Skip to main content

Cye Exposure Management Platform Glossary

Definitions of key terms used throughout the Cye Exposure Management Platform — your reference for clear, consistent language.

Updated today

Overview

This glossary explains the key concepts, terminology, and interface language used across the the Cye Exposure Management Platform platform. If you’re reading a report, configuring a mitigation plan, or exploring a dashboard and run into an unfamiliar term — this is the place to check. Think of it as your go-to reference for translating the Cye Exposure Management Platform’s insights into clear, actionable understanding.


Core Concepts & the Cye platform Lingo

This section covers the foundational language used across the Cye platform’s platform and documentation — from risk modeling to remediation logic. These terms appear everywhere, so it helps to get familiar.

(Each term includes a plain-language definition and how it’s used specifically in the Cye platform.)


Cost of Breach (CoB)

What it is: A monetary estimate of the potential damage caused by a cyberattack. Includes direct losses (e.g., regulatory fines, containment costs) and indirect impacts (e.g., brand damage, stock drops, customer churn).
In the Cye platform: Used throughout dashboards and reports to translate cyber risk into business terms. A core input in exposure calculations and mitigation prioritization.


Org. Attack Graph

What it is: A visual map of all possible attack paths to your critical business assets. Nodes = assets; edges = findings.
In the Cye platform: Core to risk analysis. the Cye platform calculates breach likelihood and builds mitigation strategies based on the graph.


Business Assets

What it is: The essential components of your organization — customer data, intellectual property, operational systems, etc.
In the Cye platform: Treated as “targets” in the Org. Attack Graph. All risk is measured in terms of potential impact to business assets.


Finding

What it is: A verified vulnerability or security issue tied to a specific asset. Includes probability of exploitation, severity, and mitigation steps.
In the Cye platform: The building blocks of risk. Findings drive exposure, show up in dashboards, and feed directly into mitigation logic.


Risk

What it is: The combined likelihood and potential business impact of a breach.
In the Cye platform: Always tied to a business asset and one or more findings. Visualized throughout reports and used to prioritize actions.


Cyber Risk Quantification (CRQ)

What it is: A method for converting cybersecurity risk into measurable financial impact.
In the Cye platform: Combines graph-based likelihood with CoB data to create dollar-based risk metrics. Bridges technical and executive insights.


Mitigation Plan

What it is: A prioritized list of actions to reduce cyber risk.
In the Cye platform: Generated automatically using optimization logic. Includes findings to fix, order of operations, and expected impact.


Exposure

What it is: How much risk your organization currently faces — expressed in potential financial loss.
In the Cye platform: A top-level dashboard metric. You can break it down by asset, industry, mitigation status, or over time.


Maturity

What it is: A score for your cybersecurity program’s strength across tools, processes, and policies.
In the Cye platform: Based on the NIST framework. Appears in Executive and Maturity Reports to reflect overall readiness.


Likelihood

What it is: Probability that a specific attack path will succeed.
In the Cye platform: Based on statistical models derived from the Org. Attack Graph. Affects risk scores for each business asset.


NIST Functions

What it is: Five cybersecurity pillars: Identify, Protect, Detect, Respond, Recover.
In the Cye platform: Used to score maturity, classify findings, and structure mitigation strategies.


Attack Routes

What it is: Potential paths from an entry point to your assets, composed of findings and intermediate footholds.
In the Cye platform: Displayed in the Org. Attack Graph, with associated risk scores and priority indicators.


Residual Risk

What it is: Risk that remains even after you’ve mitigated everything possible.
In the Cye platform: Reflected in exposure trends and reports. A reminder that no system is ever 100% risk-free.


Reputation

What it is: Long-term brand or trust damage following a breach.
In the Cye platform: Modeled as part of the Cost of Breach. Based on industry benchmarks and past incidents.


Exposure Reduction

What it is: The drop in total risk after applying a mitigation plan.
In the Cye platform: Displayed as the difference between original and current exposure. Key for showing ROI.


Critical to Block

What it is: A finding or path that must be mitigated to stop high-risk attacks.
In the Cye platform: Automatically flagged. Represents high-impact, low-effort remediation.


Potential

What it is: A suspected — but not yet validated — issue.
In the Cye platform: Tracked separately from confirmed findings. Doesn’t affect core risk scores unless verified.


Capability

What it is: The attacker’s practical ability to exploit a vulnerability.
In the Cye platform: Affects probability scores and mitigation priorities, based on red team data and threat intel.


RBAC (Role-Based Access Control)

What it is: Permission management based on roles, not individuals.
In the Cye platform: Governs access to findings, reports, user actions — essential for large teams.


MFA (Multi-Factor Authentication)

What it is: Verifying identity with multiple factors (e.g., password + device).
In the Cye platform: Recommended during onboarding to prevent unauthorized logins.


SIEM

What it is: Security Information and Event Management — collects and correlates security data.
In the Cye platform: the Cye platform findings often feed into SIEM tools for broader monitoring.


2FA (Two-Factor Authentication)

What it is: A simpler version of MFA (usually password + SMS/email code).
In the Cye platform: Functions the same as MFA and is enforced for added login protection.


WAF (Web Application Firewall)

What it is: Filters traffic between a web app and the internet.
In the Cye platform: Frequently mentioned in remediation steps. Not part of the platform, but often used alongside it.


OpSec

What it is: Operational security — protecting sensitive info from leaking due to carelessness.
In the Cye platform: Findings related to behavior, config errors, or human error often fall under OpSec.


Audit Log

What it is: A timestamped record of all user actions.
In the Cye platform: Tracks logins, settings, mitigation steps — useful for compliance and investigation.


SCADA

What it is: Industrial systems that control infrastructure (e.g., water plants, power grids).
In the Cye platform: Rare but high-priority. SCADA-related findings are treated with heightened sensitivity.


PII

What it is: Personally Identifiable Information — names, IDs, emails, etc.
In the Cye platform: Treated as business-critical assets. Breaches involving PII greatly increase the Cost of Breach.


OWASP

What it is: A nonprofit that maintains a list of top web app vulnerabilities.
In the Cye platform: Findings are categorized against OWASP benchmarks to flag serious weaknesses.


Interface-Derived Terms

These terms are sourced from the Cye platform’s dashboards, views, and reports — including Risk, Findings, Org. Attack Graph, Maturity, Cost of Breach, and more.


Govern (NIST Function)

Definition: An emerging sixth pillar (alongside Identify, Protect, etc.) focused on cybersecurity oversight, policies, and risk governance.
Usage in the Cye platform: Appears in assessments and dashboards to frame policy ownership and oversight.
Use it when: Referring to high-level governance activities or reporting structures.


Business Assets Importance Ranking

Definition: A ranked view of business assets based on Likelihood, Exposure, and Cost of Breach.
Usage in the Cye platform: Helps identify which assets require urgent attention.
Use it when: Describing prioritization methods for asset protection.


Threats to Business Assets

Definition: A graphical breakdown of threats by actor type (e.g., insider, external).
Usage in the Cye platform: Helps visualize risk origins and threat vectors.
Use it when: Showing directional threats or threat categories.


Mitigation Success Trends

Definition: A timeline of mitigation impact — including efficiency, exposure drop, and breach cost savings.
Usage in the Cye platform: Tracks long-term performance of mitigation efforts.
Use it when: Communicating effectiveness over time.


Findings in Process

Definition: A visual summary of findings by status (Open, Fixed, In Progress, etc.) and severity.
Usage in the Cye platform: Appears as bar charts and dashboards.
Use it when: Reviewing remediation progress or bottlenecks.


Refined by % (Mitigation Optimization)

Definition: The % improvement achieved through optimization efforts.
Usage in the Cye platform: Highlights progress made in exposure/risk via mitigation.
Use it when: Quantifying ROI or progress.


Mitigation Efficiency

Definition: A measure of how effective a mitigation is relative to its effort and cost.
Usage in the Cye platform: Prioritizes high-impact, low-effort fixes.
Use it when: Comparing tradeoffs across remediation plans.


Findings Dashboard Terms

Finding Distribution

Definition: A breakdown of findings by severity and status.
Usage in the Cye platform: Displayed as visualizations and tables.
Use it when: Summarizing overall risk posture or workload.


Created vs. Fixed Findings Trends

Definition: A chart showing how fast new findings are created vs. fixed.
Usage in the Cye platform: Indicates remediation velocity and backlog trends.
Use it when: Evaluating team performance or capacity.


Finding Distribution by MITRE ATT&CK

Definition: Maps findings to MITRE attack stages (e.g., Persistence, Lateral Movement).
Usage in the Cye platform: Aligns findings with real-world attacker tactics.
Use it when: Planning defenses or explaining exploit chains.


Top Findings to Block

Definition: The most urgent findings based on risk, cost, and likelihood.
Usage in the Cye platform: Displayed in dashboards to highlight priorities.
Use it when: Triage or remediation prioritization.


Security Domain

Definition: The area of security a finding affects (e.g., Network, Identity).
Usage in the Cye platform: Used for grouping, filtering, and dashboards.
Use it when: Reviewing domain-specific issues.


Asset Discovery Summary

Definition: A visual snapshot of all discovered assets and their relevance.
Usage in the Cye platform: Helps scope engagements and track asset coverage.
Use it when: Explaining digital footprint or attack surface.


the Cye platform Trending Findings

Definition: Findings that are common or increasing across organizations.
Usage in the Cye platform: Benchmarking and threat awareness.
Use it when: Comparing internal risk to industry patterns.


Cost Level

Definition: An estimate of how expensive it is to fix a finding (symbolized as $, $$, etc.).
Usage in the Cye platform: Helps with budgeting and planning.
Use it when: Scoping cost-effort tradeoffs.


Effort Level

Definition: A rough estimate of how hard it is to fix a finding (e.g., Low, Medium, High).
Usage in the Cye platform: Supports triage and capacity planning.
Use it when: Prioritizing high-impact, low-effort fixes.


Max Probability

Definition: The highest likelihood a finding will be exploited.
Usage in the Cye platform: A key factor in risk scoring and urgency.
Use it when: Prioritizing what needs to be addressed first.


Org. Attack Graph Terms

Org. Attack Graph

Definition: A dynamic visual showing how assets, findings, and attack routes are connected.
Usage in the Cye platform: Central to planning which findings to fix and how to cut off attack paths.
Use it when: Explaining threat flow or risk modeling.


Positions

Definition: Intermediate points in attack routes, often representing attacker footholds.
Usage in the Cye platform: Help segment and analyze the attack chain.
Use it when: Mapping progression or lateral movement.


Max Probability (per finding)

Definition: The highest chance that a specific finding could be exploited.
Usage in the Cye platform: Visual overlays highlight high-risk nodes in the graph.
Use it when: Prioritizing critical issues.


Graph Visualizer

Definition: The interface used to explore and interact with the Org. Attack Graph.
Usage in the Cye platform: Enables filtering, zooming, and investigation.
Use it when: Navigating threat scenarios or identifying risk chokepoints.


Edit Graph

Definition: A feature for authorized users to manually adjust the Org. Attack Graph.
Usage in the Cye platform: Reflects exceptions or real-world customizations.
Use it when: Making manual adjustments to attack models.


Permission-Based Visibility

Definition: Limits what users can see in the graph based on their roles.
Usage in the Cye platform: Ensures proper access control.
Use it when: Explaining UI behavior or access restrictions.


Role-Based Access Control (RBAC)

Definition: Assigns permissions based on user roles, not individuals.
Usage in the Cye platform: Manages access to findings, reports, and graph editing.
Use it when: Discussing security, roles, or admin setup.


Maturity Terms

Organization Maturity

Definition: A high-level score of your overall cybersecurity posture.
Usage in the Cye platform: Visualized in dashboards and reports.
Use it when: Communicating readiness or benchmarking.


Target Maturity

Definition: The maturity level you aim to reach, based on business needs.
Usage in the Cye platform: Shown alongside current scores to highlight gaps.
Use it when: Planning improvement strategies.


Subcategories (within NIST Functions)

Definition: Detailed categories under each core NIST function (e.g., Asset Management under Identify).
Usage in the Cye platform: Scored individually to build up maturity ratings.
Use it when: Drilling into capabilities or weaknesses.


Maturity Levels (1–5)

Definition: A five-point scale measuring how well controls are implemented.
Usage in the Cye platform: Used in dashboards and benchmarks.
Use it when: Explaining progress or comparing teams.


Maturity Assessment Guide

Definition: Documentation explaining how maturity is calculated.
Usage in the Cye platform: Linked directly from dashboards.
Use it when: Providing scoring transparency.


Findings in Mitigation Plans

Definition: The number of findings actively included in mitigation plans.
Usage in the Cye platform: Helps tie maturity improvement to action.
Use it when: Connecting plans to progress.


Cost of Breach Terms

Cost of Breach Calculator

Definition: A tool that estimates the financial impact of a potential breach.
Usage in the Cye platform: Supports budgeting and business decision-making.
Use it when: Discussing risk in financial terms.


Breakdown by Business Assets

Definition: A view that shows breach cost per asset category (e.g., IP, Reputation).
Usage in the Cye platform: Prioritizes risk based on business impact.
Use it when: Aligning mitigation with business priorities.


Breakdown by First & Third Party

Definition: Separates internal vs. external (third-party) breach costs.
Usage in the Cye platform: Helps distinguish operational vs. vendor-related risk.
Use it when: Managing vendor exposure or insurance needs.


Automatically Updated (per asset)

Definition: Real-time recalculation of breach costs based on current data.
Usage in the Cye platform: Keeps metrics accurate as assets evolve.
Use it when: Explaining data refresh cycles.


Reputation, Intellectual Property, Customer Info, etc.

Definition: Categories of business assets that drive breach cost estimates.
Usage in the Cye platform: Central to CoB modeling and prioritization.
Use it when: Discussing asset value and impact.


Plans Terms

Mitigation Plan

Definition: A formal plan to reduce risk by addressing specific findings.
Usage in the Cye platform: Includes objectives, timelines, and affected assets.
Use it when: Describing how remediation is structured.


Exposure Reduction

Definition: The risk decrease if a mitigation plan is executed.
Usage in the Cye platform: Shown in dollar value per plan.
Use it when: Communicating plan ROI.


Business Asset Protection

Definition: The specific asset a plan is meant to safeguard.
Usage in the Cye platform: Helps filter and prioritize plans.
Use it when: Linking actions to business outcomes.


Security Domain

Definition: The technical area a plan addresses (e.g., Network, Identity).
Usage in the Cye platform: Used for classification and grouping.
Use it when: Filtering or assigning tasks.


Mitigation Progress

Definition: Shows how much of a plan has been completed (e.g., 40%).
Usage in the Cye platform: Tracks progress toward closure.
Use it when: Monitoring operational execution.


Critical to Block

Definition: Key findings that must be remediated for a plan to succeed.
Usage in the Cye platform: Used as a threshold or validation checkpoint.
Use it when: Prioritizing essential fixes.


Remediation Assets

Definition: Assets directly affected by a mitigation plan.
Usage in the Cye platform: Helps scope the effort and assign work.
Use it when: Planning resource use.


Plan Status

Definition: The current lifecycle state (In Progress, Completed, etc.).
Usage in the Cye platform: Enables tracking and reporting.
Use it when: Managing active work.


Created By, Modification Date, System ID

Definition: Metadata for who made a plan and when.
Usage in the Cye platform: Helps with versioning and governance.
Use it when: Auditing or reviewing history.


Assets Terms

Asset

Definition: A system component relevant to security — host, service, permission, etc.
Usage in the Cye platform: Central to findings, mitigation, and risk calculations.
Use it when: Mapping the attack surface.


Asset Type

Definition: The category an asset falls under (e.g., AD Certificate Template).
Usage in the Cye platform: Used for filtering and organizing.
Use it when: Tailoring views or controls.


Importance

Definition: A visual score for how critical the asset is.
Usage in the Cye platform: Impacts business risk and prioritization.
Use it when: Making risk-based decisions.


Has CVEs?

Definition: Whether the asset has known public vulnerabilities.
Usage in the Cye platform: Flags high-risk components.
Use it when: Filtering or prioritizing patches.


Relevancy

Definition: Whether an asset is considered in-scope for risk.
Usage in the Cye platform: Helps focus analysis.
Use it when: Narrowing engagement scope.


Tags

Definition: Custom labels assigned to assets.
Usage in the Cye platform: Used for sorting and grouping.
Use it when: Creating custom filters or dashboards.


Related Entities, Activity, Properties

Definition: Metadata showing how an asset connects and behaves.
Usage in the Cye platform: Helps validate attack paths and dependencies.
Use it when: Investigating relationships or forensic context.


Engagements (linked to asset)

Definition: The projects an asset is part of.
Usage in the Cye platform: Indicates scope and findings context.
Use it when: Tracking which work involves which assets.


Engagements Terms

Engagement

Definition: A defined project or assessment in the Cye platform.
Usage in the Cye platform: Contains assets, findings, and plans.
Use it when: Scoping or managing client work.


Engagement Type

Definition: The engagement’s category (e.g., Application, VIP).
Usage in the Cye platform: Routes engagements to appropriate flows.
Use it when: Filtering or organizing work.


Engagement Status

Definition: Current state of the engagement (e.g., Active, Waiting).
Usage in the Cye platform: Tracks lifecycle and readiness.
Use it when: Reviewing pipeline or assignment.


Recurring Frequency

Definition: Whether the engagement is one-time or repeated.
Usage in the Cye platform: Supports automation and planning.
Use it when: Coordinating timelines.


Start Date / End Date

Definition: When the engagement is active.
Usage in the Cye platform: Used for audits, timelines, and baselines.
Use it when: Reporting or reviewing history.


Findings Counter

Definition: Number of findings associated with an engagement.
Usage in the Cye platform: Indicates size and scope.
Use it when: Tracking assessment coverage.


Engagements – Assets, Findings, Mitigation Plans

Definition: The foundational trio that defines each engagement.
Usage in the Cye platform: Structures all risk analysis and reporting.
Use it when: Explaining engagement workflows.


Reports Terms

Report Templates

Definition: Predefined layouts for maturity, risk, and remediation reports.
Usage in the Cye platform: Used to standardize communication.
Use it when: Automating report generation.


Executive Report

Definition: A high-level summary of risk, exposure, and maturity.
Usage in the Cye platform: Created for leadership and board use.
Use it when: Summarizing top-line progress.


Template Preview

Definition: Lets you view a report’s structure before using it.
Usage in the Cye platform: Prevents formatting mistakes.
Use it when: Planning report edits or duplications.


Report Schedule / Automation

Definition: Automates delivery of reports on a regular cadence.
Usage in the Cye platform: Used for stakeholder updates and compliance.
Use it when: Reducing manual tasks.


Maturity Metrics (in Executive Report)

Definition: Key maturity scores shown in executive summaries.
Usage in the Cye platform: Highlights cybersecurity posture at a glance.
Use it when: Reporting trends or benchmarking.


Trends (in Executive Report)

Definition: Time-based views of exposure, findings, or maturity.
Usage in the Cye platform: Shows before-and-after progress.
Use it when: Justifying ongoing investments.


Wrap-up

Feel free to explore the terms at your own pace — no need to read it all in one go.
Bookmark this glossary and come back anytime you need to decode something in the Cye platform.

Did this answer your question?