Loss exceedance curve (LEC)
Source. Pattern from FAIR / Cyber Doppler quantification engagements (TEF DSI, Sixt Risk P&L). Real curve shape — characteristic log-log decreasing slope with mid-range knee. EUR amounts illustrative.
Eight charts below. Every shape was drawn from a real piece of work — Telefónica DSI program, Sixt risk quantification, third-party risk patterns, internal maturity scoring. Numbers are anonymised so we can show the work without naming clients.
No AI-generated imagery on this site. Every chart is hand-rendered SVG, drawn from real data structures.
Source. Pattern from FAIR / Cyber Doppler quantification engagements (TEF DSI, Sixt Risk P&L). Real curve shape — characteristic log-log decreasing slope with mid-range knee. EUR amounts illustrative.
Source. Pattern from TEF v7 'Path to Green' board exhibit. Real category structure — inherent risk → existing controls → planned controls → residual. Values anonymised.
Source. Pattern from TEF v7. Real hierarchy — board appetite cascades to executive, business unit, asset class. Each level shows actual exposure vs appetite envelope. Values anonymised.
Source. Pattern from TEF Master Tracker. Real composite-scoring structure (DSI 6.4 = weighted sum of coverage / effectiveness / maturity / operations / risk reduction). Component values illustrative.
Source. Pattern from TEF v6 CMDB transparency tile. Real structure — total raw inventory minus duplicates / decommissioned / out-of-scope yields working population. The unmodelled gap is what keeps every CISO awake.
Source. Pattern from third-party risk management work — vendors × control areas, color by residual risk after evidence review. Vendor names anonymised. Cell colors reflect realistic distribution (most vendors green, a few amber, rare red).
Source. Pattern from the Epoch KI platform's typed graph. Real entity types (Vendor, SOC 2 Report, Pentest, Policy, Regulation, Control Owner, Risk Score). Generic IDs.
Source. Pattern from in-house security maturity assessment (4-level model across 12 domains). Real domain set used in CISO advisory. Current vs target band. Scores illustrative.
Same chart shapes. Different data — yours. Anonymised when shared externally, retrievable internally with full lineage.
Commission the 48-hour prototype →