How It Works

From scoping call to financial outputs.

A structured engagement that produces actuarially derived financial risk outputs for your board, your insurer, and your regulator.

The Process

Four steps. Four to eight weeks. One financial risk position.

01

Scoping call

30 minutes

We start by understanding your organisation: your sector, size, regulatory environment, and the specific decisions you need to inform. This determines whether Üsta is the right fit and what the engagement would look like, including scope, timeline, and what outputs you receive.

02

Structured assessment

1–2 weeks

A targeted questionnaire maps your control environment across the threat scenarios most relevant to your business. We focus on the controls and architecture decisions that most materially affect your financial exposure, rather than exhaustive compliance checklists.

We do not require a mature security tooling stack or hundreds of integrations. The assessment is designed to produce rigorous outputs from the information your team already has.

03

Model calibration

2–3 weeks

Your posture is parameterised against Üsta's actuarial model, calibrated to your sector, revenue scale, and the African threat environment. We apply frequency and severity distributions sourced from global cyber loss databases, adjusted for the specific risk profile of your market.

This is where Üsta differs from framework assessments and qualitative scoring tools. The output is a probability distribution of financial loss, not a maturity score or a traffic light.

04

Financial outputs

Delivered at end of engagement

You receive loss distributions, expected annual loss, tail risk estimates, scenario-level breakdowns, and control ROI analysis. Outputs are delivered in formats your CFO, board, and GRC teams can work with immediately.

The Methodology

Actuarial science, applied to cyber risk.

Actuarial, not qualitative

Üsta's models are built on actuarial science: the same probabilistic mathematics used in insurance pricing and pension fund risk management. The output is a financial loss distribution, not a maturity score.

Scenario-based

We model the scenarios most relevant to your business: data breach and exfiltration, ransomware, third-party and supply chain failure, and insider threat. Each is modelled separately with its own frequency and severity parameters.

Africa-calibrated

Our model is calibrated to the African threat environment: mobile-first financial infrastructure, the regulatory context of POPIA and FSCA oversight, and the specific risk profile of digital financial services on the continent.

Transparent and defensible

Every assumption in the model is documented and auditable. Outputs are structured to withstand scrutiny from regulators, auditors, insurers, and board risk committees.

What You Don't Need

No complex tooling stack required.

Most cyber risk quantification platforms assume you already have hundreds of security tools generating telemetry. Üsta starts from first principles. Our structured assessment is designed to produce rigorous, actuarially sound outputs from the information your organisation already holds.

No complex tooling prerequisites
Our assessment works from structured inputs, not telemetry pipelines or existing security platform subscriptions
No 200-tool integration
Assessment works from structured inputs, not telemetry pipelines
No prior CRQ experience
We guide you through the assessment from start to finish

Common Questions

Frequently asked questions.

See if it's the right fit.

A 30-minute scoping call is enough to understand whether Üsta is right for your organisation and what the engagement would produce.

Request a Scoping Call