Loss exceedance curve (LEC)
Source. Pattern from FAIR / Cyber Doppler quantification engagements (TEF DSI, Sixt Risk P&L). Real curve shape, characteristic log-log decreasing slope with mid-range knee. AUD amounts illustrative.
Eight charts below. Every shape was drawn from a real piece of work, Telefónica DSI program, Sixt risk quantification, third-party risk patterns, internal maturity scoring. Numbers are anonymised so we can show the work without naming clients.
No AI-generated imagery on this site. Every chart is hand-rendered SVG, drawn from real data structures.
Source. Pattern from FAIR / Cyber Doppler quantification engagements (TEF DSI, Sixt Risk P&L). Real curve shape, characteristic log-log decreasing slope with mid-range knee. AUD amounts illustrative.
Source. Pattern from TEF v7 'Path to Green' board exhibit. Real category structure, inherent risk → existing controls → planned controls → residual. Values anonymised.
Source. Pattern from TEF v7. Real hierarchy, board appetite cascades to executive, business unit, asset class. Each level shows actual exposure vs appetite envelope. Values anonymised.
Source. Pattern from TEF Master Tracker. Real composite-scoring structure (DSI 6.4 = weighted sum of coverage / effectiveness / maturity / operations / risk reduction). Component values illustrative.
Source. Pattern from TEF v6 CMDB transparency tile. Real structure, total raw inventory minus duplicates / decommissioned / out-of-scope yields working population. The unmodelled gap is what keeps every CISO awake.
Source. Pattern from third-party risk management work, vendors × control areas, color by residual risk after evidence review. Vendor names anonymised. Cell colors reflect realistic distribution (most vendors green, a few amber, rare red).
Source. Pattern from the Mosaical AI platform's typed graph. Real entity types (Vendor, SOC 2 Report, Pentest, Policy, Regulation, Control Owner, Risk Score). Generic IDs.
Source. Pattern from in-house cybersecurity maturity assessment (4-level model across 12 domains). Real domain set used in CISO advisory. Current vs target band. Scores illustrative.
Same chart shapes. Different data, yours. Anonymised when shared externally, retrievable internally with full lineage.
Commission the 48-hour prototype →