DORA · DORA Article 28 RoI · NIS2 · Basel III OR · FAIR-based Quantification · European-built

Quantify Cyber, Operational & Third-Party Risk
on One Defensible Capital Basis.

AIQ Suite translates ICT, operational, and third-party provider risk into board-ready capital impact, concentration exposure, and regulatory evidence — through one governed platform built for European financial-sector operational resilience.

Board-ready outputs
Capital impact %
DORA · NIS2 · Basel context
🛡️
CyberRisk AIQ
DORA · NIS2
⚖️
OpRisk AIQ
Basel III · RCSA · ICAAP
🔗
TPPRisk AIQ
DORA Article 28 RoI · Concentration

Early access currently prioritised for banks, financial institutions, and regulated organisations.

Portfolio Risk — Capital & OR Capital Impact
Ransomware
1.84%
Data Exfiltration
1.12%
Phishing / BEC
0.68%
Settlement Error
1.41%
Payment Fraud
0.92%
System Outage
0.54%
Cloud Hosting (Primary)
€8.4M
Payment Gateway
€6.1M
Core Banking Vendor
€2.7M
P95 exposure · CIF mapped per provider RoI Completeness 99.7%
Board-ready output: 3 risks above appetite. Top provider concentration covers 5 critical functions. Register of Information ready for submission. Three layers of operational resilience, one defensible view.
🏦 Banks & Credit Institutions
🛡️ Insurance Companies
🏛️ Public Sector under NIS2
⚡ Critical Infrastructure Operators
🏢 Regulated Corporates
💳 Payment Institutions
Platform Modules

Three modules.
One operational resilience platform.

Each module can be deployed independently or together as AIQ Suite. All three share the same governance workflow, organisational data, AI infrastructure, reporting layer, audit trail, and capital-impact logic — giving banks one consistent view of ICT risk, operational risk, and third-party dependency risk.

Module 01

CyberRisk AIQ

ICT & Cyber Risk Quantification

Quantifies ICT and cyber risk through FAIR-based methodology applied to ICT assets, threat scenarios, control effectiveness, and loss components. Produces board-ready capital impact metrics aligned with DORA ICT risk management and NIS2 expectations.

DORA NIS2 ISO 27002 NIST CSF CIS Controls
  • ICT Asset Registry with risk intelligence tagging
  • 354 controls — ISO 27002, NIST CSF 2.0, CIS v8 — import any framework via AI or CSV
  • Multiplicative control reduction model — realistic compounding, no inflation
  • DORA ICT Risk Report — structured per DORA Annex
  • NIS2 ICT Risk Report for public sector and corporate
  • Capital / Budget / Equity Impact calculation and reporting
  • Investment Optimizer — ROI-ranked controls per scenario
  • AI analyst assessment — jurisdiction-aware, editable, human-signed
  • BO Decision Guidance — ROI flags, governance checklist, Tier 1 DORA banner
Module 02

OpRisk AIQ

Operational Risk Quantification

Quantifies operational risk through FAIR-based scenario analysis applied to business processes, Basel III Event Type categories, internal loss data, and process controls. Supports RCSA, ICAAP narrative, management reporting, and operational risk capital impact analysis.

Basel III OR CRD IV Quantitative RCSA ICAAP Solvency II
  • Business Process Registry with asset dependency mapping
  • Basel Event Type scenario categories (7 categories)
  • OR Capital Impact estimation per process
  • Operational Risk Manager / Risk Coordinator governance roles for OR workflow
  • Basel III OR Capital Report — RCSA-aligned, FAIR-quantified
  • Process ↔ ICT Asset integration for cross-domain risk view
Module 03

TPPRisk AIQ

ICT Third-Party Provider Risk & DORA Register of Information

Manages ICT third-party provider risk across the full DORA lifecycle: provider registry, ICT services, contracts, critical or important functions, exit strategies, subcontracting, dependency mapping, concentration risk, data quality, and Register of Information export.

DORA Article 28 EBA RoI ITS ICT Providers Concentration Risk
  • ICT Third-Party Provider Register — EBA ITS B_05.01 aligned
  • ICT Services and Functions Registry — EBA ITS B_06.01 with closed-list service types
  • Contract Register with CIF/non-CIF classification and CIF assessment status
  • Exit strategy and substitutability tracking — DPM closed-list (ZZ:x959–x962)
  • Critical or Important Function (CIF) assessments — 5-step wizard
  • Dependency mapping — provider → service → function → asset
  • Supply chain dependencies (B_03.03) and intra-group ICT services (B_03.02)
  • Single-provider P95 and group concentration analytics
  • Data quality framework — HIGH / MEDIUM / LOW bands with actionable drill-down
  • DORA Register of Information completeness checks and validation gates
  • RoI export package with frozen snapshots and submission history
  • CRO approval workflow and audit trail
  • Vendor Manager role with role-restricted deactivation
  • AI-assisted FAIR calibration for substitutability and exit-cost ranges
The Problem

Boards don't speak heat maps.
Regulators don't accept spreadsheets.

Qualitative risk matrices, scattered vendor registers, and manual outsourcing spreadsheets are no longer defensible under DORA, NIS2, and Basel III. Banks need a single governed view of risk, capital impact, third-party dependency, and regulatory evidence.

Before
"This is a High risk on our heat map."
+ "We keep the vendor list in procurement."
+ "The DORA Register of Information is in a manual spreadsheet."
Subjective. Fragmented. Indefensible. Fails DORA, Basel III, and NIS2 regulatory scrutiny.
After — AIQ Suite
"Our Cyber + OR capital exposure is 2.76% of Tier-1 capital."
Cyber Expected Loss: €3,200,000
OR Capital Impact: €4,100,000
Combined Capital Impact: 2.76%
Residual (w/ controls): €1,800,000
+ "Top ICT provider concentration: €8.4M P95 across 5 critical functions."
+ "DORA Register of Information: 99.7% complete, zero critical validation gaps."
Defensible. Auditable. Quantified. Regulator-ready. Covers DORA, NIS2, Basel III OR, and DORA Article 28 third-party risk in one integrated view.
Core Capabilities

Four pillars. Three modules.
One operational resilience platform.

01

Defensible Risk Quantification

FAIR-based inputs processed through 10,000-run Monte Carlo simulation — for ICT scenarios (CyberRisk AIQ), Basel Event Type scenarios (OpRisk AIQ), and third-party provider exposure portfolios (TPPRisk AIQ). Multiplicative control reduction model ensures realistic compounding. Outputs include Expected Loss, P50/P90/P95 confidence intervals, Loss Exceedance Curve, and capital impact percentage.

FAIR Monte Carlo Capital Impact Quantitative RCSA Loss Exceedance Curve
02

Third-Party Dependency Intelligence

Maps ICT providers to services, contracts, critical functions, internal assets, and quantified exposure. Identifies single-provider concentration, substitutability gaps, missing exit strategies, and group-level vendor dependencies. Generates DORA Register of Information aligned with EBA ITS templates and Commission Implementing Regulation 2024/2956.

Provider Mapping Concentration Analytics DORA Article 28 RoI ITS CIF Assessment
03

Jurisdiction-Aware AI

Anthropic Claude AI delivers analysis calibrated to your sector, capital base, and jurisdiction. A bank in Montenegro receives CBCG-framed guidance. A bank in Croatia receives DORA and HNB context. A public body in Germany receives NIS2 and BSI framing. 44 European jurisdictions mapped — regulatory references serve as context and benchmark, never a compliance checklist.

44 Jurisdictions Anthropic Claude Regulatory Context Local Regulators
04

Integrated 3LoD Governance

End-to-end accountability from analyst assessment to board escalation, across all three modules. 1LoD: Analyst + ICT Custodian / Risk Coordinator / Vendor Manager. 2LoD: CISO + OR Manager + CRO. Full audit trail, structured rework flow, BO Decision Guidance, Tier 1 DORA escalation, signed RoI snapshots. One workflow engine across CR, OR, and TPP.

3LoD Model Role Workflow Action Plans Audit Log Snapshot Governance
Workflow

From threat (and provider)
to governed decision.

Two parallel governance flows — quantified risk for CR + OR scenarios, third-party risk for the provider lifecycle — converging in board-ready capital impact and regulator-ready submission evidence.

Flow A·Quantified Risk Workflow — CR + OR
1
Both Modules

Analyst prepares quantitative assessment

For Cyber: selects ICT asset with risk intelligence tags, assigns threat scenario with editable description and threat actor, inputs FAIR parameters. For OR: selects business process with asset dependencies, assigns Basel Event Type scenario. AI suggests calibrated FAIR ranges for both.

Asset / Process Tagging AI FAIR Calibration Loss Modelling
10,000
Monte Carlo runs per assessment — Cyber and OR — producing P50/P90/P95 confidence intervals
2
CyberRisk AIQ

ICT Custodian / Risk Coordinator rates control effectiveness

For Cyber: ICT Custodian rates existing controls from ISO 27002, NIST CSF 2.0, and CIS Controls v8 on a 0–5 scale, with bulk multi-select and duplicate detection. For OR: Risk Coordinator rates process controls effectiveness. Platform calculates residual risk reduction.

ISO 27002:2022 NIST CSF 2.0 CIS Controls v8 Process Controls
354
Controls across ISO 27002, NIST CSF 2.0, CIS v8 — toggleable per organisation
3
Both Modules

CISO / Operational Risk Manager performs methodological review

For Cyber: CISO validates ICT risk methodology, reviews analyst's treatment recommendation and business risk narrative, and adds their own commentary. For OR: Operational Risk Manager performs the equivalent review. Both act as second-line quality gates before the business decision stage.

Quality Gate Analyst Review Return for Rework
Second Line
CISO / Operational Risk Manager act as methodological quality gates, not risk treatment decision-makers
4
Both Modules

Business Owner / Process Owner makes treatment decision

With AI analysis, analyst recommendation, and CISO/Operational Risk Manager commentary all visible, the risk owner accepts, mitigates, transfers, or avoids the risk. For OR: Process Owner holds formal accountability. Risks exceeding mandate trigger Board escalation.

Accept Mitigate Transfer Avoid Escalate
Risk Owner
Formal accountability for treatment decision — Cyber and OR — with complete audit trail
5
Both Modules

Structured action plan drives execution

Treatment decisions generate structured action plans. ICT Custodian adds controls from the framework library, AI suggestions, or custom entries — with improvement opportunities for existing under-performing controls. All tracked in a unified central view.

Technical Specification Cost Tracking Progress Monitoring
Full Trace
Every action linked to the risk that triggered it — from governance to execution, Cyber and OR
Flow B·Third-Party Risk Workflow — TPPRisk
1
TPPRisk AIQ

Vendor Manager registers provider, services, and contracts

Entry into the provider portfolio with EBA ITS B_05.01-aligned data — provider identity, ICT services delivered (closed-list service types), contracts with CIF/non-CIF classification, and supply-chain links. Foundation of the Register of Information.

B_05.01 Provider Registry B_06.01 Services Contracts
15 ITS
EBA ITS templates aligned to Commission Implementing Regulation 2024/2956
2
TPPRisk AIQ

CIF assessment evaluates Critical or Important Function status

5-step CIF wizard (Critical or Important Function) — materiality, substitutability, geography, outsourcing depth, and testing — produces a defensible CIF determination per contract. Vendor Manager prepares; CISO/CRO governance reviews.

Materiality Substitutability Geography Outsourcing Depth Testing
5-Step
Structured CIF wizard — defensible Critical or Important Function determination per contract
3
TPPRisk AIQ

Dependencies mapped across provider → service → function → asset

The platform surfaces concentration exposure: single-provider P95, UNION P95 across the portfolio, diversification benefit, and supply-chain dependencies (B_03.03) including intra-group ICT services (B_03.02). Concentration hot-spots become visible, not hidden in spreadsheets.

Single-provider P95 UNION P95 Diversification Benefit B_03.03 Supply Chain
P95
FAIR-based concentration exposure across providers, services, and critical functions
4
TPPRisk AIQ

Data quality validated; RoI completeness gates check submission readiness

HIGH/MEDIUM/LOW data quality bands per provider, with actionable drill-down to specific gaps. Validation gates check Register of Information completeness against the EBA ITS template set before any submission can proceed.

HIGH / MEDIUM / LOW Bands Validation Gates Actionable Drill-down
99.7%
Target Register of Information completeness before CRO approval and submission
5
TPPRisk AIQ

CRO approves frozen snapshot; RoI submission package generated

CRO reviews concentration risk, approves the snapshot, and freezes it. The platform generates a signed-ZIP submission package per Commission Implementing Regulation 2024/2956 — ready for the competent authority. Full audit trail preserved.

Snapshot Freeze CRO Approval Signed-ZIP Submission Package
Signed-ZIP
Submission package per Commission Implementing Regulation 2024/2956 — regulator-ready

From provider inventory to regulator-ready Register of Information submission.

Governance Model

Role-based accountability across
Cyber, OR, Third-Party Risk, and group entities.

📊

Analyst

Cyber & OR — Both Modules

Prepares quantitative risk assessments end-to-end for both ICT and operational risk domains.

  • Asset & process selection
  • FAIR input modelling
  • Loss component analysis
  • AI analysis generation & editing
  • Action plan management
🔒

ICT Custodian / Risk Coordinator

ICT Custodian (Cyber) · Risk Coordinator (OR)

Provides technical input on control effectiveness and builds the action plan control set.

  • Control effectiveness rating
  • Bulk control selection
  • Action plan controls
  • Security posture validation
🎯

CISO / Operational Risk Manager

CISO (Cyber) · Operational Risk Manager (OR)

Second-line methodological review and quality gate — reviews analyst recommendation and narrative before BO decision.

  • Methodology validation
  • Analyst review commentary
  • Return for rework
  • Portfolio oversight
💼

Business Owner / Process Owner

ICT Asset Owner (Cyber) · Process Owner (OR)

Risk owner making the formal treatment decision with full AI and human context available.

  • Treatment decision
  • Escalation to Board
  • Risk acceptance accountability
🗂️

Asset Manager / Process Manager

Asset Manager (Cyber) · Process Manager (OR)

Maintains the registry of organisational assets — ICT assets (Cyber) or business processes (OR) — including ownership assignment, tagging, and dependency mapping.

  • Asset / Process CRUD
  • Tag management & asset dependencies
  • Bulk CSV import
  • Owner assignment & decommission workflow
🔗

Vendor / TPP Manager

TPPRisk AIQ — Third-Party Module

Maintains ICT provider, service, contract, and dependency records. Coordinates CIF assessments and data quality remediation across the provider portfolio.

  • Provider registry maintenance (B_05.01)
  • ICT service and contract mapping
  • CIF assessment preparation
  • Exit strategy follow-up & substitutability tracking
  • Data quality remediation
  • Role-restricted deactivation under licence overlimit
🎖️

CRO / DORA Approver

TPPRisk AIQ — Snapshot Authority

Approves critical third-party risk outputs, concentration analysis, and frozen RoI snapshots before regulatory export. Methodological gate aligned with Group CRO mandate.

  • Concentration risk review
  • RoI submission approval
  • Snapshot freeze authority
  • Group-level exposure oversight
  • Regulatory evidence sign-off
⚙️

Administrator

All Three Modules

Platform configuration, module activation, and governance setup.

  • Module activation
  • User & role management
  • AI provider config
  • Risk thresholds & frameworks
🏛️

Group Roles

Holding / Multi-Entity — Group Layer

Group-level oversight across subsidiaries: consolidated CR + OR + TPP exposure, cross-entity provider concentration, group-level RoI readiness. Single accountability layer above per-entity governance.

  • Group CISO — consolidated ICT risk posture across subsidiaries
  • Group ORM — operational risk across all entities and business lines
  • Group CRO — combined CR + OR + TPP exposure, group-level snapshot approval
  • Cross-entity concentration analysis
  • Group Executive Summary — AI-generated board narrative
AI Engine

Intelligence calibrated
to your jurisdiction, sector, and capital context.

Not generic advice. Every AI output is contextualised to your organisation's type, capital base, regulatory obligations, and jurisdiction — whether it's a DORA-scope bank in Croatia or a public authority in Montenegro.

🎯

FAIR Input Calibration — Cyber & OR

Suggests TEF and Vulnerability ranges calibrated to ICT asset criticality and threat actor profiles (Cyber), or to business process type and Basel Event Type category (OR). Confidence levels and value bands signal where human judgement is most needed.

🌍

Jurisdiction-Aware Regulatory Context

44 European jurisdictions mapped. AI analysis references the frameworks actually applicable to your organisation — CBCG for Montenegrin banks, DORA and HNB for Croatian institutions, NBS for Serbian entities. Regulatory references provide context and benchmark, never a compliance checklist.

Capital-Tier Treatment Recommendation

Deterministic treatment recommendation at temperature=0, anchored to your 4-tier capital impact framework. Tier thresholds configured per tenant. Tier 1 risks trigger Management Board escalation guidance aligned with DORA Article 5 requirements.

📋

Analyst Assessment — AI Draft, Human Signature

AI generates a structured analyst assessment using regulatory benchmarks and industry context — editable in a rich text editor. The analyst reviews, refines, and saves. What reaches the CISO and Board carries human accountability, not raw AI output.

🔧

Configurable AI Provider

Use Anthropic Claude (default), Azure OpenAI, or standard OpenAI. Provider configured per tenant in Admin Panel. Master AI switch enables full manual operation when AI is not required or available.

AI Context Inputs — All Three Modules
Organisation Profile
Sector & Jurisdiction
Capital Base / Budget
Risk Appetite Tiers
Regulatory Frameworks
Asset / Process Context
Criticality & Classification
Asset Dependencies
Risk Type (Cyber / OR)
Regulatory Scope Tags
Third-Party Context
Provider Category & Sub-Outsourcing
Substitutability & Geography
Outsourcing Depth & RTO/RPO
DPM Service Type Classification
Anthropic Claude AI Engine
claude-sonnet · jurisdiction-aware · multi-module · governance-focused
Cyber Outputs
ICT FAIR calibration
Analyst Assessment draft
DORA/NIS2 context
OR Outputs
Basel Event analysis
Process control gaps
RCSA narrative & calibration
TPPRisk Outputs
Provider data quality gap analysis
Substitutability & exit-cost narrative
Concentration commentary for CRO
RoI readiness assessment
Group-level dependency summary

AI supports review, calibration, and narrative drafting. Regulatory accountability — for capital impact decisions, CIF status, RoI submission, and treatment outcomes — remains with the institution and its accountable persons.

Why AIQ Suite

What sets AIQ Suite apart.

Purpose-built for European regulated organisations — combining capabilities that are typically available only separately, at enterprise price points, or not at all. Now including group-level risk intelligence for multi-entity organisations.

Workflow + Quantification in One

Most quantification tools are calculators — they produce a number but leave coordination to email and spreadsheets. AIQ Suite embeds the complete governance workflow: analyst preparation, ICT/process control rating, CISO review, business owner decision, action plan, and approval — all in one platform, with full audit trail.

🔗

CR + OR + Third-Party Risk in One Operational Resilience Platform

Cyber risk, operational risk, and third-party risk are typically managed in separate silos — separate teams, separate tools, separate evidence. AIQ Suite unifies them: same assets, same users, same governance workflow, same audit trail, same capital basis. A bank sees its ransomware exposure, its settlement error exposure, and its cloud-hosting concentration side-by-side — and surfaces where the same provider supports multiple critical processes automatically.

🗺️

Built for European Regulation

All major quantification platforms originate in North America. AIQ Suite is designed from the ground up for European regulatory requirements — DORA, NIS2, Basel III, EBA Guidelines, and 44 national jurisdictions including local regulators (CBCG, NBS, HNB, BaFin, FMA, FINMA). Not an afterthought — the architecture.

🔍

Full Calculation Transparency

Every input, every control rating, every Monte Carlo output is visible and auditable. FAIR inputs, loss components, control reduction calculations, capital impact formula — all accessible for regulatory review. No black box. Designed to withstand supervisory scrutiny under DORA Article 6 and EBA internal model requirements.

👤

Accessible Without Certification

FAIR methodology typically requires specialist training or external consultants. AIQ Suite makes FAIR accessible to any risk analyst through AI-assisted calibration, scenario context panels, industry benchmark guidance, and structured workflow. Expertise is embedded in the platform — not a prerequisite for using it.

📊

Industry Benchmarking

See how your organisation's capital impact compares to sector peers. Benchmark data sourced from Verizon DBIR, ENISA Threat Landscape, IBM X-Force, and Ponemon Institute — by organisation type, sector, and company size. Gives CISO and board concrete context: are we above or below industry average for this risk?

🔗

DORA RoI + Quantified Risk in One Platform

Most DORA TPP tools stop at registers and templates. Most risk quantification tools stop at scenarios and loss curves. AIQ Suite connects both: ICT providers, contracts, critical functions, internal assets, and quantified P95 exposure — so third-party risk is not just documented, but financially understood and regulator-submittable.

DORA Article 28 EBA ITS FAIR Quantification Register Submission
🗺️

From Vendor Inventory to Concentration Exposure

AIQ Suite doesn't treat third-party risk as a static vendor list. It maps providers to ICT services, critical functions, contracts, assets, and risk assessments — revealing where the institution is operationally dependent on a single provider, cloud region, subcontractor, or group-wide vendor relationship.

Provider Mapping Concentration P95 Substitutability Group Dependencies
🌐

On-Premise, SaaS, or Holding Deployment

Most European risk platforms are SaaS-only — a hard constraint for banks under central bank requirements that restrict public cloud deployment of core risk data. AIQ Suite supports three deployment modes: full SaaS (EU data centres), on-premise (institution's own infrastructure), and operating holding (parent entity hosts subsidiaries). Tier-based RSA-signed JWT licensing works offline — no phone-home requirement. Banks meet regulatory data-residency expectations without compromising platform capability.

EU Data Centres On-Prem Option Holding Mode Offline Licensing No Phone-Home
🎯 One Methodology Stack

FAIR for Cyber, RCSA for OR, FAIR for TPP

CyberRisk AIQ applies FAIR methodology with DORA and NIS2 framing. OpRisk AIQ applies Quantitative RCSA with FAIR-based Monte Carlo for Basel III Operational Risk — replacing the deprecated AMA approach (Basel III final reform 2023). TPPRisk AIQ applies FAIR-based quantification to provider exposure portfolios with DORA Article 28 framing and EBA ITS Register of Information alignment.

All three modules produce capital impact and concentration exposure on the same defensible mathematical basis. ICAAP, third-party risk reporting, and operational resilience narrative become one document set, not three.

FAIR Quantitative RCSA Monte Carlo EBA RoI ITS ICAAP-ready
Compliance Coverage

Purpose-built for regulated sectors.

AIQ Suite structurally aligns internal risk governance with external auditing demands across major regulatory frameworks — through three purpose-built modules.

Framework
Applicable Sectors
Platform Coverage
Module
DORA
EU Regulation 2022/2554
BanksInsurersInvestment FirmsPayment Institutions
ICT risk management, ICT scenario quantification, governance workflow, third-party provider risk, concentration analysis, exit strategy tracking, Register of Information support
CyberRisk AIQ + TPPRisk AIQ
DORA Article 28
ICT Third-Party Risk
BanksFinancial SectorICT Service Providers
EBA ITS Register of Information per Commission Implementing Regulation 2024/2956, provider concentration analytics, CIF assessment workflow, supply-chain dependency mapping (B_03.03), intra-group ICT services (B_03.02), signed-ZIP submission to competent authority
TPPRisk AIQ
Basel III / CRR
Operational Risk Capital
BanksCredit Institutions
FAIR-based scenario analysis with Monte Carlo, OR capital impact estimation, Basel Event Type categorisation, ICAAP-aligned methodology documentation, internal loss data integration
OpRisk AIQ
NIS2
Network & Information Security Directive
Critical InfrastructureEnergyHealthPublic Sector
Risk identification and treatment workflow, control effectiveness evidence, NIS2 ICT Risk Report with Budget Impact terminology for public sector
CyberRisk AIQ
Solvency II
Insurance Prudential Regulation
Insurance Companies
Operational risk quantification (OR module), ICT risk for DORA-in-scope insurers (Cyber module), third-party risk for outsourced critical functions (TPP module), capital adequacy context
All Three Modules
ISO 27001 / ISO 27002
Information Security Management
Any Organisation
ISO 27002:2022 controls library (aligned, not reproduced), ISMS-compatible risk assessment process
CyberRisk AIQ
ZDOOFS Montenegro + ZIB
Sl. list CG 14/26 transposition
Financial sector entities in Montenegro
Localised support for ICT risk management, digital operational resilience, ICT third-party arrangements, registers, board reporting, and CBCG-ready evidence; framework supports additional Western Balkans transpositions in roadmap
All Three Modules
Product Roadmap

A living platform,
continuously deepened.

CyberRisk AIQ, OpRisk AIQ, TPPRisk AIQ, and the Enterprise Scale tier are all live. Multi-tenant, holding architecture, group risk intelligence, and DORA Register of Information are now in production.

CyberRisk AIQ
● Live
  • FAIR-based quantification engine (multiplicative control model)
  • 10,000-run Monte Carlo — P50/P90/P95 + capital impact
  • Loss Exceedance Curve — full distribution visualisation (P5–P99)
  • 9-role 3LoD governance workflow
  • CISO Rating Override — independent control effectiveness review
  • Scenario Simulator — What-If analysis before commitment
  • Designated Representative — delegate BO tasks
  • 354 controls — ISO 27002, NIST CSF 2.0, CIS v8
  • Controls import — Framework AI, Document AI, CSV
  • Industry Peer Benchmarking — DBIR, ENISA, Ponemon
  • Industry Scenario Library with benchmark FAIR inputs
  • Investment Optimizer — ROI per control
  • Jurisdiction-aware AI — 44 European countries with local regulator framing
  • Asset Risk Map — portfolio heatmap
  • BO Decision Guidance with ROI and governance flags
  • Scenario Coverage Check — gap analysis against industry scenario library
  • Risk Appetite Statement — configurable thresholds with DORA Article 5 escalation
  • KRI Framework — 15 pre-seeded KRIs with formula-driven computation, breach detection, weekly digest emails
  • Cross-Domain Risk Intelligence — Process ↔ ICT Asset linking surfaces concentration risks
  • CISO Board Summary — AI-generated, editable
  • Custom Report Builder — role-based visibility, AI summary
  • DORA + NIS2 regulatory reports
  • PDF export — assessment + board pack
  • Loss Data Registry — internal loss database with FAIR calibration
  • Multi-language UI — BS/HR/DE/EN
  • TOTP two-factor authentication (Google/Microsoft Authenticator)
OpRisk AIQ
● Live
  • FAIR-based quantification for OR (Basel Event Type scenarios)
  • OR Capital Impact estimation (7 Basel Event Type categories)
  • Loss Exceedance Curve — full distribution visualisation (P5–P99)
  • Operational Risk Manager / Risk Coordinator roles
  • ORM Rating Override — independent control effectiveness review
  • Scenario Simulator — What-If analysis before commitment
  • Designated Representative — delegate Process Owner tasks
  • Industry Peer Benchmarking — OR scenarios
  • Industry Scenario Library with benchmark FAIR inputs
  • Jurisdiction-aware AI — 44 European countries with local regulator framing
  • KRI Framework — operational risk indicators with scheduler, threshold monitoring, role-based notifications
  • Basel III OR Capital Report — RCSA + FAIR Monte Carlo
  • Custom Report Builder — role-based visibility, AI summary
  • Integrated Cyber + OR Executive Dashboard
  • Org-type capital labels — Tier 1 / Budget / Equity
  • OR Risk Register + ORM summaries
  • Business Process Registry with asset dependencies
  • Loss Data Registry — internal loss database for FAIR calibration and ICAAP
  • Multi-language UI — BS/HR/DE/EN
  • TOTP two-factor authentication (Google/Microsoft Authenticator)
TPPRisk AIQ
● Live
  • ICT Third-Party Provider Register — EBA ITS B_05.01 aligned
  • ICT Services and Functions Registry — EBA ITS B_06.01 with closed-list service types
  • Contract Register with CIF/non-CIF classification and CIF assessment status
  • Exit strategy and substitutability tracking — DPM closed-list (ZZ:x959–x962)
  • Critical or Important Function (CIF) wizard — 5-step assessment workflow
  • Dependency mapping — provider → service → function → asset
  • Supply chain dependencies — EBA ITS B_03.03 with provider-of-provider mapping
  • Intra-group ICT services — EBA ITS B_03.02 holding / subsidiary flows
  • Provider concentration analytics — Single-provider P95, UNION P95, Diversification Benefit
  • 5-tab concentration analysis — CIF, Top 5, Tier 1, Without Exit Strategy, By Substitutability
  • DORA Register of Information — 15 ITS templates per Commission Implementing Regulation 2024/2956
  • Snapshot history, frozen snapshots, signed-ZIP submission package
  • Data quality framework — HIGH / MEDIUM / LOW bands per provider with actionable remediation
  • CRO approval and audit trail
  • Vendor Manager governance role with role-restricted deactivation
  • AI-assisted FAIR calibration for substitutability and exit-cost ranges
  • Multi-jurisdiction support — pan-EU DORA + Montenegro ZDOOFS (Sl. list CG 14/26) + ZIB transpositions in production
  • Cross-module integration — TPP concentration linked to OR process dependencies and CR ICT asset criticality
  • Multi-language UI — BS/HR/DE/EN
  • TOTP two-factor authentication (Google/Microsoft Authenticator)
Enterprise Scale
● Live
  • Multi-tenant SaaS architecture — schema-per-tenant isolation
  • Super-admin panel — tenant provisioning, licence management, system health
  • RSA-signed JWT licensing — offline, tier-based, no phone-home
  • On-premise + SaaS + holding deployment modes
  • Operating holding model — holding entity with own workspace
  • Group roles — Group CISO, Group ORM, Group CRO
  • Consolidated Risk Summary — CR + OR capital across all subsidiaries
  • DORA Group Overview — applicability and ICT exposure by subsidiary
  • Group OR Capital — RCSA-aligned consolidated view across subsidiaries
  • Group Risk Concentration — cross-entity CR+OR process-asset matrix
  • Group Executive Summary — AI-generated board narrative across subsidiaries
  • Subsidiary benchmarking — ranked entities by combined capital at risk
  • Group Administration panel — group user management, subsidiary inclusion control
See It In Action

From threat to capital impact
and provider to submission package.

Three modules. One defensible mathematical basis — FAIR Monte Carlo for cyber, Quantitative RCSA + FAIR Monte Carlo for operational risk, FAIR-based concentration analytics for third-party risk.

Cyber Module — Ransomware scenario (FAIR Monte Carlo)
Asset
Core Banking System
Criticality: Critical · DORA scope
Scenario
Ransomware Attack
TEF: 0.8/yr · Vulnerability: 45%
1.84%
Capital Impact
€4.6M
Expected Loss
€9.2M
P90 Loss
Tier 1
Risk Tier
Active Controls
Firewall · 4/5 Backup & Recovery · 3/5 Incident Response · 2/5

See how MFA + EDR reduce capital impact

OR Module — Settlement Error scenario (Quantitative RCSA + FAIR Monte Carlo)
Process
Payment Processing
Criticality: Critical · Basel Event Type 7 (Execution)
Scenario
Settlement Error
TEF: 1.2/yr · Vulnerability: 30%
1.41%
Capital Impact
€2.8M
Expected Loss
€6.4M
P90 Loss
Tier 2
Risk Tier
Active Controls
Reconciliation Process · 3/5 Four-Eyes Principle · 4/5 Daily Settlement Audit · 3/5
✦ After: Automated Reconciliation (4/5) + Real-time Validation (4/5)
Capital Impact
0.62% ↓ from 1.41%
Expected Loss
€1.2M ↓ from €2.8M
Risk Tier
Tier 4 ↓ from Tier 2

Automated Reconciliation (4/5) + Real-time Validation (4/5) reduce capital impact by 56% — investment justified by risk reduction ROI of 6.2:1

TPPRisk Module — Provider Concentration & RoI Readiness (DORA Article 28)
ICT Provider Portfolio Snapshot
Provider
Critical Fns
P95 Exposure
Substitutability
Confidence
Cloud Hosting Primary
5
€8.4M
Low ZZ:x959
Medium
Payment Gateway
3
€6.1M
Medium ZZ:x960
High
Core Banking Vendor
2
€2.7M
Low ZZ:x959
High
Email Security
1
€0.4M
High ZZ:x962
High
Portfolio Metrics
UNION P95 across 16 providers€17.6M
Top Single-Provider P95€8.4M (47.7%)
Diversification Benefit€4.8M
CIF Contracts Without Exit Strategy1
DORA Register of Information
Completeness99.7%
Open Critical Validation Gaps0
Frozen Snapshot2026-Q2
Next SubmissionReady for CRO Approval
✦ With Cloud Hosting Diversification

Multi-region split + secondary provider arrangement reduces Cloud Hosting P95 to €3.6M (−57%); UNION P95 drops to €12.8M; CIF without exit strategy resolved.

Investment justified — concentration risk reduction ROI 4.8:1; submission timeline preserved.

Simplified scenarios. See your organisation's real risk profile with actual assets, processes, controls, and providers.

Request Early Access

See your organisation's risk
expressed as capital impact %.

Request early access and we'll show you how AIQ Suite quantifies your Cyber and Operational Risk in terms your board and regulators can act on.

Early access only
EU data centres On-prem option Configurable AI provider DORA + NIS2 + Basel III aligned
Priority access for banks, financial institutions, insurers, critical infrastructure and public sector organisations.