Measure changing cyber risk with practical weighted analytics. Visualize direction, volatility, and exposure across periods. Turn scattered security data into clearer action-ready trend insight.
| Period | Threat | Vulnerability | Impact | Asset | Control % | Incidents |
|---|---|---|---|---|---|---|
| Q1 | 7.0 | 6.0 | 8.0 | 8.0 | 62.0 | 2.0 |
| Q2 | 7.5 | 6.5 | 8.0 | 8.0 | 60.0 | 3.0 |
| Q3 | 8.0 | 7.0 | 8.5 | 8.5 | 57.0 | 4.0 |
| Q4 | 7.2 | 6.4 | 8.1 | 8.3 | 66.0 | 2.0 |
| Q5 | 6.8 | 6.1 | 7.8 | 8.0 | 71.0 | 1.0 |
| Q6 | 6.5 | 5.8 | 7.6 | 7.8 | 74.0 | 1.0 |
Tip: Leave the sample values in place and press the submit button to instantly test the calculator.
Risk bands used here are Low under 4.00, Medium from 4.00 to 5.99, High from 6.00 to 7.49, and Critical from 7.50 upward.
It measures how residual cybersecurity risk changes across several reporting periods. It combines weighted threat, vulnerability, impact, asset criticality, incident pressure, and control effectiveness into a trend-focused risk series.
Normalization keeps the scoring model consistent, even when your custom weight values do not sum to 1. This lets you focus on relative importance rather than manual balancing.
Control dampening determines how strongly control effectiveness reduces the base score. A higher dampening value means strong controls have more impact on lowering residual risk.
The cap prevents unusually high incident counts from dominating the model. It keeps the score useful when one period has an extreme spike or a logging anomaly.
The slope measures directional change over time. Positive slopes suggest rising risk, negative slopes suggest improvement, and values near zero indicate a relatively stable series.
Volatility shows how uneven the risk series is. Higher volatility means larger swings between periods, which may signal unstable controls, inconsistent exposure, or changing threat conditions.
No. It is a simple next-period estimate based on linear regression. It is useful for planning, but it should support—not replace—expert judgment and current threat intelligence.
Yes. The period labels are flexible. You can use months, quarters, sprints, audit windows, or any sequential review cycle that fits your security reporting process.
Important Note: All the Calculators listed in this site are for educational purpose only and we do not guarentee the accuracy of results. Please do consult with other sources as well.