Skip to contentAbout Fig Group

Exposure Modelling

Model aggregate risk exposure and scenario impact across your portfolio.

The challenge

Does this sound familiar?

Individual risk scores don't show aggregate exposure. You don't know whether one more vulnerability tips you into breach-likely territory. Scenario planning is impossible.

How Fig helps

Exposure Modelling with Fig

Risk Aggregation

Vulnerabilities, misconfigurations, and control gaps combined into portfolio risk scores using industry-standard models. What if risks are calculated scenario-by-scenario.

Scenario Modelling

Model exposure impact if a vulnerability remains unpatched, a supplier is breached, or a framework deadline is missed. Board-ready risk impact summaries.

Fig Exposure Modelling platform view
Core Capability

Fig continuously assesses cyber security posture, attack surface, and external threats to determine customer exposure in real time.

Attack Path Mapping

Fig traces likely attack paths through your assets using vulnerability, configuration, and permissions data. Prioritise remediations that break the most dangerous paths.

Insurance Alignment

Exposure models feed directly into cyber and professional indemnity underwriting. Better risk data means better insurance premiums.

Audit-ready workflow

How Exposure Modelling becomes evidence

Exposure Modelling should not be treated as a standalone tool surface. In Fig it is part of a governed workflow: a signal is captured, an owner is assigned, a control or risk is updated, and evidence is retained so the organisation can prove what happened later.

Lifecycle

Where it sits in the operating model

The Protect phase is where this capability sits in the wider Fig operating model. Individual risk scores don't show aggregate exposure. You don't know whether one more vulnerability tips you into breach-likely territory. Scenario planning is impossible. Fig turns that problem into a repeatable lifecycle so MSPs, risk teams, and auditors are not relying on static spreadsheets or ad hoc screenshots when a buyer asks for proof.

Evidence captured

What auditors and buyers see

For exposure modelling, useful evidence normally includes the triggering record, the affected asset or supplier, the control requirement, the assigned owner, the decision made, the timestamp, and the outcome. That evidence is mapped back to frameworks such as Cyber Essentials, ISO 27001, NIS2, DORA, GDPR, CMMC, and internal policy requirements where relevant.

Implementation checks

Four steps to roll this out

  • 01Define who owns exposure modelling and what events should trigger review.
  • 02Connect the relevant source systems so evidence is collected continuously.
  • 03Map outputs to the frameworks and policies that matter to the organisation.
  • 04Review exceptions, accepted risks, and overdue actions before audit or renewal.

Useful references

Independent sources buyers and auditors recognise

The exact evidence required still depends on your scope, risk profile, sector, and framework obligations.

Built for you

Who uses this?

MSPs & MSSPs

Portfolio-level risk aggregation across all clients. Scenario models and attack path analysis strengthen your managed security services pitch.

Learn more

Security & risk teams

Board-ready risk dashboards showing exposure trends. What-if scenarios inform budget allocation and strategic risk decisions.

Learn more

Compliance & audit

Risk assessment models and remediation prioritisation evidence for enterprise risk management and governance audits.

Learn more

Common questions

Frequently asked questions

Is exposure modelling just a risk heat map?

No. Fig models actual attack paths through your assets, scores the likelihood of exploitation chains, and calculates financial impact using your insurance premiums and business metrics.

Can we model third-party breaches?

Yes. You can model the impact of a supplier breach by running scenarios where that supplier's access rights are compromised, then tracing downstream exposure to your critical systems.

How does attack path mapping work?

Fig analyses your vulnerability data, network topology, user permissions, and configuration state to identify chains of weaknesses an attacker could exploit. It then prioritises remediations that break the most dangerous paths first.

Can we use exposure models to justify budget requests?

Yes. Fig generates financial impact estimates for each risk scenario, showing the potential cost of inaction. Many clients use these reports directly in board presentations and budget proposals to make the case for specific security investments.

How often are exposure scores recalculated?

Scores recalculate automatically whenever underlying data changes, such as a new vulnerability scan, a configuration drift alert, or an updated supplier risk score. You always see the current state, not a snapshot from last quarter.

Next step

See Exposure Modelling in action.

Book a walkthrough tailored to your frameworks and tooling.