Overview
This article explains how maturity factors affect Hyver’s Cost of Breach V2 (CoB v2) calculations. You’ll learn how to access the filtered view of relevant NIST CSF subcategories, review their scores, and understand how they shape your organization's estimated financial exposure.
What Are Maturity Factors?
In CoB v2, Hyver uses your organization’s Maturity Assessment — specifically scores from the NIST Cybersecurity Framework (CSF) subcategories — to refine breach impact estimates.
Each subcategory reflects real-world capabilities, technologies, and processes that reduce or amplify breach costs. The more mature your posture, the lower your estimated risk impact.
Accessing the Maturity Factors Tab
And then:
This view shows only the subcategories that directly influence Cost of Breach calculations.
What to Look For
In the filtered maturity view, you’ll see:
Subcategory scores (from 1 to 5) for each relevant NIST CSF area
Any unscored or low-scoring categories that may weaken your posture
A direct connection between evidence-based maturity ratings and breach cost outcomes
Use this view to quickly identify weaknesses that could be inflating your organization’s Cost of Breach estimate.
How It Affects CoB Calculations
Each subcategory contributes to your overall maturity score, which Hyver uses to:
Adjust breach cost predictions
Factor in the likelihood and impact of attack scenarios
Improve precision by grounding results in operational readiness
Findings (open issues) also influence subcategory scores — so your current remediation status has a direct effect on CoB outputs.
Important notes
Only the relevant subcategories are shown in this filtered view
Low or missing scores can inflate breach cost estimates — be sure to update them
Use [Rating a Subcategory (CSF 2.0)] or [Rating a Subcategory (CSF 1.1)] to guide your updates
Wrap-up / Next Steps
Maturity isn’t just a side metric — in CoB, it’s a core part of how risk is calculated. Keep your subcategory scores current and evidence-based to ensure that breach cost estimates truly reflect your real-world security posture.


