How It Works
A structured engagement that produces actuarially derived financial risk outputs for your board, your insurer, and your regulator.
The Process
We start by understanding your organisation: your sector, size, regulatory environment, and the specific decisions you need to inform. This determines whether Üsta is the right fit and what the engagement would look like, including scope, timeline, and what outputs you receive.
A targeted questionnaire maps your control environment across the threat scenarios most relevant to your business. We focus on the controls and architecture decisions that most materially affect your financial exposure, rather than exhaustive compliance checklists.
We do not require a mature security tooling stack or hundreds of integrations. The assessment is designed to produce rigorous outputs from the information your team already has.
Your posture is parameterised against Üsta's actuarial model, calibrated to your sector, revenue scale, and the African threat environment. We apply frequency and severity distributions sourced from global cyber loss databases, adjusted for the specific risk profile of your market.
This is where Üsta differs from framework assessments and qualitative scoring tools. The output is a probability distribution of financial loss, not a maturity score or a traffic light.
You receive loss distributions, expected annual loss, tail risk estimates, scenario-level breakdowns, and control ROI analysis. Outputs are delivered in formats your CFO, board, and GRC teams can work with immediately.
The Methodology
Üsta's models are built on actuarial science: the same probabilistic mathematics used in insurance pricing and pension fund risk management. The output is a financial loss distribution, not a maturity score.
We model the scenarios most relevant to your business: data breach and exfiltration, ransomware, third-party and supply chain failure, and insider threat. Each is modelled separately with its own frequency and severity parameters.
Our model is calibrated to the African threat environment: mobile-first financial infrastructure, the regulatory context of POPIA and FSCA oversight, and the specific risk profile of digital financial services on the continent.
Every assumption in the model is documented and auditable. Outputs are structured to withstand scrutiny from regulators, auditors, insurers, and board risk committees.
What You Don't Need
Most cyber risk quantification platforms assume you already have hundreds of security tools generating telemetry. Üsta starts from first principles. Our structured assessment is designed to produce rigorous, actuarially sound outputs from the information your organisation already holds.
Common Questions
A 30-minute scoping call is enough to understand whether Üsta is right for your organisation and what the engagement would produce.
Request a Scoping Call