinkedIn that perfectly captures measurement skepticism:</p><blockquote><p>"The advocates of quantitative risk analysis point to sophisticated math, but ultimately how do you measure the likelihood of any given adverse event? It's a judgement call. How likely is it your phone will get hacked at DEFCON? ...oh...somewhere between 0 and 100 percent depending on who you ask. The quality of the SMEs matter more than the tools they use."</p></blockquote><p><strong>Challenge accepted!</strong> Let's demonstrate core cyber risk quantification (CRQ) techniques using this real-world scenario and watch our estimate evolve from complete ignorance to actionable insight.</p><div><hr></div><h2><strong>What Is Fermi Estimation?</strong></h2><p>Before diving into techniques, understand our core approach: <strong><a href="https://en.wikipedia.org/wiki/Fermi_problem">Fermi estimation</a></strong>. Named after physicist Enrico Fermi, this involves making reasonable estimates about seemingly impossible-to-measure quantities by breaking them into smaller, more estimable parts.</p><p><strong>Classic example:</strong> "<a href="https://web.pdx.edu/~pmoeck/pdf/The%20classic%20Fermi%20problem.pdf">How many piano tuners are in Chicago</a>?"</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ORpQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94e4fde9-df47-4200-9759-aa49e3317c2a_1252x1824.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ORpQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94e4fde9-df47-4200-9759-aa49e3317c2a_1252x1824.png 424w, https://substackcdn.com/image/fetch/$s_!ORpQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94e4fde9-df47-4200-9759-aa49e3317c2a_1252x1824.png 848w, https://substackcdn.com/image/fetch/$s_!ORpQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94e4fde9-df47-4200-9759-aa49e3317c2a_1252x1824.png 1272w, https://substackcdn.com/image/fetch/$s_!ORpQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94e4fde9-df47-4200-9759-aa49e3317c2a_1252x1824.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ORpQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94e4fde9-df47-4200-9759-aa49e3317c2a_1252x1824.png" width="484" height="705.1246006389777" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/94e4fde9-df47-4200-9759-aa49e3317c2a_1252x1824.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1824,&quot;width&quot;:1252,&quot;resizeWidth&quot;:484,&quot;bytes&quot;:278318,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/172442627?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94e4fde9-df47-4200-9759-aa49e3317c2a_1252x1824.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ORpQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94e4fde9-df47-4200-9759-aa49e3317c2a_1252x1824.png 424w, https://substackcdn.com/image/fetch/$s_!ORpQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94e4fde9-df47-4200-9759-aa49e3317c2a_1252x1824.png 848w, https://substackcdn.com/image/fetch/$s_!ORpQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94e4fde9-df47-4200-9759-aa49e3317c2a_1252x1824.png 1272w, https://substackcdn.com/image/fetch/$s_!ORpQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94e4fde9-df47-4200-9759-aa49e3317c2a_1252x1824.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><strong>Chicago population:</strong> ~5 million people</p></li><li><p><strong>Average household size:</strong> 2 persons per household</p></li><li><p><strong>Households</strong>: ~2.5 million (5M &#247; 2)</p></li><li><p><strong>Households with pianos</strong>: ~5% (1 in 20) = 125,000</p></li><li><p><strong>Tuning frequency</strong>: once per year = 125,000 tunings annually</p></li><li><p><strong>Tuner productivity</strong>: ~1,000 tunings per year (50 weeks &#215; 5 days &#215; 8 hours &#247; 2 hours per tuning)</p></li><li><p><strong>Result</strong>: ~125 piano tuners</p></li></ul><p>In the famous Chicago piano tuner problem, each step is estimated using data, logic, and reasoning. The goal isn't precision, it's moving from "impossible to know" to "reasonable ballpark estimate" using structured reasoning. We'll apply this same approach to the phone hacking question, and the same principles are often used to measure cyber risk.</p><div><hr></div><h2><strong>Foundation: The Measurement Mindset</strong></h2><p>If someone claims something can't be measured, recall Douglas Hubbard's Clarification Chain from<a href="https://www.howtomeasureanything.com/"> "How to Measure Anything</a>&#8221;:</p><ul><li><p>If it matters, it's detectable</p></li><li><p>If it's detectable, it can be measured as a range</p></li><li><p>If it can be measured as a range, it can be quantified</p></li></ul><p><strong>Core principles for any risk measurement:</strong></p><ul><li><p><strong>Embrace uncertainty</strong>: Every measurement has error; our job is credible ranges, not false precision</p></li><li><p><strong>Make judgment explicit</strong>: Risk analysis makes assumptions transparent so others can challenge them</p></li><li><p><strong>Think Bayesian</strong>: Form initial beliefs, then update systematically as evidence emerges</p></li></ul><p><strong>Starting Point: Complete Ignorance</strong></p><p><strong>Current estimate: 0-100%</strong> <em>(All possibilities equally likely)</em></p><p>The LinkedIn post claimed "0&#8211;100%" probability: complete ignorance where all possibilities are equally likely. This flat prior isn't a prediction; it's an acknowledgment that we have no information. Every outcome from "impossible" to "certain" is treated as equally plausible.</p><div><hr></div><h2><strong>Technique #1: Precise Scoping (Define What You're Measuring)</strong></h2><p><strong>The Problem</strong>: Vague definitions create meaningless measurements. "Phone hacking" could mean anything.</p><p><strong>The Technique</strong>: Start every risk assessment by precisely defining the adverse outcome you're measuring.</p><p><strong>Application</strong>: "Phone hacking" could mean various things. For this analysis, our scope includes device-based attacks that result in unauthorized access to data or device functionality.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0Vz4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04fd1d1b-6dcd-4b80-9672-54bf217612dd_600x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0Vz4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04fd1d1b-6dcd-4b80-9672-54bf217612dd_600x400.png 424w, https://substackcdn.com/image/fetch/$s_!0Vz4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04fd1d1b-6dcd-4b80-9672-54bf217612dd_600x400.png 848w, https://substackcdn.com/image/fetch/$s_!0Vz4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04fd1d1b-6dcd-4b80-9672-54bf217612dd_600x400.png 1272w, https://substackcdn.com/image/fetch/$s_!0Vz4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04fd1d1b-6dcd-4b80-9672-54bf217612dd_600x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0Vz4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04fd1d1b-6dcd-4b80-9672-54bf217612dd_600x400.png" width="654" height="436" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/04fd1d1b-6dcd-4b80-9672-54bf217612dd_600x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:600,&quot;resizeWidth&quot;:654,&quot;bytes&quot;:63668,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/172442627?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04fd1d1b-6dcd-4b80-9672-54bf217612dd_600x400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0Vz4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04fd1d1b-6dcd-4b80-9672-54bf217612dd_600x400.png 424w, https://substackcdn.com/image/fetch/$s_!0Vz4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04fd1d1b-6dcd-4b80-9672-54bf217612dd_600x400.png 848w, https://substackcdn.com/image/fetch/$s_!0Vz4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04fd1d1b-6dcd-4b80-9672-54bf217612dd_600x400.png 1272w, https://substackcdn.com/image/fetch/$s_!0Vz4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04fd1d1b-6dcd-4b80-9672-54bf217612dd_600x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>In Scope</strong>:</p><ul><li><p><strong>Persistent malware installation</strong>: Ongoing device control or monitoring</p></li><li><p><strong>Data theft</strong>: Accessing photos, contacts, files, messages without ongoing access</p></li><li><p><strong>Privacy violations</strong>: Location tracking, microphone/camera access, credential harvesting</p></li><li><p><strong>Temporary device control</strong>: Remote command execution, device manipulation</p></li></ul><p><strong>Out of Scope</strong>:</p><ul><li><p>WiFi traffic eavesdropping and credential capture from unencrypted protocols (<a href="https://www.wallofsheep.com/pages/wall-of-sheep">Wall of Sheep</a> scenarios). These represent insecure communication, not device compromise</p></li></ul><p><strong>Current estimate: 0-100%</strong> <em>(Still complete uncertainty, but now we know what we're measuring)</em></p><p>Scoping doesn't narrow our range yet, but it's crucial foundation work. We've defined our target precisely, which prevents scope creep during analysis.</p><p><strong>Key Principle</strong>: Always ask "probability of what, exactly?" before starting any risk measurement. Vague definitions guarantee useless results.</p><div><hr></div><h2><strong>Technique #2: Eliminate Absurd Extremes</strong></h2><p><strong>The Problem</strong>: Starting with "0-100%" is saying &#8220;we know knowing!&#8221; and provides no decision value. But, we do know <em>something</em>, don&#8217;t we?</p><p><strong>The Technique</strong>: Use logical reasoning and available evidence to systematically rule out impossible or highly implausible values before detailed calculation.</p><p><strong>Test the extremes systematically:</strong></p><p><strong>100%</strong>: If every phone among<a href="https://defcon.org/html/links/dc-faq/dc-faq.html"> ~30,000 attendees</a> got compromised, it would be international headlines and kill the conference. People go to jail. No hotel or convention center would dare to host it. <em>Clearly absurd.</em></p><p><strong>75-90%</strong>: 22,500+ device compromises would be the biggest cybersecurity story of the decade. <em>Still absurd.</em></p><p><strong>50%</strong>: 15,000 victims would generate a massive industry response and likely lead to changes or the cancellation of the conference. <em>Extremely unlikely.</em></p><p><strong>25%</strong>: 7,500 compromised devices would create an unprecedented security industry crisis. <em>Very unlikely, but starting to enter the realm of possibility.</em></p><p><strong>10%</strong>: 3,000 incidents would still generate major headlines and community outcry. <em>Possible, but would be widely reported.</em></p><p><strong>5%</strong>: 1,500 compromises would generate some industry discussion. <em>Getting into plausible territory.</em></p><p><strong>On the other end of the range:</strong></p><p><strong>0%</strong>: DEF CON represents a unique high-threat environment with demonstrated attacks. Not zero risk.</p><p><strong>Updated estimate: 0.5-5%</strong> <em>(90% confidence interval)</em></p><p><strong>Confidence change</strong>: We've eliminated 90% of the original possibility space using pure logic. This is the power of logical thinking: most of human intuition about "impossible" vs "possible" is actually quite good.</p><p><strong>Key Principle</strong>: Start every risk estimate by ruling out the obviously absurd answers. This technique applies to any uncertain scenario, from data breach likelihood to business continuity risks.</p><div><hr></div><h2><strong>Technique #3: Threat Modeling with Attack Vectors</strong></h2><p><strong>The Problem</strong>: "Phone hacking" is still too vague to estimate precisely. We need specific pathways.</p><p><strong>The Technique</strong>: Enumerate concrete attack vectors, then estimate each separately.</p><p><strong>Credible attack vectors at DEF CON</strong>:</p><ol><li><p><strong>Cellular interception (IMSI catchers)</strong>:<a href="https://www.infoworld.com/article/2289023/defcon-hackers-target-cell-phone-security.html"> Rogue cell towers demonstrated at conferences</a></p></li><li><p><strong>Malicious WiFi networks</strong>: <a href="https://hackhunter.io/2022/09/01/hunting-rogue-access-points-at-def-con/">Rogue WiFi at DEF CON</a></p></li><li><p><strong>Physical attacks (BadUSB)</strong>:<a href="https://techcrunch.com/2019/08/12/iphone-charging-cable-hack-computer-def-con/"> Modified charging cables demonstrated at DEF CON 27</a></p></li><li><p><strong>Social engineering</strong>: <a href="https://www.malwarebytes.com/cybersecurity/basics/what-is-a-qr-code">Malicious QR codes</a>, fake apps, manipulation tactics</p></li><li><p><strong>Zero-day exploits</strong>:<a href="https://techcrunch.com/2025/08/20/new-zero-day-startup-offers-20-million-for-tools-that-can-hack-any-smartphone/"> Premium mobile exploits worth $15-20 million</a></p></li><li><p><strong>Bluetooth exploits</strong>: <a href="https://www.nccgroup.com/newsroom/ncc-group-uncovers-bluetooth-low-energy-ble-vulnerability-that-puts-millions-of-cars-mobile-devices-and-locking-systems-at-risk/">Proximity-based attacks</a></p></li></ol><p><strong>Current estimate: 0.5-5%</strong> <em>(Range unchanged but confidence increased)</em></p><p>Threat modeling doesn't narrow our range much, but it significantly increases our confidence by grounding the analysis in concrete attack scenarios rather than vague "hacking" concepts.</p><p><strong>Key Principle</strong>: Always decompose vague risks into specific attack scenarios. "Data breach" becomes "phishing &#8594; credential compromise," "malware &#8594; lateral movement," etc. This makes the seemingly immeasurable measurable.</p><div><hr></div><h2><strong>Technique #4: Pipeline Analysis (Fermi Decomposition)</strong></h2><p><strong>The Problem</strong>: Complex events seem impossible to estimate because so many things must align.</p><p><strong>The Technique</strong>: Model the event as a pipeline where multiple stages must all succeed, then multiply the conditional probabilities.</p><p><strong>Pipeline stages for device compromise</strong>:</p><h3><strong>Stage 1: Sophisticated Attacker Presence (60-80%)</strong></h3><p><strong>Question</strong>: Are sophisticated attackers actively targeting mobile devices with premium tools?</p><p><strong>Key insight</strong>: DEF CON isn't random people. It's an exceptional concentration of high-value targets:</p><ul><li><p>Fortune 500 CISOs and security executives</p></li><li><p>Government cybersecurity officials</p></li><li><p>Security researchers with unreleased intelligence</p></li><li><p>Critical infrastructure employees</p></li></ul><p><strong>Economic reality</strong>: A $15-20 million zero-day investment could yield intelligence worth hundreds of millions from the right targets.</p><h3><strong>Stage 2: User Vulnerability Exposure (20-40%)</strong></h3><p><strong>Question</strong>: Do targets engage in risky behavior when attacks are active?</p><p>Even security-conscious professionals take some risks over a 4-day conference exposure: experimental culture, social pressure to participate, and inevitable human errors.</p><h3><strong>Stage 3: Technical Attack Success (2-8%)</strong></h3><p><strong>Question</strong>: Do attacks overcome modern mobile defenses?</p><p>Our broader scope includes temporary access and data theft (easier than persistent compromise). But modern mobile security is substantial, and time constraints limit attackers.</p><p><strong>Pipeline calculations (Fermi estimates)</strong>:</p><ul><li><p><strong>Conservative</strong>: 60% &#215; 20% &#215; 2% = <strong>0.24%</strong></p></li><li><p><strong>Moderate</strong>: 70% &#215; 30% &#215; 5% = <strong>1.05%</strong></p></li><li><p><strong>Aggressive</strong>: 80% &#215; 40% &#215; 8% = <strong>2.56%</strong></p></li></ul><p><em>These represent my Fermi estimates for each stage based on available evidence and structured reasoning about DEF CON's unique environment.</em></p><p><strong>Updated estimate: 0.24-2.6%</strong> <em>(Major narrowing through decomposition)</em></p><p><strong>Confidence change</strong>: Pipeline analysis dramatically narrows our range by breaking an impossibly complex question into three estimable components. This is where structured reasoning really shows its power.</p><p><strong>Key Principle</strong>: Use pipeline analysis whenever measuring complex events that require multiple conditions. Supply chain attacks, insider threats, ransomware incidents all benefit from this decomposition approach.</p><div><hr></div><h2><strong>Technique #5: Detection Bias Analysis (Reality Check)</strong></h2><p><strong>The Problem</strong>: My pipeline analysis assumed successful attacks would be detected and reported, but sophisticated mobile compromises are designed to be undetectable. It was at this stage that I realized the upper bound of the estimates so far did not account for this, and I need to correct this. I need to raise the upper bound slightly.</p><p><strong>The "<a href="https://en.wikipedia.org/wiki/Dark_figure_of_crime">Dark Figure</a>" Challenge</strong>:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aeRC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd37f63dc-5084-47cc-88ff-ed2b7d2f6cb7_2040x780.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aeRC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd37f63dc-5084-47cc-88ff-ed2b7d2f6cb7_2040x780.png 424w, https://substackcdn.com/image/fetch/$s_!aeRC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd37f63dc-5084-47cc-88ff-ed2b7d2f6cb7_2040x780.png 848w, https://substackcdn.com/image/fetch/$s_!aeRC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd37f63dc-5084-47cc-88ff-ed2b7d2f6cb7_2040x780.png 1272w, https://substackcdn.com/image/fetch/$s_!aeRC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd37f63dc-5084-47cc-88ff-ed2b7d2f6cb7_2040x780.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aeRC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd37f63dc-5084-47cc-88ff-ed2b7d2f6cb7_2040x780.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d37f63dc-5084-47cc-88ff-ed2b7d2f6cb7_2040x780.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:282170,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/172442627?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd37f63dc-5084-47cc-88ff-ed2b7d2f6cb7_2040x780.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aeRC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd37f63dc-5084-47cc-88ff-ed2b7d2f6cb7_2040x780.png 424w, https://substackcdn.com/image/fetch/$s_!aeRC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd37f63dc-5084-47cc-88ff-ed2b7d2f6cb7_2040x780.png 848w, https://substackcdn.com/image/fetch/$s_!aeRC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd37f63dc-5084-47cc-88ff-ed2b7d2f6cb7_2040x780.png 1272w, https://substackcdn.com/image/fetch/$s_!aeRC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd37f63dc-5084-47cc-88ff-ed2b7d2f6cb7_2040x780.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><ul><li><p>Advanced persistent threats remain hidden for months/years</p></li><li><p>Even security professionals may not detect sophisticated compromises quickly</p></li><li><p>Nation-state actors specifically design stealth attacks</p></li></ul><p><strong>Why the upper bound increases</strong>: Pipeline analysis gave us estimates based on <strong>detected incidents only</strong>. But sophisticated mobile compromises are specifically designed to avoid detection. Detection bias analysis asks: "What if many successful attacks remain completely hidden?"</p><p><strong>The logic</strong>:</p><ul><li><p>Pipeline analysis: "Based on visible evidence, attacks succeed 2.6% of the time"</p></li><li><p>Detection bias: "But what if we're only seeing 70% of successful attacks? Then the true rate could be 2.6% &#247; 0.7 = 3.7%"</p></li></ul><p><strong>Why this is methodologically sound</strong>: We're not changing our assessment of attack mechanics (pipeline stages remain the same). We're adjusting for measurement limitations - the possibility that our "no widespread reports" evidence reflects successful concealment rather than low attack rates.</p><p><strong>Detection bias adjustment</strong>: Apply a modest multiplier for undetected incidents while respecting bounds analysis:</p><ul><li><p><strong>Conservative</strong>: 0.24% &#215; 1.5 = <strong>0.36%</strong></p></li><li><p><strong>Moderate</strong>: 1.05% &#215; 2 = <strong>2.1%</strong></p></li><li><p><strong>Aggressive</strong>: 2.56% &#215; 1.5 = <strong>3.84%</strong></p></li></ul><p><em>My analytical assessment of how detection limitations affect our estimates, constrained by earlier bounds analysis, suggests that anything approaching 5%+ would generate a visible community response.</em></p><p><strong>Updated estimate: 0.36-3.84%</strong> <em>(Upper bound increases due to measurement limitations)</em></p><p><strong>Key Principle</strong>: Sometimes ranges should widen when you realize your measurement approach has limitations. Detection bias is a reality check that says "our estimates could be too low if attacks are more stealthy than we assumed."</p><p>Always consider whether your risk measurement depends on incident detection and reporting. Many cyber risks suffer from significant underreporting bias.</p><div><hr></div><h2><strong>Technique #6: Conditional Risk Modeling (Behavior Matters)</strong></h2><p><strong>The Problem</strong>: Treating all attendees identically ignores the biggest risk factor, individual behavior.</p><p><strong>The Technique</strong>: Create distinct risk profiles based on key behavioral variables, while respecting the logical bounds established earlier.</p><p><strong>Risk profiles with detection bias included (capped at bounds analysis limits)</strong>:</p><p><strong>Cautious Attendee</strong>:<a href="https://source.android.com/docs/security/features/cellular-security/disable-2g"> 2G disabled</a>, burner phone, minimal connectivity</p><ul><li><p><strong>My estimate: 0.1-1%</strong></p></li></ul><p><strong>Curious Attendee</strong>: Standard security practices, some experimental behavior</p><ul><li><p><strong>My estimate: 1-3%</strong></p></li></ul><p><strong>Reckless Attendee</strong>: Primary device, connects freely, ignores warnings</p><ul><li><p><strong>My estimate: 3-5%</strong></p></li></ul><p><strong>Current estimate: 0.1-5% depending on behavior</strong> <em>(Maintains logical consistency with our bounds)</em></p><p><strong>Why this makes sense</strong>: I can't simultaneously claim that 5%+ would generate visible community discussion (bounds analysis) and some attendees face higher risk without contradicting my own reasoning.</p><p><strong>Key Principle</strong>: Always identify the key behavioral or environmental variables that drive risk differences. Create distinct profiles while respecting constraints from earlier analysis.</p><div><hr></div><h2><strong>Technique #7: Bayesian Updating (Evidence Integration)</strong></h2><p><strong>The Technique</strong>: Treat risk estimates as living hypotheses that update systematically based on new data.</p><p><strong>Evidence assessment</strong>:</p><ul><li><p><strong>Limited public reports</strong>: Could indicate either low rates or successful stealth</p></li><li><p><strong>Modern mobile security</strong>:<a href="https://www.certosoftware.com/insights/phone-hacking-and-mobile-security-stats/"> Continues to improve</a>, but is countered by sophisticated adversaries</p></li><li><p><strong>DEF CON's unique environment</strong>: Justifies higher estimates than normal mobile security statistics</p></li></ul><p><strong>Bayesian update</strong>: Current evidence supports the moderate end of our range.</p><p><strong>Current estimate: 0.5-4% for typical attendees</strong> <em>(Evidence-weighted)</em></p><div><hr></div><h2><strong>Critical Reality Check: The Empirical Evidence Problem</strong></h2><p>Our systematic analysis suggests meaningful device compromise rates, but there's a glaring empirical problem: <strong>the security community isn't talking about widespread device compromises at DEF CON.</strong></p><p><strong>The 5-year silence problem</strong>: If even our lower estimates were accurate, we'd expect some community discussion among security professionals who actively share threat intelligence and study these exact threats.</p><p><strong>Why the silence doesn't necessarily invalidate our estimates</strong>:</p><ol><li><p><strong>Detection bias is even more severe than we thought</strong>: Truly sophisticated nation-state attacks remain completely hidden even from security professionals. Modern mobile APTs are designed for multi-year persistence without detection.</p></li><li><p><strong>Incidents occur but aren't discussed openly</strong>: Classification concerns, legal issues, or professional embarrassment prevent sharing. Government officials and corporate executives might be specifically instructed not to disclose incidents.</p></li></ol><p><strong>Honest final assessment: 0.1-4% with low confidence</strong></p><ul><li><p><strong>Lower bound (0.1%)</strong>: ~30 incidents annually - explains the community silence</p></li><li><p><strong>Upper bound (4%)</strong>: ~1,200 incidents annually - possible if detection bias and non-disclosure are severe</p></li><li><p><strong>Low confidence</strong>: The wide range reflects fundamental uncertainty</p></li></ul><div><hr></div><h2><strong>Final Estimate Progression Summary</strong></h2><p>Here's how our estimate evolved through systematic analysis:</p><div id="datawrapper-iframe" class="datawrapper-wrap outer" data-attrs="{&quot;url&quot;:&quot;https://datawrapper.dwcdn.net/prhdI/1/&quot;,&quot;thumbnail_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b4ac543f-311f-40e2-b691-36fd51988604_1220x1024.png&quot;,&quot;thumbnail_url_full&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fc49768e-b21b-41e9-97d2-76a5a31576e1_1220x1094.png&quot;,&quot;height&quot;:546,&quot;title&quot;:&quot;Estimation Progression&quot;,&quot;description&quot;:&quot;&quot;}" data-component-name="DatawrapperToDOM"><iframe id="iframe-datawrapper" class="datawrapper-iframe" src="https://datawrapper.dwcdn.net/prhdI/1/" width="730" height="546" frameborder="0" scrolling="no"></iframe><script type="text/javascript">!function(){"use strict";window.addEventListener("message",(function(e){if(void 0!==e.data["datawrapper-height"]){var t=document.querySelectorAll("iframe");for(var a in e.data["datawrapper-height"])for(var r=0;r<t.length;r++){if(t[r].contentWindow===e.source)t[r].style.height=e.data["datawrapper-height"][a]+"px"}}}))}();</script></div><div><hr></div><h2><strong>Key Takeaways: The Realistic Middle Ground</strong></h2><p><strong>It's not an urban myth, but it's also not inevitable.</strong></p><ol><li><p><strong>Device compromise CAN happen at DEF CON</strong> - We have credible attack vectors, high-value targets, and sophisticated adversaries. The analysis suggests 0.1-4% individual risk, which is meaningfully above zero.</p></li><li><p><strong>Historical attacks were mostly legacy exploits</strong> - The famous demonstrations involved<a href="https://www.infoworld.com/article/2289023/defcon-hackers-target-cell-phone-security.html"> 2G/3G cellular vulnerabilities</a> that modern devices can now disable. Many classic attack vectors have been significantly hardened.</p></li><li><p><strong>Wall of Sheep creates false perceptions</strong> - Hundreds of credential captures annually at the<a href="https://www.wallofsheep.com/pages/wall-of-sheep"> Wall of Sheep</a> represent WiFi eavesdropping, not device compromise. People conflate seeing "lots of hacking" with device takeover, but these are fundamentally different threats.</p></li><li><p><strong>The "100% probability" claim is nonsense</strong> - Our systematic analysis moved from 0-100% (useless) to 0.1-4% (actionable). Even in a worst-case scenario, most attendees' devices remain uncompromised.</p></li><li><p><strong>Detection bias could explain the silence</strong> - The security community's lack of discussion about widespread device compromises over the last 5 years suggests either: (a) actual rates are toward the lower end of our range, or (b) truly sophisticated attacks remain completely hidden.</p></li><li><p><strong>Behavior matters enormously</strong> - Cautious attendees (burner phones, disabled connectivity) face much lower risk than those who connect freely to conference networks and experimental services.</p></li></ol><p><strong>The bottom line</strong>: DEF CON device compromise is a real but relatively rare risk that's often confused with much more common eavesdropping on unsecured connections. It's worth taking basic precautions, but not worth avoiding the conference entirely.</p><p><strong>For risk professionals</strong>: This demonstrates how structured reasoning can cut through both "it's impossible to measure" and "it definitely happens to everyone" extremes to reach a nuanced, evidence-based middle ground.</p><div><hr></div><h2><strong>Techniques You Can Apply Tomorrow</strong></h2><p><strong>For any "unmeasurable" cyber risk scenario</strong>:</p><ol><li><p><strong>Start with bounds</strong>: Before any analysis, rule out absurd extremes using basic logic</p></li><li><p><strong>Define scope precisely</strong>: "Data breach" isn't specific enough. Breach of what, leading to what outcome?</p></li><li><p><strong>Use pipeline decomposition</strong>: Break complex events into stages (Attacker &#8594; Access &#8594; Impact)</p></li><li><p><strong>Make it conditional</strong>: Different behaviors/controls should yield different risk estimates</p></li><li><p><strong>Account for detection bias</strong>: Consider what you might not be seeing</p></li><li><p><strong>Update with evidence</strong>: Treat estimates as hypotheses that improve with new data</p></li><li><p><strong>Reality check</strong>: When estimates seem implausible in absolute terms, acknowledge uncertainty</p></li><li><p><strong>Maintain logical consistency</strong>: Each step should respect constraints from previous analysis</p></li></ol><p><strong>Key insight for your organization</strong>: Even rough estimates are better than "we can't measure it." The goal isn't perfect precision. It's moving from complete ignorance to informed decision-making.</p><p><strong>When stakeholders claim cyber risk "can't be measured"</strong>: Show them this progression. We went from 0-100% (useless) to 0.1-4% (actionable) using techniques any risk professional can learn.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5Zs9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee245783-dd3b-4283-891e-cc4a0ef6516b_2022x378.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5Zs9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee245783-dd3b-4283-891e-cc4a0ef6516b_2022x378.png 424w, https://substackcdn.com/image/fetch/$s_!5Zs9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee245783-dd3b-4283-891e-cc4a0ef6516b_2022x378.png 848w, https://substackcdn.com/image/fetch/$s_!5Zs9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee245783-dd3b-4283-891e-cc4a0ef6516b_2022x378.png 1272w, https://substackcdn.com/image/fetch/$s_!5Zs9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee245783-dd3b-4283-891e-cc4a0ef6516b_2022x378.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5Zs9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee245783-dd3b-4283-891e-cc4a0ef6516b_2022x378.png" width="1456" height="272" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ee245783-dd3b-4283-891e-cc4a0ef6516b_2022x378.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:272,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:364511,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://newsletter.heatmapstohistograms.com/i/172442627?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee245783-dd3b-4283-891e-cc4a0ef6516b_2022x378.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5Zs9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee245783-dd3b-4283-891e-cc4a0ef6516b_2022x378.png 424w, https://substackcdn.com/image/fetch/$s_!5Zs9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee245783-dd3b-4283-891e-cc4a0ef6516b_2022x378.png 848w, https://substackcdn.com/image/fetch/$s_!5Zs9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee245783-dd3b-4283-891e-cc4a0ef6516b_2022x378.png 1272w, https://substackcdn.com/image/fetch/$s_!5Zs9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fee245783-dd3b-4283-891e-cc4a0ef6516b_2022x378.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><h2><strong>Do You Think I&#8217;m Wrong?</strong></h2><p>Great! Create your own analysis and estimations and share them with me.</p><div><hr></div><h1>&#128218; What I&#8217;m Reading</h1><ul><li><p><a href="https://www.linkedin.com/pulse/vibe-coding-bayesian-thought-experiment-rick-howard-qte3e/?trackingId=HCH4m5X6TPWJRD0YdB4P9g%3D%3D">Vibe Coding and Basyesian Thought Experiment</a> by <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a><br>I love Rick Howard&#8217;s <em><a href="https://diffuser.substack.com/">First Principles</a></em><a href="https://diffuser.substack.com/"> newsletter</a>. I linked to one of his posts in my last issue, and I keep coming back to his writing. This latest piece brings Bayes&#8217; classic billiards thought experiment to life with vibe coding, showing why Bayesian thinking is so powerful for risk forecasting. I constantly reference and use this approach in my own work and highly recommend subscribing.</p></li><li><p><strong><a href="https://scheermemos.substack.com/">Scheer Memos</a></strong> - by <a href="https://www.linkedin.com/in/alexanderscheer/">Alexander Scheer</a><br>I just connected with the author of <em>Scheer Memos</em> on LinkedIn and I am glad I did. I have been really enjoying his blog; thoughtful takes on tech and cybersecurity with a mix of experience and perspective that feels fresh. I recommend subscribing if you want smart writing that makes you think.</p></li><li><p><strong><a href="https://medium.com/@nikita_gpt/curious-about-grc-heres-how-i-got-started-45dc25788425">Curious About GRC? Here&#8217;s How I Got Started</a></strong><a href="https://medium.com/@nikita_gpt/curious-about-grc-heres-how-i-got-started-45dc25788425"> </a>- by <a href="https://www.linkedin.com/in/nikitagpt/">Nikita Gupta</a><br>Have you ever wondered how people actually get started in GRC, or if you have been asked that question yourself, this post is an honest take. Nikita Gupta shares her journey from &#8220;no clue what GRC was&#8221; to a thriving career, with practical steps anyone can follow. It is approachable, encouraging, and a great share for students, career changers, or even seasoned pros looking to mentor the next wave.</p></li><li><p><strong><a href="https://www.amazon.com/Presilience-Navigate-Embrace-Opportunity-Resilience/dp/B0DPRFCBLZ">Presilience</a></strong> by Dr. <a href="https://www.linkedin.com/in/dr-gav-schneider/">Gavriel Schneider</a><br>I just finished <em>Presilience</em> and found it eye-opening. The mix of personal stories makes the lessons real, and the practical advice is something I have already started using. Dr. Gavriel Schneider blends resilience tools with proactive risk management and leadership insights, showing how to turn uncertainty into growth. It is thoughtful, thorough, and very thought-provoking.</p></li></ul><h1><strong>&#9993;&#65039; Contact</strong></h1><p>Have a question about this, or anything else? Here's how to reach me:</p><ul><li><p>Reply to this newsletter if reading via email</p></li><li><p>Comment below</p></li><li><p>Connect with me on <a href="https://www.linkedin.com/in/tonymartinvegue/">LinkedIn</a></p></li><li><p><a href="https://www.tonym-v.com/contact">Contact form</a></p></li></ul><div><hr></div><h1><strong>&#10084;&#65039; How You Can Help</strong></h1><p>&#9989; Share your estimation and measurement stories in comments<br>&#9989; Forward this to a colleague who's stuck in analysis paralysis<br>&#9989; Click the &#10084;&#65039; if this helped you measure the seemingly immeasurable</p><p>Thanks for reading, and remember: <em>anything</em> that matters can be measured.</p><p>&#8212;Tony</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Issue 2 | Assessment Scope, “What Abouts,” and Seeing Risk Beyond Your Own History]]></title><description><![CDATA[How to protect your risk assessment scope, avoid the gambler&#8217;s fallacy, and keep decisions on track]]></description><link>https://newsletter.heatmapstohistograms.com/p/issue-2-assessment-scope-what-abouts</link><guid isPermaLink="false">https://newsletter.heatmapstohistograms.com/p/issue-2-assessment-scope-what-abouts</guid><dc:creator><![CDATA[Tony Martin-Vegue]]></dc:creator><pubDate>Sun, 10 Aug 2025 15:58:18 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/48e42790-803d-4976-ab37-9fb98808510f_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>In This Month's Issue:</h1><ul><li><p><strong>&#128214; Book update</strong>: Getting Unstuck</p></li><li><p><strong>&#127919; The Risk Analysis Scope Creep Death Spiral</strong></p></li><li><p><strong>&#128196;Book Excerpt:</strong> Defending Your Scope Against &#8220;What Abouts&#8221;</p></li><li><p><strong>&#128269; Risk Analysis and the Gambler's Fallacy: Why Your Inside View Isn&#8217;t Enough</strong></p></li><li><p>&#128218; <strong>What I&#8217;m Reading:</strong> antifragility in risk models, the economics of security failures, and the joy of deep reading</p></li><li><p>&#128450; <strong>From the Archives:</strong> two posts on probability language and expert disagreement</p></li></ul><div><hr></div><p>Hey there,</p><p><strong>Welcome to Issue 2</strong>! Thanks for continuing this journey with me. This month, I'm tackling a common problem I see in the field: risk assessment scopes that grow and grow and grow until they strangle the very decisions they were meant to support.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Whether you're new to cyber risk quantification or a seasoned practitioner, you've probably felt this pain. Let's fix it.</p><p>I'll be speaking at <a href="https://web.cvent.com/event/aea3fabb-28f2-48e0-99b7-9eab5e226ee4/summary">SIRAcon</a> next month, the annual conference hosted by the <a href="https://www.societyinforisk.org/">Society of Information Risk Analysts</a>. It's a model-neutral and vendor-neutral non-profit that advocates for risk quantification in the technology field.</p><p>This year's conference is in Boston on September 9-11. Whether you're a beginner or advanced practitioner, there's something for everyone. I'll be discussing how to leverage Generative AI and LLMs to enhance your risk management practice. Hope to see you there!</p><p>More on my talk <a href="https://www.linkedin.com/posts/tonymartinvegue_sira-siracon-crq-activity-7350901995072876546-PsTB?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAGm1Q4BQqX-b-Vc3QqxlClW1za0brGubqM">here</a>, and you can learn more and register <a href="https://web.cvent.com/event/aea3fabb-28f2-48e0-99b7-9eab5e226ee4/websitePage:a14c3e74-c745-4825-b56e-fca5f73d25a6">here</a>.</p><div><hr></div><h1>&#128214; Book update: Getting Unstuck</h1><p>My book, "From Heatmaps to Histograms: A Practical Guide to Cyber Risk Quantification," comes out in early 2026. Pre-order links and a release date will come in a few months. I'm about half done with the book, tackling the hardest chapters first. Editing is proving to be the most challenging part and often takes longer than writing the initial draft. This process is a reminder of the famous quote, often attributed to Mark Twain:</p><blockquote><p><em>&#8220;I didn't have time to write a short letter, so I wrote a long one instead.&#8221; - Mark Twain</em></p></blockquote><p>Through this process, I've put an enormous amount of thought into why risk quantification programs fail - and it happens at three distinct levels.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!x8dH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F892fa389-28e2-47a8-a3ea-54c89a7889cf_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!x8dH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F892fa389-28e2-47a8-a3ea-54c89a7889cf_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!x8dH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F892fa389-28e2-47a8-a3ea-54c89a7889cf_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!x8dH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F892fa389-28e2-47a8-a3ea-54c89a7889cf_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!x8dH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F892fa389-28e2-47a8-a3ea-54c89a7889cf_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!x8dH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F892fa389-28e2-47a8-a3ea-54c89a7889cf_1024x1536.png" width="444" height="666" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/892fa389-28e2-47a8-a3ea-54c89a7889cf_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:444,&quot;bytes&quot;:2397363,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heatmapstohistograms.substack.com/i/170494207?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F892fa389-28e2-47a8-a3ea-54c89a7889cf_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!x8dH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F892fa389-28e2-47a8-a3ea-54c89a7889cf_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!x8dH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F892fa389-28e2-47a8-a3ea-54c89a7889cf_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!x8dH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F892fa389-28e2-47a8-a3ea-54c89a7889cf_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!x8dH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F892fa389-28e2-47a8-a3ea-54c89a7889cf_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p>At the <strong>individual level</strong>, practitioners often become overwhelmed by the apparent complexity, fail to commit to personal learning, or lack the basic statistical thinking required to get started.</p></li><li><p>At the <strong>team level</strong>, failures often result from using the wrong tools, applying inadequate techniques, skipping proper team-based training, or attempting to retrofit quantitative concepts onto qualitative frameworks that can't support them.</p></li><li><p>At the <strong>organizational level</strong>, programs fail due to poor stakeholder engagement, lack of executive buy-in, or perverse incentives that reward compliance theater over genuine risk reduction.</p></li></ul><p>The root cause behind most of these failures is simple to state, but it's hard to grasp and even harder to devise meaningful solutions.</p><p>Here's my hypothesis: <strong>we've been treating two fundamentally incompatible disciplines as if they're just different flavors of the same thing</strong>. Qualitative and quantitative risk management appear side-by-side in textbooks and frameworks, but they come from completely different intellectual traditions: one rooted in 300 years of probability theory, the other emerging from industrial management optimization in the 1970s. They have different philosophies, success criteria, and tools. People get "stuck" when they fail to recognize this divide and attempt to quantify the unquantifiable, such as calculating ROI from heat map movements, using risk scores to allocate budgets, or assuming that moving from red to yellow signifies a measurable reduction in risk.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GBwH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31229b6a-c434-4ed1-80d9-55b4eda8ba91_2823x1494.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GBwH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31229b6a-c434-4ed1-80d9-55b4eda8ba91_2823x1494.png 424w, https://substackcdn.com/image/fetch/$s_!GBwH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31229b6a-c434-4ed1-80d9-55b4eda8ba91_2823x1494.png 848w, https://substackcdn.com/image/fetch/$s_!GBwH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31229b6a-c434-4ed1-80d9-55b4eda8ba91_2823x1494.png 1272w, https://substackcdn.com/image/fetch/$s_!GBwH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31229b6a-c434-4ed1-80d9-55b4eda8ba91_2823x1494.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GBwH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31229b6a-c434-4ed1-80d9-55b4eda8ba91_2823x1494.png" width="1456" height="771" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/31229b6a-c434-4ed1-80d9-55b4eda8ba91_2823x1494.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:771,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:339626,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heatmapstohistograms.substack.com/i/170494207?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31229b6a-c434-4ed1-80d9-55b4eda8ba91_2823x1494.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GBwH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31229b6a-c434-4ed1-80d9-55b4eda8ba91_2823x1494.png 424w, https://substackcdn.com/image/fetch/$s_!GBwH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31229b6a-c434-4ed1-80d9-55b4eda8ba91_2823x1494.png 848w, https://substackcdn.com/image/fetch/$s_!GBwH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31229b6a-c434-4ed1-80d9-55b4eda8ba91_2823x1494.png 1272w, https://substackcdn.com/image/fetch/$s_!GBwH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31229b6a-c434-4ed1-80d9-55b4eda8ba91_2823x1494.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><strong>Quantitative vs. Qualitative: A Side-by-Side View</strong></figcaption></figure></div><p>My goal in the first portion of my book is to help individuals, teams, and organizations get unstuck. Most people don't realize they're trying to blend fundamentally incompatible approaches. Whether you're ready to embrace quantitative methods or need to work within existing qualitative constraints, the path forward starts with recognizing which discipline you're actually practicing; then aligning your tools, metrics, and expectations accordingly.</p><p>I'll cover this divide in my book, but if you can't wait and want to explore these ideas now, there are two books every risk analyst should read.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Qc9p!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44517583-2afa-4c6d-a7b8-56141581ceb3_5512x3690.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Qc9p!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44517583-2afa-4c6d-a7b8-56141581ceb3_5512x3690.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Qc9p!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44517583-2afa-4c6d-a7b8-56141581ceb3_5512x3690.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Qc9p!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44517583-2afa-4c6d-a7b8-56141581ceb3_5512x3690.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Qc9p!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44517583-2afa-4c6d-a7b8-56141581ceb3_5512x3690.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Qc9p!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44517583-2afa-4c6d-a7b8-56141581ceb3_5512x3690.jpeg" width="574" height="384.375" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/44517583-2afa-4c6d-a7b8-56141581ceb3_5512x3690.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:975,&quot;width&quot;:1456,&quot;resizeWidth&quot;:574,&quot;bytes&quot;:4768906,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heatmapstohistograms.substack.com/i/170494207?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44517583-2afa-4c6d-a7b8-56141581ceb3_5512x3690.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Qc9p!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44517583-2afa-4c6d-a7b8-56141581ceb3_5512x3690.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Qc9p!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44517583-2afa-4c6d-a7b8-56141581ceb3_5512x3690.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Qc9p!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44517583-2afa-4c6d-a7b8-56141581ceb3_5512x3690.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Qc9p!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44517583-2afa-4c6d-a7b8-56141581ceb3_5512x3690.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong><a href="https://www.amazon.com/Against-Gods-Remarkable-Story-Risk/dp/0471295639">Against the Gods: The Remarkable Story of Risk</a></strong> by Peter Bernstein shows you that risk management isn't some modern invention born from compliance frameworks. It's a centuries-old intellectual tradition stretching from Renaissance gamblers to Wall Street quants. Understanding this pedigree helps you see why real risk analysis requires mathematical thinking, not just following an ISO standard or filling out templates.</p><p><strong><a href="https://www.amazon.com/Failure-Risk-Management-Why-Broken/dp/111952203X">The Failure of Risk Management: Why It&#8217;s Broken and How to Fix It</a></strong> by Douglas Hubbard systematically dismantles the qualitative methods most organizations use, demonstrating with brutal clarity why heat maps and risk matrices don't actually manage risk. He doesn't just critique; he provides a practical path forward, showing how to apply proven quantitative methods to the very problems organizations claim are "unmeasurable."</p><p>Together, these books reveal both where we came from and where we need to go. <em>Against the Gods</em> shows the intellectual heritage you're part of when performing a quantitative risk assessment. <em>The Failure of Risk Management s</em>hows why most of what passes for "risk management" today is theater, not analysis.</p><h1>&#127919; The Risk Analysis Scope Creep Death Spiral</h1><p>Lately, I've been thinking a lot about risk analysis scope creep. Earlier in my career as a risk analyst, I didn't have the technical know-how and rhetorical skills to recognize and rein in this common problem. What starts as "let's assess our ransomware exposure" somehow morphs into modeling every conceivable threat from insider trading to asteroid impacts.</p><p>This reminds me of those old DirecTV commercials from years back. Here's how one went:</p><div id="youtube2-kIv3m2gMgUU" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;kIv3m2gMgUU&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/kIv3m2gMgUU?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><blockquote><p><em>When your cable company keeps you on hold, you get angry. When you get angry, you blow off steam. When you blow off steam, accidents happen. When accidents happen, you get an eye patch. When you get an eye patch, people think you're tough. When people think you're tough, they want to see how tough. And when they want to see how tough, you end up in a roadside ditch.</em></p><p><em>Don't wake up in a roadside ditch. Get rid of cable and upgrade to DirecTV.</em></p></blockquote><p>Now, the risk assessment version:</p><blockquote><p><em>When you start a simple ransomware assessment, you realize you need to model supply chain risk. When you model supply chain risk, you discover fourth-party vendor dependencies. When you discover fourth-party dependencies, you start mapping the entire global semiconductor supply chain. When you map the global semiconductor supply chain, you're analyzing geopolitical tensions in Taiwan. When you're analyzing geopolitical tensions, you're building World War III scenarios. When you're building World War III scenarios, you're calculating the cyber risk impact of nuclear winter.</em></p><p><em>Don't calculate the cyber risk impact of nuclear winter. Scope your assessment properly.</em></p></blockquote><h2>Why This Matters (Especially for Beginners)</h2><p>I once watched a 6-month risk assessment die on the vine because it took too long. The team had produced incredible work: sophisticated threat modeling, multiple risk scenarios, and analysis of every vector that stakeholders even casually mentioned in passing. "What about USB drives?" became a multi-page appendix. "Could nation-states target us?" spawned geopolitical risk research.</p><p>By the time they delivered their report, the CISO had already allocated next year's budget. The decision they were supposed to inform was made two months prior, without the benefit of a risk analysis.</p><p>Risk assessments aren't academic exercises; they're decision support tools operating under real-world constraints. When you lose sight of that, you're not being thorough; you're being counterproductive.</p><h2>The Warning Signs</h2><p>Watch for these scope creep red flags:</p><ul><li><p>"While we're at it, let's also look at..."</p></li><li><p>Risk scenarios requiring multiple independent failures, plus a solar flare</p></li><li><p>Modeling threats that would require your company to first become 10x more important</p></li><li><p>Analysis timeframe exceeding the decision timeframe</p></li><li><p>Stakeholders who've stopped asking when you'll be done</p></li></ul><h2>The Antidote</h2><p>Before you start any risk assessment, get crystal clear on three things:</p><ol><li><p><strong>What decision needs to be made?</strong> Not "understand our risk" but "should we invest $X in Y?"</p></li><li><p><strong>When does that decision need to be made?</strong> Work backwards from this date, not forwards from today</p></li><li><p><strong>What would change their mind?</strong> If the answer is "nothing," you're writing a report, not doing risk analysis</p></li></ol><p><strong>Remember</strong>: A good-enough assessment delivered in time to influence a decision beats a perfect assessment delivered to the void.</p><div><hr></div><h1>&#128196;Book Excerpt: Defending Your Scope Against &#8220;What Abouts&#8221;</h1><p>Here's an excerpt from my book that ties in nicely to the previous section on scope creep. I call all these additional requests that can sink an assessment "<strong>what abouts</strong>." This is from my chapter on risk scenario building:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1QXj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdeb833e-c3f1-4a3b-8e92-2a582bb2d0ec_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1QXj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdeb833e-c3f1-4a3b-8e92-2a582bb2d0ec_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!1QXj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdeb833e-c3f1-4a3b-8e92-2a582bb2d0ec_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!1QXj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdeb833e-c3f1-4a3b-8e92-2a582bb2d0ec_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!1QXj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdeb833e-c3f1-4a3b-8e92-2a582bb2d0ec_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1QXj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdeb833e-c3f1-4a3b-8e92-2a582bb2d0ec_1024x1536.png" width="432" height="648" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cdeb833e-c3f1-4a3b-8e92-2a582bb2d0ec_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:432,&quot;bytes&quot;:2669825,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heatmapstohistograms.substack.com/i/170494207?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdeb833e-c3f1-4a3b-8e92-2a582bb2d0ec_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1QXj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdeb833e-c3f1-4a3b-8e92-2a582bb2d0ec_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!1QXj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdeb833e-c3f1-4a3b-8e92-2a582bb2d0ec_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!1QXj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdeb833e-c3f1-4a3b-8e92-2a582bb2d0ec_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!1QXj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcdeb833e-c3f1-4a3b-8e92-2a582bb2d0ec_1024x1536.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Be very protective of the in-scope and out-of-scope items in your risk assessment. As you circulate the risk scope to various teams for feedback, you will inevitably receive a flood of&nbsp;<strong>"what abouts"</strong>&nbsp;- the scope creep requests that arise once people see your risk scenario. It goes something like this:</p><ul><li><p>"What about insider threats? Shouldn't we include those too?"</p></li><li><p>"What about our mobile app? That has customer data too, right?"</p></li><li><p>"What about that new ransomware group we read about in the threat intel brief?"</p></li><li><p>"What about social engineering? That's how most breaches start."</p></li><li><p>"What about our cloud infrastructure? That could be a risk too."</p></li></ul><p>These are all valid concerns, but your scope doesn't necessarily need to extend to these items. You do have to listen to each and every one, but bring it back to two things: the risk statement and the <em>business decision</em> the assessment will inform. Do the additional <em><strong>what abouts</strong></em> inform those?</p><p><strong>The opportunity cost matters</strong>: Every additional piece of scope costs something: your time to collect and analyze data, stakeholder time for interviews, potential delays to decision-making, and sometimes real money for external research or tools. Before expanding your scope, ask:</p><ul><li><p>Will this additional analysis change the decision we're trying to make?</p></li><li><p>Is the cost (time, effort, money, delay) of including this worth the potential insight?</p></li><li><p>Could the decision-maker act confidently without this extra information?</p></li><li><p>Does this address the original business concern, or is it just intellectually interesting?</p></li></ul><p>Every hour you spend analyzing tangential risks is an hour not spent on the core question. Every week you delay the assessment while gathering "nice-to-have" data is a week the business operates without the insights it needs.</p><p><strong>Remember</strong>: The goal isn't to analyze every possible factor of every single risk in the universe. It aims to provide decision-makers with sufficient insight to act confidently on the specific concern that prompted this assessment.</p><p><strong>How to respond to scope creep:</strong> "That's an interesting point. Let's capture that as a separate risk to analyze later, but for this assessment, we're focused on [<em>restate your original scope</em>] because it directly addresses the [<em>business decision</em>]."</p><p>Stay focused, stay decisive, and protect your scope. You can always do another assessment later.</p><div><hr></div><h1>Risk Analysis and the Gambler's Fallacy: Why Your Inside View Isn&#8217;t Enough</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jYba!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d55789-0bd9-424b-920a-09e9e55392ef_6000x4000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jYba!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d55789-0bd9-424b-920a-09e9e55392ef_6000x4000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jYba!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d55789-0bd9-424b-920a-09e9e55392ef_6000x4000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jYba!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d55789-0bd9-424b-920a-09e9e55392ef_6000x4000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jYba!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d55789-0bd9-424b-920a-09e9e55392ef_6000x4000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jYba!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d55789-0bd9-424b-920a-09e9e55392ef_6000x4000.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/70d55789-0bd9-424b-920a-09e9e55392ef_6000x4000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:6524112,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heatmapstohistograms.substack.com/i/170494207?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d55789-0bd9-424b-920a-09e9e55392ef_6000x4000.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jYba!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d55789-0bd9-424b-920a-09e9e55392ef_6000x4000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jYba!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d55789-0bd9-424b-920a-09e9e55392ef_6000x4000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jYba!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d55789-0bd9-424b-920a-09e9e55392ef_6000x4000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jYba!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F70d55789-0bd9-424b-920a-09e9e55392ef_6000x4000.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Photo by <a href="https://unsplash.com/@freewalkingtoursalzburg?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash">Free Walking Tour Salzburg</a> on <a href="https://unsplash.com/photos/brown-and-green-round-analog-clock-WLNdV3xC-fI?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash">Unsplash</a></em></figcaption></figure></div><p>I&#8217;m writing this from the Mandalay Bay in Las Vegas, taking a break from Black Hat. Last night, walking through the casino, I stopped at a roulette table where a small crowd had gathered.</p><p>Above the wheel, an electronic board flashed &#8220;HOT&#8221; and &#8220;COLD&#8221; numbers, showing the recent winners and the &#8220;overdue&#8221; losers. Black had hit six times in a row.</p><p>A guy next to me slid a stack of chips onto red.<br> &#8220;It&#8217;s due,&#8221; he told his friend.</p><p>The wheel spun. Black again. Seven.</p><p>That board is a master class in psychological misdirection. The casino knows exactly how people will read it. They are not offering insight. They are using a bias that keeps people betting.</p><h2>The Inside View Trap</h2><p>What I saw was the Gambler&#8217;s Fallacy: the belief that past results somehow change the odds in an independent game. In reality, every spin is the same, with eighteen chances for red, eighteen for black, and two for green in an American game. About 47.4 percent either way. The past does not matter.</p><p>Daniel Kahneman talks about this in terms of the inside and outside view. The inside view is personal. All the details are right in front of you. Seven blacks in a row -  black must be &#8220;hot.&#8221; The outside view zooms out and looks at the bigger picture. Spins are independent, and the odds have not moved an inch. The outside view starts with what Kahneman and Tversky first described, later expanded by Kahneman and Lovallo, as a &#8220;reference class&#8221; approach: finding similar past cases to establish a base rate, then adjusting for your own specifics.</p><p>In risk work, the inside view feels compelling because it is your data and your history. But without the outside view to anchor it, it can be dangerously misleading.</p><h2>From Roulette to Cybersecurity</h2><p>The next day at Black Hat, I overheard someone say, &#8220;We haven&#8217;t had a major incident in three years. Our security program is clearly working.&#8221;</p><p>It is the same mental trap. The absence of bad news feels like proof of success. But in cybersecurity, events are not like roulette spins. They are connected in messy ways: shared vulnerabilities across common platforms, attackers reusing tools, exploit kits spreading, supply chains concentrating risk, and defenses that work for a while until attackers shift tactics.</p><p>So, unlike roulette, where past spins tell you nothing, in cyber, we should update on external events and peer data, not just our own quiet streak. Three quiet years could mean you have done a great job. It could also mean the attackers were busy elsewhere, or that someone is already inside and you have not found them yet. Sometimes it is just normal variation. Without looking beyond your own history, you cannot improve your forecast about which of these is actually happening.</p><h2>The Data Blind Spot</h2><p>This is where loss event frequency estimates often go wrong. If you base them only on your own history, a quiet stretch might make the probability look close to zero. But take the outside view, look at industry data, and you might find that in many circumstances, annual probabilities for material incidents land somewhere in the single-digit to low double-digit range. The exact number depends on your sector, size, and exposure.</p><p>Think about SolarWinds or Kaseya. Many companies had no frame of reference for a supply chain compromise of that scale. Their models, built entirely on internal experience, underestimated both the frequency of such events and their potential severity. Well-run risk programs that took the outside view already had this kind of event in their scenarios long before those breaches made headlines. The 2013 Target breach through an HVAC vendor, the 2017 NotPetya attack spread via a compromised accounting software update, and the 2017 CCleaner incident all showed that trusted channels can be turned into attack vectors. Programs built on that foundation could see risks to their company that had never happened within their own walls. Zero incidents in your history do not mean zero incidents in your future.</p><h2>Mixing the Views</h2><p>The best risk models start with the outside view: industry data, base rates, and what is happening in the wild. Then they layer in the inside view: your controls, your attack surface, targeting patterns you have seen, and the current threat landscape.</p><p>You do not assume the outside view is perfect, and you do not throw away the inside view just because it is biased. You blend them. You keep your ranges wide enough to be honest about uncertainty. And you write down your reasoning so you can revisit it later or change it when new data arrives.</p><h2>Humility in the Model</h2><p>Roulette is easy to describe. The odds are fixed, the events are independent, and the math is clean. Cyber risk is the opposite. Events influence each other. The threat landscape changes constantly. The data is incomplete and often noisy.</p><p>The teams that get this right do not confuse a lucky streak with a winning strategy. They use their own data but never rely on it alone. They check it against the outside view because &#8220;we have never seen it happen&#8221; is not the same as &#8220;it cannot happen here.&#8221;</p><p>In risk, as in the casino, betting on patterns that do not exist is the fastest way to lose. The strongest risk analysis programs follow the <a href="https://heatmapstohistograms.substack.com/i/167136162/the-three-source-framework">Three-Source Framework</a> I wrote about in <a href="https://heatmapstohistograms.substack.com/p/issue-1-bayesian-thinking-building">Issue 1 of this newsletter</a>. Start with external data because it gives you the outside view: industry context and base rates that are bigger than your own experience and immune to the false comfort of a quiet streak. Then bring in internal data to ground the analysis in your specific reality, and subject matter expert input to bridge past and future with judgment about current threats, new controls, and changing conditions. Each source has blind spots, but together they create something far more reliable than any single input. Do this consistently, and you will stop betting on luck and start making better, more defensible decisions.</p><h3>Further reading:</h3><ul><li><p>Kahneman, D., &amp; Tversky, A. (1979). <em><a href="https://apps.dtic.mil/sti/citations/ADA047747">Intuitive prediction: Biases and corrective procedures.</a></em><a href="https://apps.dtic.mil/sti/citations/ADA047747"> In </a><em><a href="https://apps.dtic.mil/sti/citations/ADA047747">Forecasting</a></em></p></li><li><p>Kahneman, D., &amp; Lovallo, D. (1993). <a href="https://bear.warrington.ufl.edu/brenner/mar7588/Papers/kahneman-lovallo-mansci1993.pdf">Timid choices and bold forecasts: A cognitive perspective on risk taking</a>. <em>Management Science, 39</em>(1), 17&#8211;31.</p></li></ul><div><hr></div><h1>&#128218; What I'm Reading</h1><p><strong><a href="https://www.amazon.com/Antifragile-Things-That-Disorder-Incerto/dp/0812979680">Antifragile by Nassim Taleb</a></strong></p><p>I&#8217;ve been rereading <em>Antifragile</em> through the lens of cyber risk quantification, asking: <em>what makes a risk model fragile?</em> Taleb&#8217;s core idea is that fragility isn&#8217;t just about being vulnerable. It&#8217;s about being <em>harmed by volatility</em>, randomness, and stressors. Many traditional risk models, especially those built on single-point estimates or assumptions of normality, fall apart when hit with real-world uncertainty.</p><p>Taleb is particularly critical of what he calls <em>fragilistas</em>: people who try to control complex systems with overly simplified models, often creating more harm than good. If that sounds familiar in cyber risk management, it should.</p><p>In contrast, he argues we should look for systems that benefit from disorder. In cyber risk terms, that means favoring models that expose uncertainty with distributions, adapt to new data, and resist overfitting. The book is dense, digressive, and a bit too confrontational for my comfort, but its insights are powerful. It reminds us that precision without resilience is a liability.</p><p><strong><a href="https://www.acsac.org/2001/papers/110.pdf">Why Information Security is Hard &#8211; An Economic Perspective by Ross Anderson</a></strong></p><p>This paper is over 20 years old, but it&#8217;s still one of the most useful things you can read if you're trying to understand why so many security problems persist. Better tools, better talent, and bigger budgets haven&#8217;t solved them. Anderson&#8217;s core argument is that <strong>most security failures aren&#8217;t technical; they&#8217;re economic.</strong></p><p>He explains how misaligned incentives, externalities, and information asymmetries create a world where the people who could fix problems often aren't the ones who suffer from them. It&#8217;s a foundational concept in <strong>security economics</strong>, and it helps explain everything from underinvestment in basic hygiene to why insecure software is still everywhere.</p><p>This matters for risk quantification, too. If we&#8217;re trying to measure and model risk, we need to understand not just what&#8217;s vulnerable, but why it stays that way. Incentives shape outcomes. Without that lens, even the best models will miss the mark.</p><p>The topic is still very relevant. I recommend it to anyone who wants to understand and solve real-world security problems.</p><p><strong><a href="https://diffuser.substack.com/p/the-joy-of-deep-reading">The Joy of Deep Reading by Rick Howard</a></strong></p><p>I recently went back and read Rick Howard&#8217;s <a href="https://substack.com/home/post/p-168296687">July </a><em><a href="https://substack.com/home/post/p-168296687">First Principles</a></em><a href="https://substack.com/home/post/p-168296687"> newsletter</a> on the joy of deep reading, and it hit uncomfortably close to home. I love reading, but I am guilty of skimming far too much in my rush to consume as much as possible each day. Rick makes a compelling case for slowing down, picking one great book, and going deep, really engaging with the material instead of chasing bullet points and AI summaries.</p><p>What I loved most was how he blends personal stories, history, and curated recommendations from the CyberCanon project. If you have ever felt the pressure to &#8220;keep up&#8221; and ended up sacrificing depth for speed, this will remind you why deep reading is worth it.</p><p>If you care about cybersecurity, strategy, or just sharpening your thinking, I highly recommend subscribing to <a href="https://diffuser.substack.com/">Rick&#8217;s </a><em><a href="https://diffuser.substack.com/">First Principles</a></em><a href="https://diffuser.substack.com/"> newsletter</a>. You will come away with ideas that stick and a reading list that is actually worth your time.</p><div><hr></div><h1>&#128450; From the Archives</h1><p>To keep decisions from drifting, here are two older posts of mine that fix two quiet common failures: fuzzy language and mismatched expert input.</p><p><strong><a href="https://www.tonym-v.com/blog/2020/08/09/predictive">Probability &amp; the words we use: why it matters</a></strong></p><p>I wrote a while back about how words like <em>likely</em>, <em>high chance</em>, or <em>probably</em> can completely derail a risk discussion. The CIA and NATO have both done research showing that people interpret these words in wildly different ways, sometimes by 40 percentage points or more.</p><p>You see this all the time in boardrooms, forecasts, and risk reports. Everyone thinks they&#8217;re on the same page, but they&#8217;re not.</p><p>The fix? Stop thinking like a storyteller and start thinking like a weather forecaster. Put numbers on it. <em>High likelihood</em> becomes <em>70% chance</em>. Now it&#8217;s clear, and you can actually make a decision with it.</p><p><strong><a href="https://www.tonym-v.com/blog/2021/6/30/when-the-experts-disagree-in-risk-analysis">When Experts Disagree in Risk Analysis</a></strong></p><p>Ever had one expert give you a risk estimate that&#8217;s way outside what everyone else is saying? It&#8217;s more common than you might think, and it&#8217;s worth understanding why before you throw their number out.</p><p>From what I&#8217;ve seen, it usually comes down to one of four things:</p><ul><li><p>They&#8217;re not calibrated</p></li><li><p>They misunderstood the question</p></li><li><p>They have a different worldview</p></li><li><p>They know something the others don&#8217;t</p></li></ul><p>Sometimes it&#8217;s noise, but sometimes it&#8217;s the most important data point in the room. The only way to know is to dig in, ask follow-up questions, and be honest about what you find.</p><p>If you work with SMEs in your modeling or forecasts, this is one to bookmark.</p><div><hr></div><h2><strong>&#9993;&#65039; Contact</strong></h2><p>Have a question about scoping risk assessments? Here's how to reach me:</p><ul><li><p>Reply to this newsletter if reading via email</p></li><li><p>Comment below</p></li><li><p>Connect with me on <a href="https://www.linkedin.com/in/tonymartinvegue/">LinkedIn</a></p></li><li><p><a href="https://www.tonym-v.com/contact">Contact form</a></p></li></ul><div><hr></div><h2><strong>&#10084;&#65039; How You Can Help</strong></h2><p>&#9989; Share your scope creep horror stories - they might become examples in the book<br>&#9989; Forward this to a colleague who's stuck in analysis paralysis<br>&#9989; Click the &#10084;&#65039; if this helped you escape a scope death spiral</p><p>Thanks for reading, and remember: the perfect risk assessment that never gets finished is infinitely less valuable than the good one that informs a decision this week.</p><p>&#8212;Tony</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Issue 1.5 | Beyond Base Rates: Turning IRIS Data into Risk Conversations]]></title><description><![CDATA[The Missing Piece: Which Threats Actually Affect Organizations Like Yours]]></description><link>https://newsletter.heatmapstohistograms.com/p/issue-15-beyond-base-rates-turning</link><guid isPermaLink="false">https://newsletter.heatmapstohistograms.com/p/issue-15-beyond-base-rates-turning</guid><dc:creator><![CDATA[Tony Martin-Vegue]]></dc:creator><pubDate>Wed, 23 Jul 2025 19:16:59 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6f29ea01-306b-4548-ab69-2f570bae8e25_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1><strong>In This Special Issue:</strong></h1><p>&#128202; <strong>Incident-Specific Frequencies</strong>: Use IRIS 2025 data to move beyond overall probabilities and understand which threats actually affect organizations like yours</p><p>&#127919; <strong>The Complete IRIS Formula</strong>: Layer incident types from IRIS 2025 onto your base rates for targeted threat modeling</p><p>&#128483;&#65039; <strong>Conversation Transformation</strong>: New conversation unlocks that are enabled with IRIS research instead of guesswork</p><p>&#127968; <strong>Your Risk Analysis "Home Lab"</strong>: Practice these IRIS-based skills even if your company doesn't do quantitative risk yet</p><div><hr></div><p>Hi! <br><br>A few weeks ago in <a href="https://heatmapstohistograms.substack.com/p/issue-1-bayesian-thinking-building">Issue 1</a>, we explored Bayesian thinking and showed you exactly how to extract your organization's base rates from <a href="https://www.cyentia.com/iris/">IRIS 2025</a>. We walked through four use cases: establishing base rates, applying sector adjustment, estimating loss magnitude using revenue-tier and sector benchmarks, and factoring in risk trajectory. You learned the methodology - how to start with what you have and get better over time.</p><p>I enjoyed working with the <a href="https://www.cyentia.com/iris/">IRIS report</a> so much, I wanted to do one more practical application before Issue 2 drops in early August. Think of this as a quick follow-up that builds naturally on your foundation.<br><br>Thank you for reading,<br>Tony</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!K4La!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e7537b1-0cd7-4a1e-8307-eba37586fee2_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!K4La!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e7537b1-0cd7-4a1e-8307-eba37586fee2_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!K4La!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e7537b1-0cd7-4a1e-8307-eba37586fee2_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!K4La!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e7537b1-0cd7-4a1e-8307-eba37586fee2_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!K4La!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e7537b1-0cd7-4a1e-8307-eba37586fee2_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!K4La!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e7537b1-0cd7-4a1e-8307-eba37586fee2_1024x1024.png" width="542" height="542" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3e7537b1-0cd7-4a1e-8307-eba37586fee2_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:542,&quot;bytes&quot;:1598439,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heatmapstohistograms.substack.com/i/169014723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e7537b1-0cd7-4a1e-8307-eba37586fee2_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!K4La!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e7537b1-0cd7-4a1e-8307-eba37586fee2_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!K4La!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e7537b1-0cd7-4a1e-8307-eba37586fee2_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!K4La!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e7537b1-0cd7-4a1e-8307-eba37586fee2_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!K4La!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e7537b1-0cd7-4a1e-8307-eba37586fee2_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The Missing Layer in Your Risk Analysis</h2><p><strong>Where We Are:</strong> In <a href="https://heatmapstohistograms.substack.com/p/issue-1-bayesian-thinking-building">Issue 1</a>, you've established your organization's sector-specific base rates using <a href="https://www.cyentia.com/iris/">IRIS 2025</a> data. You now have solid, research-backed probabilities for experiencing a significant cyber incident.</p><p><strong>The Next Layer:</strong> Those base rates tell you about overall incident likelihood, but they don't help you understand <em>which types</em> of incidents are most likely to affect organizations like yours. That's where incident-specific frequencies come in.</p><p><strong>The Unlock:</strong> By layering incident-specific frequencies onto your base rates, you can move from "we have a 9.9% annual severe incident probability" to "we're most likely to face system intrusion (46% of incidents), followed by ransomware (35%), with accidental disclosure making up 3%."</p><p>This enables much more targeted conversations with leadership about where to focus security investments, what scenarios to prepare for, and how different threat types might impact your specific business operations.</p><div><hr></div><h2><strong>IRIS 2025: Calculate Your Incident-Specific Risk</strong></h2><p>You've built your sector-specific base rates. Now let's drill one layer deeper to understand <em>which types</em> of incidents organizations in your sector actually experience.</p><h3><strong>The Complete Formula</strong></h3><p>Up to this point, we&#8217;ve been talking about overall incident probability. That&#8217;s useful, but it still leaves an important question unanswered. If an incident does occur, what kind of incident is it most likely to be?</p><p>This is where incident-specific frequencies come in.</p><p>At a high level, the idea is simple. You start with your organization&#8217;s overall probability of experiencing a significant cyber incident, then you decompose that probability based on the types of incidents that actually occur in the real world.</p><p>Here&#8217;s the formula we&#8217;ll use:</p><p><strong>Incident-Specific Probability<br>= Base Rate &#215; Sector Adjustment &#215; Incident Type Percentage</strong></p><p>Before we apply it, one clarification matters.</p><p>The incident type percentages from IRIS are <strong>conditional distributions</strong>. They describe how incidents break down <em>given that a significant incident has occurred</em>. They are not independent risks, and they are not additive. This formula doesn&#8217;t create new risk. It simply partitions an existing annual probability into more actionable pieces.</p><p>In other words, we&#8217;re taking one overall likelihood and asking, &#8220;If something happens, what does it most likely look like?&#8221;</p><p>Each part of the formula plays a specific role.</p><p>The base rate represents the annual probability that an organization experiences at least one significant cyber incident that enters the public record.</p><p>The sector adjustment is a relative likelihood factors drawn from IRIS. IRIS does not prescribe a single official way to combine revenue tier and sector effects, so we use the sector factor here as a transparent heuristic on top of a revenue-conditioned base rate.</p><p>The incident type percentage comes from IRIS&#8217;s observed distribution of incident types. Applied correctly, it lets us move from a single headline probability to a set of incident-specific probabilities that still sum back to the original total.</p><p>This distinction is subtle, but important. We&#8217;re not stacking risks on top of each other. We&#8217;re breaking one risk apart so it can be discussed, prioritized, and acted on.</p><p>With that foundation in place, we can walk through a concrete example.</p><h3><strong>Step 1: Get Your Base Rate</strong></h3><p><strong>Current annual probability (base rate): approximately 8&#8211;9% (Figure 7, p. 12)</strong></p><p>This is your starting point: the likelihood that an organization in this revenue tier experiences at least one significant incident that enters the public record.</p><p>Because Figure 7 already conditions on revenue tier, we do not apply an additional revenue adjustment in this example.</p><h3><strong>Step 2: Adjust for Your Industry</strong></h3><p><strong>Source:</strong> Figure A1, p. 34</p><p>Apply your sector-specific multiplier:</p><ul><li><p><strong>Healthcare</strong>: 1.34x</p></li><li><p><strong>Financial</strong>: 1.44x</p></li><li><p><strong>Information</strong>: 1.55x</p></li><li><p><strong>Education</strong>: 1.60x</p></li><li><p><strong>Professional</strong>: 1.50x</p></li><li><p><strong>Manufacturing</strong>: 1.03x</p></li><li><p><strong>Utilities</strong>: 0.62x</p></li><li><p><strong>Retail</strong>: 1.19x</p></li></ul><p><em>Note: These are a few of the sectors on page 34; refer to the report for the full list)</em></p><h3><strong>Step 3: Apply Incident Type Frequency</strong></h3><p>So far, we&#8217;ve been talking about how often an organization might experience a significant cyber incident. That&#8217;s useful, but it still leaves a practical gap. Even when leadership accepts the overall probability, the next question is almost always the same.</p><p>&#8220;What kind of incident are we actually talking about?&#8221;</p><p>IRIS helps answer that by showing how real-world incidents break down by type.</p><p>To see this, turn to Figure 2 on Page 5 of the IRIS 2025 report. This figure shows the distribution of incident types observed in the IRIS dataset for the most recent year.</p><p>One important clarification before we go further. These percentages represent a <strong>conditional distribution</strong>. They answer the question: <em>given that a significant cyber incident occurs, what type of incident is it most likely to be?</em> They are not independent annual risks, and they should not be added together. Used correctly, they simply partition the total incident probability we already calculated.</p><p>Based on a visual reading of Figure 2 for 2024, the incident pattern looks roughly like this:</p><ul><li><p>System intrusion: ~46%</p></li><li><p>Ransomware: ~35%</p></li><li><p>Denial-of-service attacks: ~8%</p></li><li><p>Accidental disclosure: ~3%</p></li><li><p>Insider misuse: ~2%</p></li><li><p>Defacement: ~1%</p></li><li><p>Scam or fraud: ~1%</p></li><li><p>Physical threat: ~1%</p></li><li><p>System failure: ~1%</p></li></ul><p>These values are approximate and may not sum to exactly 100 percent due to rounding. That&#8217;s fine. Precision isn&#8217;t the goal here. Direction and relative weight are.</p><p>Another important label. This incident-type distribution is <strong>aggregated across the IRIS dataset</strong>. It is not sector-specific and it is not revenue-specific. Think of it as a general conditional pattern: when a significant incident happens, this is how those incidents tend to show up across organizations.</p><p>Despite that limitation, this breakdown is extremely useful. When you apply it to your organization&#8217;s overall incident probability, it allows you to move from a single abstract risk number to a short list of concrete scenarios that actually drive most of the risk.</p><p>With these incident-type frequencies in hand, we can now walk through a complete example and see how the math translates into something you can use in real conversations.</p><h3><strong>Real-World Example</strong></h3><p>Let&#8217;s walk through a concrete example to see how this works in practice.</p><p>We&#8217;ll stick with the same hypothetical organization: a healthcare company with approximately $800 million in annual revenue.</p><p>From earlier, we already have what we need to build a firm-specific starting point.</p><p>First, we estimate the overall probability of a significant cyber incident. Based on IRIS 2025 Figure 7 and a visual reading of the $100M to $1B revenue tier, the base annual probability appears to be roughly 8 to 9 percent.</p><p>Next, we apply a sector-relative adjustment. Using the Healthcare factor from Appendix 3, Figure A1, and treating it as a transparent heuristic, we arrive at a firm-specific prior of approximately <strong>11 to 12 percent per year</strong> for at least one significant, publicly reported cyber incident.</p><p>At this stage, we stop adjusting. That 11 to 12 percent is the total probability we&#8217;re working with. Everything that follows is about breaking that single number into more useful pieces, not adding new risk on top of it.</p><p>Now we apply the incident-type distribution.</p><p>Using the incident-type percentages from IRIS Figure 2, we can decompose that overall probability into incident-specific probabilities. For simplicity, we&#8217;ll work with a midpoint estimate of 9.9 percent, recognizing that the real answer is a range.</p><p>Here&#8217;s what that looks like.</p><ul><li><p><strong>System intrusion</strong>:<br>9.9% &#215; 0.46 &#8776; <strong>4.6%</strong></p></li><li><p><strong>Ransomware</strong>:<br>9.9% &#215; 0.35 &#8776; <strong>3.5%</strong></p></li><li><p><strong>Denial-of-service attack</strong>:<br>9.9% &#215; 0.08 &#8776; <strong>0.8%</strong></p></li><li><p><strong>Accidental disclosure</strong>:<br>9.9% &#215; 0.03 &#8776; <strong>0.3%</strong></p></li><li><p><strong>Insider misuse</strong>:<br>9.9% &#215; 0.02 &#8776; <strong>0.2%</strong></p></li><li><p><strong>All other incident types combined</strong>:<br>Each on the order of <strong>0.1%</strong> annually</p></li></ul><p>These numbers are not independent risks. They are slices of the same overall probability. If you add them back up, you end up right where you started.</p><p>What matters isn&#8217;t the second decimal place. What matters is the shape of the risk. In this example, system intrusion and ransomware together account for more than 80 percent of the organization&#8217;s incident likelihood. Everything else trails far behind.</p><p>That single insight is often enough to change the conversation.</p><p>Instead of debating whether cyber risk is &#8220;high&#8221; or &#8220;medium,&#8221; you can now say something much more concrete. If this organization experiences a significant incident in the next year, it is far more likely to involve credential compromise or ransomware than any other category. That gives you a defensible basis for prioritizing controls, planning scenarios, and focusing leadership attention.</p><p>With the math out of the way, we can now look at what this enables in real conversations with finance, business leaders, and executives.</p><div><hr></div><h2><strong>The Conversations This Enables</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!14pq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07df273b-725c-485f-9d86-ea7aeff0aa3d_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!14pq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07df273b-725c-485f-9d86-ea7aeff0aa3d_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!14pq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07df273b-725c-485f-9d86-ea7aeff0aa3d_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!14pq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07df273b-725c-485f-9d86-ea7aeff0aa3d_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!14pq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07df273b-725c-485f-9d86-ea7aeff0aa3d_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!14pq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07df273b-725c-485f-9d86-ea7aeff0aa3d_1536x1024.png" width="478" height="318.7760989010989" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/07df273b-725c-485f-9d86-ea7aeff0aa3d_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:478,&quot;bytes&quot;:2493168,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heatmapstohistograms.substack.com/i/169014723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07df273b-725c-485f-9d86-ea7aeff0aa3d_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!14pq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07df273b-725c-485f-9d86-ea7aeff0aa3d_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!14pq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07df273b-725c-485f-9d86-ea7aeff0aa3d_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!14pq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07df273b-725c-485f-9d86-ea7aeff0aa3d_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!14pq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07df273b-725c-485f-9d86-ea7aeff0aa3d_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The real payoff of this approach isn&#8217;t the math. It&#8217;s the conversations it unlocks.</p><p>Once you&#8217;ve decomposed overall cyber risk into incident-specific probabilities, you stop arguing about abstractions and start talking about concrete, defensible scenarios. That shift alone changes how people engage with the analysis.</p><p>Here&#8217;s what that looks like in practice.</p><h4>With Finance and the CFO</h4><p>Before, the conversation often sounds like this:</p><p>&#8220;We need more security budget because cyber threats are increasing.&#8221;</p><p>After applying this approach, the conversation changes shape:</p><p>&#8220;Based on IRIS 2025 data, organizations like ours face roughly an 11 to 12 percent annual probability of a significant cyber incident that enters the public record. Over 80 percent of that likelihood is driven by system intrusion and ransomware. Those are the scenarios that dominate our risk exposure, and they&#8217;re the ones this investment is designed to reduce.&#8221;</p><p>At this stage, you don&#8217;t need to pretend you have perfect loss estimates. What matters is that you can explain where risk is concentrated and why certain investments are aimed at specific, high-probability scenarios. When finance teams see that you&#8217;re reasoning from data rather than fear, the tone of the conversation changes.</p><h4>With Business Unit Leaders</h4><p>Before:</p><p>&#8220;Everyone needs to be more security conscious because cyber risk is high.&#8221;</p><p>After:</p><p>&#8220;Industry research shows that when significant incidents occur, nearly half involve system intrusion, often driven by credential compromise. For organizations like ours, that translates into several percentage points of annual risk concentrated in how access is managed day to day. The practices your team controls directly influence that exposure.&#8221;</p><p>This reframing connects abstract cyber risk to operational behavior. Business leaders may not care about probability theory, but they understand cause and effect. Incident-specific frequencies give you a credible bridge between the two.</p><h4>With the Board and Executives</h4><p>Before:</p><p>&#8220;Cyber risk is one of our top concerns.&#8221;</p><p>After:</p><p>&#8220;Industry data suggests our overall likelihood of a significant cyber incident is on the order of ten percent annually, with most of that risk concentrated in a small number of scenarios. We&#8217;re prioritizing controls and resilience measures accordingly, and we can show how those choices change the shape of our risk profile over time.&#8221;</p><p>Notice what&#8217;s missing here. There&#8217;s no overconfident claim of precision, and no reliance on a single scary number. Instead, you&#8217;re showing that risk is being actively managed, measured, and revisited as conditions change. That&#8217;s what boards are actually looking for.</p><h3>What Really Changes</h3><p>In each of these conversations, something subtle but important happens. You stop defending your instincts and start explaining your analysis.</p><p>You&#8217;re no longer the person saying, &#8220;I think cyber risk is high.&#8221; You&#8217;re the person saying, &#8220;Here&#8217;s how industry data breaks down, here&#8217;s where our exposure really sits, and here&#8217;s why we&#8217;re focusing where we are.&#8221;</p><p>That shift builds credibility, not because the numbers are perfect, but because the reasoning is visible and disciplined.</p><div><hr></div><h2><strong>&#127919; Your Next Steps</strong></h2><ol><li><p><strong>Calculate your top 3 incident probabilities</strong> using this method</p></li><li><p><strong>Multiply by potential loss estimates</strong> (see IRIS 2025 loss data by sector/revenue)</p></li><li><p><strong>Upgrade your conversations: </strong>budgeting, insurance planning, and board presentations</p></li><li><p><strong>Update annually</strong> as baseline probabilities and threat landscapes evolve</p></li></ol><div><hr></div><h2><strong>&#127968; Homework: Pick One Conversation</strong></h2><p>Your assignment: Choose one conversation you need to have in the next two weeks where you've been struggling with credibility or budget approval.</p><ol><li><p>Calculate your incident-specific probabilities using the formula above</p></li><li><p>Use the conversation frameworks to build your specific analysis</p></li><li><p>Lead with "Industry research shows..." instead of "I think..."</p></li><li><p>Watch how the conversation changes</p></li></ol><p>The goal isn't perfection - it's moving from opinion to analysis.</p><div><hr></div><h2><strong>Your Risk Analysis "Home Lab"</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!G2f7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2309bb9f-be7e-42f6-9913-ab23f3748254_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!G2f7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2309bb9f-be7e-42f6-9913-ab23f3748254_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!G2f7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2309bb9f-be7e-42f6-9913-ab23f3748254_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!G2f7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2309bb9f-be7e-42f6-9913-ab23f3748254_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!G2f7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2309bb9f-be7e-42f6-9913-ab23f3748254_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!G2f7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2309bb9f-be7e-42f6-9913-ab23f3748254_1536x1024.png" width="466" height="310.77335164835165" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2309bb9f-be7e-42f6-9913-ab23f3748254_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:466,&quot;bytes&quot;:2144049,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heatmapstohistograms.substack.com/i/169014723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2309bb9f-be7e-42f6-9913-ab23f3748254_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!G2f7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2309bb9f-be7e-42f6-9913-ab23f3748254_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!G2f7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2309bb9f-be7e-42f6-9913-ab23f3748254_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!G2f7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2309bb9f-be7e-42f6-9913-ab23f3748254_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!G2f7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2309bb9f-be7e-42f6-9913-ab23f3748254_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>What if your company doesn't do quantitative risk analysis, but you still want to try these techniques?</p><p>Here's my recommendation: do this stuff at home anyway.</p><p>Other people in the security field always talk about having a "home lab" - spinning up VMs, practicing penetration testing, learning new tools. This is our version of a home lab: practicing quantitative risk analysis.</p><p><strong>Why this matters:</strong></p><ul><li><p><strong>Skill development</strong>: These analytical skills transfer to every risk conversation you'll ever have</p></li><li><p><strong>Pattern recognition</strong>: The more assessments you build, the better you get at spotting what matters</p></li><li><p><strong>Confidence building</strong>: When you do get the chance to do this professionally, you're already practiced</p></li><li><p><strong>Career advancement</strong>: Quantitative risk skills are becoming table stakes for senior security roles</p></li></ul><p><strong>Practice scenarios to try:</strong></p><ul><li><p>Pick a company from recent breach headlines and reverse-engineer their risk profile</p></li><li><p>Model your previous employer's risk using public information</p></li><li><p>Build risk comparisons between different sectors you're curious about</p></li><li><p>Practice the conversation frameworks with industry colleagues</p></li></ul><p>Think of it as professional development, not just a theoretical exercise. Every assessment you build makes you better at the next one.</p><div><hr></div><h2>&#128273; Key Takeaways</h2><p><strong>For Leadership Conversations:</strong> Stop saying "we have high cyber risk." Start saying "Based on IRIS 2025 data, organizations like ours face a 4.6% chance of system intrusion and 3.5% chance of ransomware this year. These aren't generic estimates; they're based on what actually happened to similar organizations in our sector."</p><p><strong>For Security Planning:</strong> Focus defensive investments on your top 2-3 calculated risks rather than spreading resources equally across all possible threats. In our healthcare example, system intrusion (4.6% probability) and ransomware (3.5% probability) represent over 80% of the incident risk profile.</p><p><strong>For Budget Conversations:</strong> Use the complete formula (Base Rate (revenue-conditioned) &#215; Sector Factor &#215; Incident Type %) to move from opinion-based requests to real risk analysis. "Without this $200K investment, we have a 15% chance of losses exceeding $5M annually. With it, that drops to 8% chance of exceeding $2M" is a CFO conversation.</p><p>The way I framed risk above is called a <strong>loss exceedance statemen</strong>t. They are much stronger than heat maps because they:</p><ul><li><p>Show tail risk (the really bad scenarios CFOs worry about)</p></li><li><p>Use probability language that executives understand from other business decisions</p></li><li><p>Focus on the "what if we get unlucky" scenarios that keep leadership awake at night</p></li><li><p>Mirror how insurance and financial risk is typically discussed in boardrooms</p></li></ul><p><strong>For Professional Development:</strong> Practice these calculations even if your company doesn't do quantitative risk yet. These analytical skills transfer to every risk conversation you'll ever have and are becoming table stakes for senior security roles.</p><div><hr></div><h1><strong>What's Coming</strong></h1><p><strong>A note on IRIS focus:</strong> I know we've spent significant time on IRIS 2025 between Issues 1 and 1.5. That's intentional. The last IRIS was published in 2022, and it's genuinely one of the most important resources a cyber risk analyst has. Getting the most value out of this research felt worth the deep dive.</p><p>But we're moving on from here. <strong>Issue 2 will shift focus to completely different things.</strong></p><div><hr></div><h2><strong>&#9993;&#65039; Contact</strong></h2><p>Have a question about this issue or risk analysis in general? Here's how to reach me:</p><ul><li><p>Reply to this newsletter, if you receive via email</p></li><li><p>Comment below</p></li><li><p>Connect on <a href="https://www.linkedin.com/in/tonymartinvegue/">LinkedIn</a></p></li><li><p><a href="https://www.tonym-v.com/contact">Contact form</a></p></li></ul><p>Had success with any of the content here? Hit reply and share your story. These become case studies for future issues.</p><div><hr></div><h1>&#10084;&#65039; <strong>How You Can Help</strong></h1><ul><li><p>Forward this to someone who needs to upgrade their risk conversations</p></li><li><p>Click the &#10084;&#65039; or comment if you found this useful</p></li><li><p>Tell me what topics you want covered next</p></li></ul><p>If someone forwarded this to you, please subscribe to get future issues.</p><p>- Tony</p><div><hr></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/p/issue-15-beyond-base-rates-turning?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/p/issue-15-beyond-base-rates-turning?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.heatmapstohistograms.com/p/issue-15-beyond-base-rates-turning?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Issue 1 | Bayesian thinking, building base rates with IRIS 2025 & cyber prediction markets]]></title><description><![CDATA[How to Start with What You Have and Get Better Over Time]]></description><link>https://newsletter.heatmapstohistograms.com/p/issue-1-bayesian-thinking-building</link><guid isPermaLink="false">https://newsletter.heatmapstohistograms.com/p/issue-1-bayesian-thinking-building</guid><dc:creator><![CDATA[Tony Martin-Vegue]]></dc:creator><pubDate>Tue, 01 Jul 2025 20:45:52 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/16fcf058-c967-43e5-a0cf-5a213e9f7e9a_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>In This Month&#8217;s Issue:</h1><ul><li><p>&#128214; Book update: progress on data collection, vetting, and the three-source model for CRQ</p></li><li><p>&#129504; Why every risk analyst should think like a Bayesian (and how to start)</p></li><li><p>&#128202; How to use IRIS 2025 to establish base rates and build sector-specific priors</p></li><li><p>&#128736;&#65039; Step-by-step GenAI prompts for applying IRIS data in your own models</p></li><li><p>&#128215; Book Excerpt: My Experience with Prediction Markets</p></li><li><p>&#128218; What I&#8217;m reading: favorite picks on risk sin eater, security-first controls, and financial discipline in CRQ</p></li><li><p>&#128450; From the archives: two blog posts on pushback in risk analysis and decision framing</p></li><li><p>&#128587; Reader Q&amp;A: what to do when your org has 1,500 risks in the register</p></li></ul><div><hr></div><p>Hey there,</p><p>Welcome to Issue 1! Thanks for being part of this journey from the very beginning. This newsletter accompanies my upcoming book "<strong>From Heatmaps to Histograms: A Practical Guide to Cyber Risk Quantification</strong>" (Apress, early 2026). Each month, I share practical techniques, behind-the-scenes insights from the book writing process, and field-tested CRQ tactics that help you build better risk models.<br><br>If you missed my launch post (Issue 0), you can check it out <a href="https://heatmapstohistograms.substack.com/p/issue-0-i-signed-a-book-deal-field">here</a>. I shared the full abstract of the upcoming book as well as a guide to your first quantitative cyber risk assessment. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h1>&#128214; Book Update: Progress on the Big Middle</h1><p>First, a quick update on the book project. The deal is signed, and we're targeting early 2026 for publication. Pre-order links should be available later this year (likely Q4 2025), and I'll share those with you as soon as they're live.</p><p>I'm currently focused on what I thought would be the most challenging section: data collection, vetting, and preparation for quantitative analysis. I tackled this middle chunk first because getting the foundation right makes everything else click into place.</p><h2><strong>The Three-Source Framework</strong></h2><p>One of the core principles I'm building the book around is what I call the "three essential data sources" for cyber risk quantification:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gX2b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9a78ba-256d-4be6-9ffa-9b32fe27c157_3799x1645.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gX2b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9a78ba-256d-4be6-9ffa-9b32fe27c157_3799x1645.png 424w, https://substackcdn.com/image/fetch/$s_!gX2b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9a78ba-256d-4be6-9ffa-9b32fe27c157_3799x1645.png 848w, https://substackcdn.com/image/fetch/$s_!gX2b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9a78ba-256d-4be6-9ffa-9b32fe27c157_3799x1645.png 1272w, https://substackcdn.com/image/fetch/$s_!gX2b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9a78ba-256d-4be6-9ffa-9b32fe27c157_3799x1645.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gX2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9a78ba-256d-4be6-9ffa-9b32fe27c157_3799x1645.png" width="1456" height="630" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef9a78ba-256d-4be6-9ffa-9b32fe27c157_3799x1645.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:630,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:229294,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heatmapstohistograms.substack.com/i/167136162?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9a78ba-256d-4be6-9ffa-9b32fe27c157_3799x1645.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gX2b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9a78ba-256d-4be6-9ffa-9b32fe27c157_3799x1645.png 424w, https://substackcdn.com/image/fetch/$s_!gX2b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9a78ba-256d-4be6-9ffa-9b32fe27c157_3799x1645.png 848w, https://substackcdn.com/image/fetch/$s_!gX2b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9a78ba-256d-4be6-9ffa-9b32fe27c157_3799x1645.png 1272w, https://substackcdn.com/image/fetch/$s_!gX2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9a78ba-256d-4be6-9ffa-9b32fe27c157_3799x1645.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><strong>External data</strong> provides industry context and base rates - breach frequencies, cost studies, enforcement patterns. Your "what typically happens to organizations like ours" baseline.</p></li><li><p><strong>Internal data</strong> grounds everything in your specific reality - incident logs, actual recovery times, real costs from past events. Your "what actually happens <em>here</em>" update.</p></li><li><p><strong>Subject matter expert (SME) input</strong> bridges past and future with forward-looking judgment about current threats, new controls, and changing conditions. Your "what's likely to happen next" forecast.</p></li></ul><p>The magic happens when you systematically combine all three. Each source has blind spots, but together they create something far more reliable than any single input.</p><h2><strong>Getting Unstuck</strong></h2><p>People get stuck on data collection for three main reasons: the "perfect data myth," not knowing where to look, and analysis overwhelm when facing messy information. I'm addressing each with practical methods that work with real-world constraints.</p><h2><strong>Vetting and Blending</strong></h2><p>The book includes a simple framework for evaluating any data source in minutes, plus time-tested quality adjustment methods borrowed from fields like climate science, nuclear safety, and actuarial science that specialize in high-stakes decisions under uncertainty. When you find that vendor survey claiming "average breach cost is $2.1M," you'll know exactly how to convert it into an honest range that reflects what you actually know.</p><p>For combining sources, I use a math-free Bayesian approach - start with your best external baseline, then systematically update it with internal evidence and expert judgment. Like checking traffic before heading to the airport, but structured for risk data.</p><p>This foundation work enables everything else - scenarios, simulations, and actual business decisions. Getting the data piece right makes the rest straightforward.</p><div><hr></div><h1><strong>&#129504; Why Every Risk Analyst Should Think Like a Bayesian</strong></h1><p>Speaking of Bayesian thinking&#8230; let me share a tool that's transformed how I approach risk analysis, and I believe it can do the same for you. It&#8217;s more than a tool, though; it&#8217;s a way of thinking.</p><p>You don't need to be a statistics wizard to benefit from Bayesian thinking. Yes, there are sophisticated mathematical applications that belong in any serious risk analysis toolkit, but today I want to focus on Bayesian reasoning as a <strong>mental model</strong>. This shift in mindset can revolutionize how you frame risk analyses, keep projects focused, and avoid the dreaded "boiling the ocean" syndrome.</p><p>More importantly, if you embrace this thinking early, you'll sidestep the common CRQ myths that paralyze many analysts:</p><ul><li><p>Believing you need to collect ALL the data before starting</p></li><li><p>Thinking a risk analysis is invalid without perfect information</p></li><li><p>Getting stuck in analysis paralysis</p></li></ul><p>Bayesian thinking also acts as a natural defense against cognitive biases we all carry: overconfidence, anchoring, and the IKEA effect (overvaluing something because we built it ourselves).</p><h2>Bayesian Thinking as a Mental Model</h2><p><strong>Prior</strong>: Your initial belief or estimate, based on current knowledge, experience, or data.</p><p><strong>Evidence</strong>: New information, observations, or data relevant to the belief.</p><p><strong>Posterior</strong>: Your updated belief after factoring in the new evidence. It becomes the new prior for next time.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5Oph!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c3fc582-e607-4376-932c-cc1f1834eeca_1600x1497.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5Oph!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c3fc582-e607-4376-932c-cc1f1834eeca_1600x1497.png 424w, https://substackcdn.com/image/fetch/$s_!5Oph!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c3fc582-e607-4376-932c-cc1f1834eeca_1600x1497.png 848w, https://substackcdn.com/image/fetch/$s_!5Oph!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c3fc582-e607-4376-932c-cc1f1834eeca_1600x1497.png 1272w, https://substackcdn.com/image/fetch/$s_!5Oph!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c3fc582-e607-4376-932c-cc1f1834eeca_1600x1497.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5Oph!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c3fc582-e607-4376-932c-cc1f1834eeca_1600x1497.png" width="426" height="398.49725274725273" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7c3fc582-e607-4376-932c-cc1f1834eeca_1600x1497.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1362,&quot;width&quot;:1456,&quot;resizeWidth&quot;:426,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5Oph!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c3fc582-e607-4376-932c-cc1f1834eeca_1600x1497.png 424w, https://substackcdn.com/image/fetch/$s_!5Oph!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c3fc582-e607-4376-932c-cc1f1834eeca_1600x1497.png 848w, https://substackcdn.com/image/fetch/$s_!5Oph!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c3fc582-e607-4376-932c-cc1f1834eeca_1600x1497.png 1272w, https://substackcdn.com/image/fetch/$s_!5Oph!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c3fc582-e607-4376-932c-cc1f1834eeca_1600x1497.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>The Process</strong>:</h3><ol><li><p><strong>Start with a belief</strong>: based on what you already know (your prior).</p></li><li><p><strong>Gather evidence</strong>: actively look for new data or observations.</p></li><li><p><strong>Update your belief</strong>: revise your estimate in light of the evidence.</p></li><li><p><strong>Repeat</strong> : treat your updated belief as the new starting point for the next cycle.</p></li></ol><p>The beauty is in the cycle: today's posterior becomes tomorrow's prior. You're always learning, always updating, never claiming to have the final answer.</p><h2><strong>A Real-World Example</strong></h2><p>Let's say you're assessing the risk of a data breach at your company.</p><p><strong>Your Prior</strong>: Based on industry reports, you estimate a 15% chance of a significant breach in the next year.</p><p><strong>New Evidence</strong>: Your security team reports they've detected 3x more phishing attempts this quarter, and a recent vulnerability scan found several unpatched systems.</p><p><strong>Your Posterior</strong>: This evidence suggests higher risk. You update to around 25% chance of a breach.</p><p><strong>Next Cycle</strong>: A month later, phishing training shows dramatic improvement in employee click rates, and all critical patches are applied. Your posterior (25%) becomes your new prior, and with this positive evidence, you adjust down to around 18%.</p><p>Notice what happened? You started with imperfect information, made decisions, gathered more data, and refined your thinking. You never stopped to collect "all possible data." You started with what you had and improved from there.</p><p>This is exactly how effective risk analysis works in the real world.</p><p><strong>The key insight</strong>: Without this mindset, beginners often try to "get it perfect" before they start and never actually do a risk analysis. Bayesian thinking gives you permission to start with what you have and get better over time. You're not ignoring uncertainty, you're structuring it. That's what makes it so powerful for real-world risk.</p><div><hr></div><h1><strong>&#128202; Using IRIS 2025 Data as Your Risk Analysis Starting Point</strong></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bJWT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad276717-2024-4fc8-957a-3f284b677aa7_1768x1920.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bJWT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad276717-2024-4fc8-957a-3f284b677aa7_1768x1920.webp 424w, https://substackcdn.com/image/fetch/$s_!bJWT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad276717-2024-4fc8-957a-3f284b677aa7_1768x1920.webp 848w, https://substackcdn.com/image/fetch/$s_!bJWT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad276717-2024-4fc8-957a-3f284b677aa7_1768x1920.webp 1272w, https://substackcdn.com/image/fetch/$s_!bJWT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad276717-2024-4fc8-957a-3f284b677aa7_1768x1920.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bJWT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad276717-2024-4fc8-957a-3f284b677aa7_1768x1920.webp" width="320" height="347.4725274725275" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ad276717-2024-4fc8-957a-3f284b677aa7_1768x1920.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1581,&quot;width&quot;:1456,&quot;resizeWidth&quot;:320,&quot;bytes&quot;:1395034,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heatmapstohistograms.substack.com/i/167136162?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad276717-2024-4fc8-957a-3f284b677aa7_1768x1920.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bJWT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad276717-2024-4fc8-957a-3f284b677aa7_1768x1920.webp 424w, https://substackcdn.com/image/fetch/$s_!bJWT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad276717-2024-4fc8-957a-3f284b677aa7_1768x1920.webp 848w, https://substackcdn.com/image/fetch/$s_!bJWT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad276717-2024-4fc8-957a-3f284b677aa7_1768x1920.webp 1272w, https://substackcdn.com/image/fetch/$s_!bJWT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fad276717-2024-4fc8-957a-3f284b677aa7_1768x1920.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Now that you&#8217;re thinking like a Bayesian, it&#8217;s time to put that mindset to work. The <a href="https://www.cyentia.com/iris/">Cyentia Institute&#8217;s IRIS 2025 report</a>&nbsp;is one of the best starting points we have for establishing base rates, those initial priors that anchor a quantitative risk analysis before we ever touch a scenario or a simulation.</p><p>Instead of beginning with a guess, or a color on a heat map, you can start with probabilities grounded in what has happened to organizations like yours. This is where Bayesian thinking stops being abstract and starts being practical. You&#8217;re not trying to be perfect. You&#8217;re trying to be honest about what you know, and then improve from there.</p><p>One important caveat up front. IRIS focuses on significant cyber incidents that make their way into the public record. That means it should be treated as a lower-bound prior, not a complete census of all incidents. Over time, these priors should be updated with your internal incident data and structured expert judgment. That&#8217;s not a limitation of the method. That&#8217;s the method working as intended.</p><p>Below are four practical ways you can start using IRIS 2025 right now.</p><h2><strong>Four Ways to Use IRIS 2025 Right Now</strong></h2><h3><strong>Use Case 1: Establish Your Organization&#8217;s Base Rate</strong></h3><p>Let&#8217;s start by estimating a <strong>base rate</strong> for a hypothetical healthcare organization with $800 million in annual revenue. This base rate represents the annual probability that the organization experiences at least one significant security incident, meaning an event that would reasonably be expected to require public disclosure.</p><ul><li><p>First, find your revenue tier. In IRIS 2025, turn to Page 12, Figure 7.</p></li><li><p>Next, locate the appropriate category. For our example organization, that&#8217;s the &#8220;$100M to $1B&#8221; revenue band.</p></li><li><p>Now read the chart. Follow the line for this revenue tier to the rightmost point, which corresponds to 2024.</p></li></ul><p>Based on a visual reading of the chart, organizations in the $100M to $1B revenue range appear to face roughly an 8-9% annual probability of a significant, publicly disclosed cyber incident.</p><p>That range becomes your Bayesian prior for modeling significant cyber incidents. It&#8217;s not a final answer, and it&#8217;s not a claim of precision. It&#8217;s a reasonable starting point.</p><blockquote><p>&#9888;&#65039; These probabilities reflect publicly disclosed events, not all security incidents. I strongly recommend working with ranges rather than single point estimates to account for both reading uncertainty and real-world variability.</p></blockquote><h5><strong>&#128269; GenAI Prompt:</strong></h5><blockquote><p><em>[upload the PDF into the prompt]</em></p><p>See the attached IRIS 2025 report, Page 12, Figure 7. Help me extract the incident probability range for an organization with $800M in annual revenue. Walk me through how to read the chart and provide a reasonable range rather than a precise percentage. These probabilities are for significant cyber incidents requiring disclosure.</p></blockquote><h3><strong>Use Case 2: Build Sector-Specific Frequency Models</strong></h3><p>Now let&#8217;s tailor that base rate to your industry. We&#8217;ll stay with the same example, a healthcare organization with about $800M in annual revenue.</p><p>Before we do the math, a quick note on what we&#8217;re doing conceptually. IRIS gives us two useful ingredients: an overall base rate by revenue tier, and a sector-relative likelihood factor. IRIS does not spell out a single &#8220;official&#8221; way to combine those two, so what follows is a practical heuristic for building a firm-specific prior. It&#8217;s simple, transparent, and easy to update later when you bring in internal data.</p><p>Here&#8217;s what we&#8217;ll use from IRIS 2025.</p><p>First, the base annual incident probability by revenue tier from Figure 7 on page 12. This is our starting point for estimating the likelihood of at least one significant incident entering the public record.</p><p>Second, the sector relative probability factor from Appendix 3, Figure A1 on page 34. For Healthcare, the factor is 1.34x. Think of it as &#8220;more or less likely than the median sector,&#8221; not a magic conversion that makes the data perfect.</p><h4><strong>Step-by-Step Exercise</strong></h4><p><strong>Start with your base rate.</strong> From Figure 7 (p. 12), organizations in the $100M to $1B revenue range appear to have roughly an 8 to 9 percent annual probability of a significant, publicly reported incident.</p><p><strong>Find your sector factor.</strong> In Appendix 3, Figure A1 (p. 34), Healthcare&#8217;s relative probability factor is 1.34x.</p><p><strong>Apply the factor to your range.</strong></p><p><strong>Lower bound:</strong> 8% &#215; 1.34 &#8776; 10.7%<br><strong>Upper bound:</strong> 9% &#215; 1.34 &#8776; 12.1%</p><p>So for a healthcare organization with roughly $800M in annual revenue, a reasonable firm-specific prior for a significant, publicly reported incident is about 11 to 12 percent per year, using this simple heuristic.</p><p><strong>One last bit of humility, because it matters.</strong> If you compare this derived prior to the healthcare time series elsewhere in IRIS, you may see differences. That&#8217;s not a contradiction. It&#8217;s a reminder that we&#8217;re combining two different lenses on the data. In practice, you treat this as a starting point, then update it with what you know about your organization.</p><h5><strong>&#128269; GenAI Prompt:</strong></h5><blockquote><p>Using IRIS 2025, help me calculate a sector-adjusted incident probability range. My organization is in the Healthcare sector with $800M annual revenue.</p><ul><li><p>From Figure 7 on p. 12, extract the base annual incident probability range for organizations with $100M&#8211;$1B in revenue.</p></li><li><p>From Appendix 3, Figure A1 on p. 34, find Healthcare&#8217;s sector relative probability factor (1.34x).</p></li><li><p>Apply that factor to both ends of the base probability range, show each calculation step, and clarify these probabilities are for significant cyber incidents that enter the public record.</p></li></ul></blockquote><h3><strong>Use Case 3: Sector and Revenue Loss Benchmarks</strong></h3><p>Now let&#8217;s talk about impact. Frequency tells you how often you might get hit. Loss magnitude tells you what it looks like when you do.</p><p>This is also where it&#8217;s easy to accidentally overclaim what the data can do. IRIS gives us two useful, but different, views of loss magnitude.</p><p>One is organized by <strong>revenue tier</strong> (Table 1 on page 16). The other is organized by <strong>sector</strong> (Appendix 3, Figure A3 on page 35). IRIS does not provide sector &#8220;loss multipliers,&#8221; and it does not prescribe a single way to combine the two into a perfectly sector-and-revenue-conditioned loss estimate. So in this issue, we&#8217;re going to keep it honest and use the sector loss statistics directly as our starting point, then refine later with internal data.</p><p>Here&#8217;s how to do it.</p><h4>Step-by-Step Exercise</h4><p>Start with revenue-tier loss benchmarks (Table 1, p. 16). For organizations with $100M to $1B in annual revenue, IRIS reports:</p><ul><li><p>Median (50th percentile): <strong>$466.7K</strong></p></li><li><p>High-end (95th percentile): <strong>$12.3M</strong></p></li></ul><p>These numbers are useful because they keep you anchored to firm size, but they&#8217;re not sector-specific.</p><p>Now pull sector loss benchmarks (Appendix 3, Figure A3, p. 35). For <strong>Healthcare</strong>, IRIS reports sector-level loss statistics for significant, publicly reported incidents. Use those values as your sector prior for impact.</p><p>Your Result: For a healthcare organization, a reasonable starting point for loss magnitude is:</p><ul><li><p>Typical loss (median):<strong> approximately $557K</strong></p></li><li><p>Extreme loss (95th percentile): <strong>approximately $14M</strong></p></li></ul><p>A quick but important label. These sector figures are benchmarks at the sector level. They&#8217;re not conditioned on revenue tier. That&#8217;s fine for a starting point, and in practice it&#8217;s often what you want early on, because it is easier to defend and easier to update. If you have internal incident cost data, or a strong reason to believe your organization is systematically above or below the sector, this is exactly where Bayesian updating earns its keep.</p><h5><strong>&#128269; GenAI Prompt:</strong></h5><blockquote><p>Using the IRIS 2025 report, help me extract defensible loss magnitude benchmarks for significant cyber incidents for a Healthcare organization.</p><ol><li><p>From Table 1 on p. 16, extract the median (50th percentile) and high-end (95th percentile) loss values for organizations in the $100M&#8211;$1B revenue range.</p></li><li><p>From Appendix 3, Figure A3 on p. 35, extract the Healthcare sector median and 95th percentile loss values.</p></li></ol><p>Explain the difference between revenue-tier and sector benchmarks, and clarify that IRIS reports on significant incidents that enter the public record. Use ranges or &#8220;approximately&#8221; language rather than implying precision.</p></blockquote><h3><strong>Use Case 4: Factor in Sector Risk Trajectory</strong></h3><p>So far, we&#8217;ve treated risk as a snapshot. A base rate. A set of priors. That&#8217;s necessary, but it&#8217;s not sufficient. Risk is not static, and one of the most useful questions you can ask is whether your sector&#8217;s risk profile is trending upward, stabilizing, or starting to bend downward.</p><p>IRIS 2025 gives us a way to look at that over time.</p><h4>Step-by-Step Exercise</h4><p>To understand sector trajectory, turn to Page 13, Figure 8 in the IRIS 2025 report and focus on the Healthcare panel.</p><p>This chart shows the estimated annual probability of a significant, publicly reported cyber incident over time for healthcare organizations. The exact values are not tabulated, so what follows is based on visual interpretation of the plotted trend rather than precise point estimates.</p><p>Over the long term, the direction is clear. Healthcare incident probability rises steadily from the late 2000s through the early 2020s, moving from low single-digit percentages to roughly nine percent by the early part of this decade.</p><p>In the most recent years shown, however, the pattern changes. From about 2022 through 2024, the healthcare curve flattens and shows signs of stabilization rather than continued acceleration. The most recent value shown is approximately 9.1 percent in 2024.</p><h4>How to Interpret This</h4><p>There are two signals here, and both matter.</p><p>The long-term signal tells you that healthcare cyber risk increased substantially over the last fifteen years. That context helps explain why today&#8217;s base rates are meaningfully higher than they were a decade ago.</p><p>The short-term signal is more cautious. Recent years suggest a plateau, or at least a pause in growth. That does not mean risk is going away, and it certainly doesn&#8217;t mean it can&#8217;t rise again. It does mean you should be careful about assuming continued straight-line growth into the future.</p><h4>Practical Takeaway</h4><p>For forward-looking planning, treat healthcare risk as elevated relative to the past, but not necessarily accelerating year over year. This is a reminder to revisit your priors regularly. IRIS is published on a multi-year cadence, and sector trajectories can and do change.</p><p>Bayesian thinking fits naturally here. Today&#8217;s posterior becomes tomorrow&#8217;s prior. When new data arrives, you update. You don&#8217;t lock in assumptions simply because they once felt directionally true.</p><h5><strong>&#128269; GenAI Prompt:</strong></h5><blockquote><p>Using IRIS 2025 Page 13, Figure 8, help me analyze the risk trajectory for healthcare organizations from 2008&#8211;2024. I need to determine whether the trend is rising, falling, or stabilizing and estimate the long-term rate of change as well as the short-term directional signal. Use this to inform 2025+ planning assumptions.</p></blockquote><h3><strong>Final Output: Your Sector Risk Profile</strong></h3><p>At this point, you&#8217;ve built a defensible, research-backed starting profile for a healthcare organization with approximately $800 million in annual revenue. Nothing here is exotic. Nothing requires perfect data. It&#8217;s simply a structured way to turn published research into something you can actually use.</p><p>Here&#8217;s what that profile looks like.</p><p><strong>Incident frequency</strong></p><p>Based on IRIS 2025 Figure 7, organizations in the $100M to $1B revenue range appear to face roughly an 8 to 9 percent annual probability of experiencing at least one significant cyber incident that enters the public record.</p><p>Applying IRIS&#8217;s sector-relative probability factor for Healthcare as a practical heuristic, a reasonable firm-specific prior is approximately <strong>11 to 12 percent per year</strong>. This is not an official IRIS statistic. It&#8217;s a transparent, derived starting point that can and should be updated with internal data and expert judgment.</p><h4><strong>Loss magnitude</strong></h4><p>For loss magnitude, IRIS provides sector-level benchmarks that are well suited for early modeling.</p><p>According to IRIS 2025 Appendix 3, Figure A3, Healthcare organizations show:</p><ul><li><p>A <strong>median (typical) loss</strong> of approximately <strong>$557K</strong></p></li><li><p>A <strong>95th percentile (extreme) loss</strong> of approximately <strong>$14M</strong></p></li></ul><p>These figures reflect significant, publicly reported incidents at the sector level. They are not conditioned on revenue tier, and that&#8217;s intentional here. As a starting point, sector benchmarks are easier to explain, easier to defend, and easier to update once you incorporate your own incident cost data.</p><h4>Risk trajectory</h4><p>Looking at IRIS 2025 Figure 8, Healthcare risk increased substantially over the long term, rising from low single-digit probabilities in the late 2000s to roughly nine percent by the early 2020s.</p><p>In more recent years, the trend appears to flatten. The most recent estimate shown is approximately <strong>9.1 percent in 2024</strong>, suggesting stabilization rather than continued acceleration. That doesn&#8217;t mean risk is declining, but it does mean you should be cautious about assuming straight-line growth into the future.</p><h3>What This Means for You</h3><p>Taken together, this gives you a usable, defensible risk profile:</p><ul><li><p><strong>Frequency</strong>: roughly an 11 to 12 percent annual probability of a significant, publicly reportable cyber incident</p></li><li><p><strong>Impact</strong>: typical losses around $500K, with extreme but plausible losses on the order of $10M to $15M</p></li><li><p><strong>Trajectory</strong>: elevated relative to the past, but not clearly accelerating year over year</p></li></ul><p>More importantly, you now have inputs that support real decisions.</p><p>You can test whether proposed security investments meaningfully reduce expected loss. You can evaluate insurance retention levels against tail risk instead of gut feel. You can explain to executives not just that cyber risk exists, but how often it shows up, how bad it tends to be, and how that compares to what the business is willing to tolerate.</p><p>These are not final answers. They are informed starting points.</p><p>And that&#8217;s the whole point of Bayesian thinking. You don&#8217;t wait for perfect information. You start with what you can defend, then you update as you learn more about your own environment, your own controls, and your own incidents.</p><h2><strong>&#128161;The Bayesian Unlock</strong></h2><p>Notice what's happening here: You're not using IRIS data as the end goal; something you skim once and never open again. You're using it as your <strong>informed starting point</strong>, then systematically updating with organization-specific evidence.</p><p>This prevents the classic risk analysis traps:</p><ul><li><p>Starting with gut feelings instead of data</p></li><li><p>Ignoring industry baselines</p></li><li><p>Treating your organization as completely unique</p></li><li><p>Getting paralyzed by the need for "perfect" data</p></li></ul><p>Your risk analysis becomes a conversation between industry research and organizational reality - exactly what Bayesian thinking is designed to handle.</p><h2><strong>&#127968; Homework: Put This Into Practice</strong></h2><p><strong>Your Assignment:</strong> Download <a href="https://www.cyentia.com/iris/">IRIS 2025 </a>and build your organization's risk priors using the GenAI prompts above.</p><ol><li><p><strong>Use the four exercises</strong> to calculate your organization's base rates</p></li><li><p><strong>Try all four GenAI prompts</strong> - see how they help extract and organize the data</p></li><li><p><strong>Document your priors</strong> - you'll need them as your Bayesian starting point</p></li><li><p><strong>Compare your current risk assessments</strong>&nbsp;with research-backed priors - how do they differ from your existing estimates?</p></li></ol><p><strong>Bonus Challenge:</strong> Take your calculated ranges and ask yourself: "What organizational-specific evidence could move me up or down within these ranges?" This is exactly how Bayesian updating should work.</p><p><strong>Remember:</strong> These aren't your final risk assessments - they're your informed starting points. The real power comes when you start updating these priors with your organization's specific threat intelligence, control effectiveness, and incident history.</p><div><hr></div><h2><strong>&#128215; Book Excerpt: My Experiment with a Prediction Market</strong></h2><p>One of the cooler experiences in my career happened when I worked with <a href="https://www.linkedin.com/in/richardseiersen/">Richard Seiersen</a>, co-author of <em>How to Measure Anything in Cybersecurity Risk</em> and author of <em>The Metrics Manifesto</em>. Together, we set up a functioning prediction market at a large financial services company in San Francisco.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JoPU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3130db8-5932-4991-a4db-c0c1b2d6778d_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JoPU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3130db8-5932-4991-a4db-c0c1b2d6778d_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!JoPU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3130db8-5932-4991-a4db-c0c1b2d6778d_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!JoPU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3130db8-5932-4991-a4db-c0c1b2d6778d_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!JoPU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3130db8-5932-4991-a4db-c0c1b2d6778d_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JoPU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3130db8-5932-4991-a4db-c0c1b2d6778d_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c3130db8-5932-4991-a4db-c0c1b2d6778d_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2797621,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://heatmapstohistograms.substack.com/i/167136162?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3130db8-5932-4991-a4db-c0c1b2d6778d_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!JoPU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3130db8-5932-4991-a4db-c0c1b2d6778d_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!JoPU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3130db8-5932-4991-a4db-c0c1b2d6778d_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!JoPU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3130db8-5932-4991-a4db-c0c1b2d6778d_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!JoPU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3130db8-5932-4991-a4db-c0c1b2d6778d_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>The Setup</strong></h2><p>We created an open-to-the-public event that was part Shark Tank, part American Idol: cybersecurity startups pitched to a panel of CISO judges in our arena-style auditorium. But here's where it got interesting: we set up a prediction market so attendees could "trade" on which startup they thought would win at the end of the night.</p><p>A prediction market is essentially a crowdsourced forecasting tool where participants buy and sell contracts based on event outcomes. The trading price reflects the collective probability that participants assign to each outcome. Think of it as real-time betting on future events; the more demand for a particular outcome, the higher its implied probability.</p><p>To make it more engaging and test the concept, we added other prediction questions: Will it rain tomorrow? Who will win the Giants game? What's the probability of a major data breach in healthcare this quarter?</p><h2><strong>The Key: Proper Incentives</strong></h2><p>Prediction markets work best when participants have skin in the game: something to gain or lose. We offered prizes and leaderboard clout to the best forecasters, which incentivized people to use their genuine knowledge and research rather than just guessing randomly.</p><h2><strong>The Results</strong></h2><p>The accuracy was remarkable. The market consistently predicted not just the startup pitch winners (judged at the end of the evening), but also sports games, weather patterns, traffic conditions, and short-term cyber events that we could verify within a month.</p><p>When we talked to the most accurate forecasters, I found something interesting: many were fantasy football players, poker enthusiasts, or people with backgrounds in meteorology, statistics, or microeconomics. What they had in common was probabilistic thinking: the ability to reason about uncertainty and update beliefs based on new information.</p><h2><strong>Why This Matters for CRQ</strong></h2><p>I've often thought about extending this to regular cybersecurity use cases. Imagine a public prediction market where the entire cybersecurity community collectively forecasts cyber events. Done right, this could provide base rates (or better) for our quantitative risk assessments.</p><p>The challenge? Confidentiality. Most companies can't share the detailed information needed to make such markets work effectively. It becomes a tragedy of the commons; everyone wants to use the data, but few can contribute without violating privacy or competitive concerns.</p><p>Still, the concept shows the power of structured, incentivized expert judgment. Even if we can't build industry-wide prediction markets, we can apply the same principles in our SME workshops: create the right incentives, structure the process, and tap into the collective wisdom of people who think probabilistically.</p><p><strong>Want to Try It?</strong> Check out <a href="https://www.gjopen.com/">Good Judgment Open</a>, a publicly accessible prediction market where you can practice forecasting on everything from politics to technology trends.</p><div><hr></div><h1><strong>&#128218; What I'm Reading</strong></h1><p>Each issue, I'll share a few blog posts, research articles, or tools worth your time. Here are three standouts I've been diving into:</p><p><strong><a href="https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2024/volume-9/the-role-of-the-risk-sin-eater">The Role of the Risk Sin Eater</a> by <a href="https://riskdr.com/author/riskdr/">Jack Freund</a>: </strong>This one is a little older, but I still share it often with friends and coworkers. Jack is one of my favorite writers on risk, and in this piece he draws a sharp parallel between modern cyber risk approval practices and the centuries-old tradition of sin eaters, figures in rural Europe who symbolically absorbed the sins of the dead, urging us to abandon this outdated folklore and let business leaders own their risks.</p><p><strong><a href="https://grcengineer.com/">The GRC Engineer Newsletter</a> by Ayoub Fandi</strong>: I really enjoy the GRC Engineer newsletter by Ayoub Fandi, and <a href="https://grcengineer.com/p/designing-controls-where-compliance-is-an-afterthought-13a6b11603eaab2f">this issue </a>is one of my favorites. It offers a clear, practical framework for designing security-first controls that reduce real business risk, rather than just satisfying compliance requirements, and shows how this approach can make compliance easier and more meaningful.</p><p><strong><a href="https://www.fairinstitute.org/blog/financial-discipline-cyber-risk-decisions-practitioners-guide">Bringing Financial Discipline to Cyber-Risk Decisions </a>by Laura Voicu: </strong>This is one of the most practical and accessible deep dives into aligning cyber risk decisions with financial rigor. Laura walks through a ransomware scenario using FAIR, NPV, IRR, and the Gordon-Loeb model to show how to move beyond ROSI and make smarter, defensible investments in security. If you're trying to speak the language of finance while making risk-informed decisions, this is a must-read.</p><p>Got recommendations? Send them my way, and I'll feature reader picks too.</p><div><hr></div><h1><strong>&#128450; From the Archives</strong></h1><p>Here are a few blog posts of mine you might enjoy:</p><p><a href="https://www.tonym-v.com/blog/2025/6/18/that-feels-too-high-a-risk-analysts-survival-guide">&#8220;That Feels Too High&#8221;: A Risk Analyst's Survival Guide</a>: This post explores why risk estimates often get challenged with comments like &#8220;that feels too high,&#8221; despite being backed by solid analysis. It outlines three common reasons for pushback: missing information, cognitive bias, and communication gaps, and offers a practical framework to diagnose and respond constructively, turning discomfort into a valuable part of the decision-making process.</p><p><a href="https://www.tonym-v.com/blog/2021/5/9/using-risk-assessment-to-support-decision-making">Using Risk Assessment to Support Decision Making</a>: This post reframes risk assessments as tools that support decision-making, emphasizing that without a clear decision to inform, defined by choice, preference, and information, a risk assessment often falls short. It offers a practical framework to help analysts focus their efforts, using real-world examples to show how clarifying the underlying decision can make assessments more useful and aligned with business goals.</p><h1><strong>&#128587; Questions</strong></h1><p><strong>So far in the industry, I've realized that companies still have the appetite to do cyber risk quantification (monetary terms) for a one-off event like a ransomware or a data breach. However, doing it for each and every cyber risk in their register seems difficult.</strong></p><p><strong>For example, I worked with an organization that had almost 1500 risks in their cyber risk register and they did it using qualitative analysis. How do you propose an org can use quantitative analysis for a big number like 1500 risks?<br>- From Varun W.</strong></p><p>Great question! You've hit on one of the biggest practical barriers to adopting decision-based risk. The answer isn't to quantify all 1500 risks - it's to fundamentally rethink what belongs in a "risk register."</p><p><strong>The problem:</strong> That 1500-item list likely contains a mix of vulnerabilities, controls, scenarios, and compliance items that aren't actually decision-relevant risks. Most organizations treat their risk register like a comprehensive inventory rather than a decision-support tool.</p><p><strong>The solution:</strong> Start with portfolio thinking, not individual risk scoring:</p><ol><li><p><strong>Aggregate first</strong> - Group those 1500 items into major loss scenarios (ransomware, data breach, system outage, etc.). You probably have 8-12 actual business-impacting scenarios.</p></li><li><p><strong>Quantify the scenarios that matter</strong> - Focus on the loss events that could actually influence executive decisions about budget allocation, insurance, or strategic direction.</p></li><li><p><strong>Use the 80/20 rule</strong> - A small number of scenarios likely drive most of your actual risk exposure. Quantify those first.</p></li></ol><p>The mindset shift is moving from "we have 1500 risks to manage" to "we have $X million in annual loss exposure across Y major scenarios - where should we invest to reduce it?"</p><p>Most of those 1500 items are probably controls or vulnerabilities that feed into the major scenarios, not separate risks requiring individual quantification.</p><p>What decision was that 1500-item register actually helping executives make?</p><div><hr></div><h1><strong>&#9993;&#65039; Contact</strong></h1><p>Have a question about risk analysis or have a general inquiry? Here&#8217;s how to contact me:</p><p><strong>Reach me at:</strong></p><ul><li><p>Reply to this newsletter, if you receive via email</p></li><li><p>Comment below</p></li><li><p>Connect on <a href="https://www.linkedin.com/in/tonymartinvegue/">LinkedIn</a></p></li><li><p><a href="https://www.tonym-v.com/contact">Contact form</a></p></li></ul><p>What specific risk analysis challenges are you facing? Hit reply and let me know - your question might become the focus of a future deep dive.</p><div><hr></div><h1><strong>&#10084;&#65039; How You Can Help</strong></h1><p>&#9989; Tell me what topics you want covered: beginner, advanced, tools, AI use, anything<br>&#9989; Forward this to a colleague who's curious about CRQ<br>&#9989; Click the &#10084;&#65039; or comment if you found this useful</p><p>If someone forwarded this to you, please subscribe to get future issues.</p><p>- Tony</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Issue 0: I Signed a Book Deal! 🎉 Field Notes Begins]]></title><description><![CDATA[Real-world CRQ, GenAI tips, and better risk decisions - one practical dispatch at a time.]]></description><link>https://newsletter.heatmapstohistograms.com/p/issue-0-i-signed-a-book-deal-field</link><guid isPermaLink="false">https://newsletter.heatmapstohistograms.com/p/issue-0-i-signed-a-book-deal-field</guid><dc:creator><![CDATA[Tony Martin-Vegue]]></dc:creator><pubDate>Fri, 13 Jun 2025 00:12:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8287b0a-aa75-4f74-95cd-4cb79eae7d5c_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hey there,</p><p>Thanks for being one of the very first subscribers. I'm really glad you're here.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading From Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>&#9993;&#65039; Why Issue 0?</h1><p>This is a special celebration edition: part book deal announcement, part welcome note, and part "let's get you started on your first CRQ assessment right now."</p><p><strong>From Heatmaps to Histograms: Field Notes</strong> officially kicks off in July 2025, with monthly issues featuring CRQ tactics, prompts, tools, and deep dives. Consider this your early-access sneak peek. Thanks for being here from the start.</p><div><hr></div><h1>&#127881; HUGE NEWS: I Signed a Book Deal!</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_3DQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8287b0a-aa75-4f74-95cd-4cb79eae7d5c_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_3DQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8287b0a-aa75-4f74-95cd-4cb79eae7d5c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!_3DQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8287b0a-aa75-4f74-95cd-4cb79eae7d5c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!_3DQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8287b0a-aa75-4f74-95cd-4cb79eae7d5c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!_3DQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8287b0a-aa75-4f74-95cd-4cb79eae7d5c_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_3DQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8287b0a-aa75-4f74-95cd-4cb79eae7d5c_1024x1024.png" width="444" height="444" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f8287b0a-aa75-4f74-95cd-4cb79eae7d5c_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:444,&quot;bytes&quot;:2427732,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://heatmapstohistograms.substack.com/i/165515463?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8287b0a-aa75-4f74-95cd-4cb79eae7d5c_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_3DQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8287b0a-aa75-4f74-95cd-4cb79eae7d5c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!_3DQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8287b0a-aa75-4f74-95cd-4cb79eae7d5c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!_3DQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8287b0a-aa75-4f74-95cd-4cb79eae7d5c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!_3DQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8287b0a-aa75-4f74-95cd-4cb79eae7d5c_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I'm absolutely thrilled to share that I've officially signed with <strong><a href="https://www.apress.com/gp">Apress</a></strong> to publish my first book! After years of writing, testing, and refining these ideas in the field, <strong>From Heatmaps to Histograms: A Practical Guide to Cyber Risk Quantification</strong> will hit shelves in early 2026 in both print and ebook formats, wherever books are sold.</p><p>This feels surreal and I'm incredibly excited to get this knowledge into your hands. Here's the book description:</p><blockquote><p>Cyber risk quantification (CRQ) is the practice of measuring cybersecurity risk using numbers &#8212;not colors or guesswork. Instead of labeling risks &#8220;high,&#8221; &#8220;medium,&#8221; or &#8220;low,&#8221; CRQ uses probabilities, ranges, and impact estimates to help organizations make better, data-informed decisions about risk.</p><p>In a world where ransomware gangs operate like small businesses, every core function of an organization is digital, and Boards and regulators are demanding meaningful, defensible risk metrics, CRQ has never been more relevant than now. And thanks to AI, it&#8217;s about to scale fast.</p><p>At the same time, CRQ is often misunderstood as expensive, technical, or just &#8220;voodoo math.&#8221; People assume you need a stats degree, six-figure software, or a room full of analysts. This book is here to prove otherwise.</p><p><em>From Heatmaps to Histograms: A Practical Guide to Cyber Risk Quantification</em> is a hands-on, plain-English guide written by a seasoned practitioner who&#8217;s built CRQ programs at top global companies. It&#8217;s packed with step-by-step instructions, practical tips, templates, shortcuts, AI prompts, and plenty of myth-busting to take you from CRQ skeptic to CRQ champion&#8212;even if you&#8217;ve never cracked open a statistics book.</p><p>All techniques in this book can be performed in Excel or Google Sheets&#8212;no coding required. But for readers who want to go further, you&#8217;ll find dozens of GenAI prompts that help you generate risk scenarios, clean messy data, or even &#8220;vibe-code&#8221; your way through a Monte Carlo simulation in Python or R. You'll also get guidance on when to <em>not</em> use AI, how to spot hallucinations, and how to integrate it responsibly into your risk practice.</p><p>CRQ is no longer optional. This is your roadmap for making it work&#8212;cheaply, ethically, and effectively.</p></blockquote><div><hr></div><h1><strong>&#127919; Your First CRQ Assessment: Start Here</strong></h1><p><strong>The key insight:</strong> Your first CRQ assessment should analyze a risk that informs a concrete business decision that's already on the table. Don't pick a random "hot risk" and hope it becomes relevant later.</p><p>Ask: <strong>"What decision do we need to make where risk is genuinely a factor?"</strong></p><p>Look for upcoming decisions like:</p><ul><li><p>"Should we buy cyber insurance this year?"</p></li><li><p>"Is this $200K security tool worth it?"</p></li><li><p>"Is it safer to move this system to the cloud?"</p></li></ul><p><strong>Why this works:</strong> You get built-in stakeholders who already care about the outcome, clear success metrics, and immediate relevance.</p><h2>Pick the Right Risk to Quantify</h2><p>Once you've identified that business decision, your next step is choosing which risk to analyze that would most influence that choice.</p><p><strong>Start with what's already keeping people up at night.</strong> Your assessment should tackle something leaders are already discussing:</p><ul><li><p>"How bad could a ransomware attack really get?"</p></li><li><p>"What if we get hit with a data breach like [recent headline]?"</p></li><li><p>"What's our realistic exposure if this vendor gets compromised?"</p></li></ul><p>Pick a topic that's already on someone's mind, and you'll get faster traction and better engagement.</p><p><strong>Keep it simple and contained.</strong> Don't pick abstract risks like "third-party risk" or scenarios with endless branches. Good starter risks have clear loss paths:</p><h3>High-Impact, Manageable Scenarios</h3><ul><li><p><strong>Ransomware attacks</strong> - Plenty of public data on frequency, ransom amounts, recovery costs</p></li><li><p><strong>Business email compromise</strong> - Clear financial impact, documented rates by industry</p></li><li><p><strong>Data breaches</strong> - Well-researched cost data available (Verizon DBIR, Cyentia IRIS 2025)</p></li></ul><h2>Gather Your Data</h2><p><strong>Ask "Where can I get numbers?"</strong> You don't need perfect data, but pick something you can estimate:</p><ul><li><p>Has this happened to companies like yours?</p></li><li><p>Can you find public research or get SME opinions?</p></li><li><p>Can you describe the loss in 4-5 clear steps?</p></li></ul><p>The goal isn't precision; it's building a reasonable model that informs your decision.</p><h2>Report Risk that Supports the Decision</h2><p>Your analysis should directly feed into the business choice you identified at the start. The best CRQ assessments answer specific questions:</p><ul><li><p>Will this help leadership say yes or no to a specific investment?</p></li><li><p>Could it inform budget, policy, or insurance decisions?</p></li><li><p>Does it feed into an upcoming board presentation or audit?</p></li></ul><p><strong>Remember:</strong> CRQ works best when it supports actual business choices, not when it sits in a report that nobody reads.</p><h2>&#129302; Need help brainstorming? Try these GenAI prompts:<br></h2><p><strong>For finding business decisions:</strong></p><pre><code><code>I work in [role] at a [company size/industry] organization. Based on typical corporate calendars and security priorities, what are 5 major business decisions coming up in the next 6-12 months where cybersecurity risk analysis could influence the outcome? For each decision, explain: who typically makes it, what risk factors are usually considered, and what data would be most persuasive to decision-makers.</code></code></pre><p><strong>For identifying relevant risks:</strong> </p><pre><code>I work in [industry sector] and our technology stack includes [list key systems/platforms]. Research the most significant cyber incidents in my industry from 2024-2025. For each major incident, help me understand: what was the initial attack vector, how much did it cost the victim organization, what controls might have prevented it, and what frequency data exists for this type of attack in our sector. Focus on incidents that resulted in quantifiable losses and include the source data.</code></pre><p>Don&#8217;t forget to double-check everything GenAI comes back with. Ask for citations and references and verify yourself.</p><h2>The Sweet Spot</h2><p><strong>A concrete business decision</strong> that executives need to make soon, where analyzing <strong>a specific cyber risk</strong> they're already worried about, <strong>with decent available data</strong>, would genuinely influence the choice.</p><h2>Pro Tips for Success</h2><ul><li><p><strong>Start small.</strong> Your first assessment doesn't need to be comprehensive. Pick one decision, one risk, one analysis. Do it well, show the value, then expand.</p></li><li><p><strong>Focus on "good enough" data.</strong> Industry averages plus educated estimates beat pure guesswork every time. Don't let perfect be the enemy of good.</p></li><li><p><strong>Make it visual.</strong> A simple slide showing "current risk vs. risk after investment" speaks louder than spreadsheets full of numbers.</p></li><li><p><strong>Practice the pitch.</strong> Before you present, rehearse explaining your analysis in 2 minutes. If you can't make it clear and compelling quickly, simplify further.</p></li></ul><p><strong>Remember:</strong> The goal isn't to predict the future perfectly. It's to make better decisions under uncertainty by putting numbers on trade-offs that were previously just gut feelings.</p><div><hr></div><h1><strong>&#129517; What You Can Expect Going Forward</strong></h1><p>That guide above is exactly the kind of practical, field-tested content you'll get every month starting in July.</p><p>This newsletter is for anyone trying to do cyber risk quantification in the real world - with limited time, limited budget, and a high bar for quality.</p><h4><strong>I'll be sharing:</strong></h4><p>&#129514; <strong>CRQ tips, tools, and workflows</strong>: beginner to advanced, all field-tested</p><p>&#128202; <strong>Breakdowns of public reports and datasets</strong> (like the DBIR and industry studies)</p><p>&#129504; <strong>Prompts, scripts, and techniques</strong> for using GenAI in risk analysis (strategically, not recklessly)</p><p>&#128236; <strong>Q&amp;As and AMAs</strong>: answering your questions and surfacing the ones we all have but rarely ask</p><p>&#128206; <strong>Book previews and behind-the-scenes cuts</strong> that didn't make it into the final pages</p><p>&#128257; <strong>Occasional links</strong> to great writing and thinking from others in the CRQ and risk world</p><p>Some issues will be deep dives. Some will be quick hits. But my promise is this: <strong>it'll always be practical.</strong></p><div><hr></div><h1><strong>&#128218; What I'm Reading</strong></h1><p>Each issue, I'll share a few blog posts, research articles, or tools worth your time. Here are two standouts I've been diving into:</p><p><strong><a href="https://www.linkedin.com/pulse/building-common-language-cyber-risk-why-crq-needs-metrics-hanbury-7qwbe/">Operationalizing Cybersecurity Risk Quantification</a></strong> by James Hanbury: This 5-part LinkedIn series tackles the practical challenges of implementing CRQ at scale. What I love about James's approach is how he addresses the organizational dynamics that make or break CRQ initiatives. It's not just about the math - it's about building consensus, creating shared language, and designing metrics that actually drive decisions. Essential reading if you're trying to move CRQ from spreadsheet exercises to business strategy.</p><p><strong><a href="https://medium.com/@mpmab1/quantifying-cyber-financial-impact-step-by-step-guide-with-triangular-distribution-5204a23f7dc1">Quantifying Cyber Financial Impact: Step-by-Step Guide with Triangular Distribution</a></strong> by Mehdi Kiani: A solid walkthrough of using triangular distributions for modeling cyber losses when you have limited data. Kiani does a nice job showing the actual mechanics. If you're looking for concrete examples of how to move from expert estimates to probability distributions, this hits the sweet spot between accessible and rigorous.</p><p>Got recommendations? Send them my way and I'll feature reader picks too.</p><div><hr></div><h3><strong>&#128450; From the Archives</strong></h3><p>Here are a few recent blog posts of mine you might enjoy:</p><ul><li><p><strong><a href="https://www.tonym-v.com/blog/2025/6/1/six-levers-that-quietly-change-your-risk-and-how-to-spot-them">Six Levers That Quietly Change Your Risk and How to Spot Them</a></strong>: Controls are just one lever. Most changes in risk come from forces far outside your walls, from M&amp;A activity to threat actor capability shifts to regulatory changes. A framework for spotting what's actually moving your risk math.</p></li><li><p><strong><a href="https://www.tonym-v.com/blog/2025/5/21/agi-dreams-what-keeps-a-risk-professional-up-at-night">AGI Dreams: What Keeps a Risk Professional Up at Night</a></strong>: What happens when a quantitative risk analyst tries to model something that doesn't exist yet? A personal take on artificial general intelligence, uncertainty, and why fictional AI might be our best frame of reference for the real thing.</p></li><li><p><strong><a href="https://www.tonym-v.com/blog/2025/5/3/why-ransomware-isnt-just-a-technology-problem-its-worse">Why Ransomware Isn't Just a Technology Problem (It's Worse)</a></strong>: Ransomware persists not because of tech failures, but because it exploits economic misalignments between victims, insurers, law enforcement, and vendors. When everyone has competing incentives, the only winners are the criminals.</p><div><hr></div></li></ul><h3><strong>&#128587; How You Can Help</strong></h3><p>This is just the beginning, and I'd love to make this newsletter something genuinely useful for you.</p><p>&#9989; <strong>Tell me what topics you want covered</strong>: beginner, advanced, tools, AI use, anything</p><p>&#9989; <strong>Forward this to a colleague</strong> who's curious about CRQ</p><p>&#9989; <strong>Click the &#10084;&#65039; or comment</strong> if you're into this</p><p>If someone forwarded this to you, you can subscribe here to get future issues.</p><p>Thanks again for being here. The real fun starts in July.</p><p>- Tony</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading From Heatmaps to Histograms: Field Notes! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Coming soon]]></title><description><![CDATA[This is Heatmaps to Histograms: Field Notes.]]></description><link>https://newsletter.heatmapstohistograms.com/p/coming-soon</link><guid isPermaLink="false">https://newsletter.heatmapstohistograms.com/p/coming-soon</guid><dc:creator><![CDATA[Tony Martin-Vegue]]></dc:creator><pubDate>Sun, 01 Jun 2025 19:28:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!laV-!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9b118e0-8808-483b-a5c5-93a60465ab42_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This is Heatmaps to Histograms: Field Notes.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://newsletter.heatmapstohistograms.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://newsletter.heatmapstohistograms.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item></channel></rss>