Calculator

Annual Loss Expectancy (ALE): Formula, Calculator & Examples

Annual loss expectancy is what makes cybersecurity risk legible to a CFO. It converts the abstract ('high risk') into the concrete ('$300,000 expected annual loss'). This guide covers the ALE formula, three worked examples showing the math in practice, how to use ALE for security budget decisions, and where basic ALE breaks down — at which point you graduate to Monte Carlo / FAIR-based modeling.

By Nick Shevelyov 8 min read

What annual loss expectancy is

Annual loss expectancy (ALE) is the expected financial loss from a specific cybersecurity risk over a one-year period. It's the foundational unit of quantitative risk analysis: a single dollar figure that turns "this risk is high" into "this risk costs us approximately $300,000 per year on average."

The point of ALE is to make risk decisions defensible in the language executive teams already use. Boards and CFOs allocate budget in dollars. Risk committees evaluate trade-offs in dollars. Cyber insurance carriers underwrite in dollars. A risk register with severity tiers (critical, high, medium, low) cannot answer the question "should we spend $200K on this remediation?" An ALE-based register can: if the ALE is $500K and the remediation is $200K, the math is straightforward.

The ALE formula

The basic ALE formula is straightforward enough to fit on one line:

ALE = SLE × ARO

Where SLE = Asset Value × Exposure Factor (the dollar loss from one occurrence)
and ARO = Annualized Rate of Occurrence (events per year, can be fractional).

Three inputs do all the work:

  • Asset Value (AV) — total replaceable value, including replacement cost, lost revenue during outage, remediation/recovery cost, and (where applicable) regulatory fines and customer notification costs.
  • Exposure Factor (EF) — percentage of asset value lost per occurrence (0.0 to 1.0). Ransomware encrypting a file server typically has EF 0.4–0.8; a single account compromise typically has EF 0.05–0.20.
  • Annualized Rate of Occurrence (ARO) — number of times per year the event occurs. Can be fractional: 0.5 means once every two years; 2.0 means twice per year. Sourced from historical data, threat intelligence feeds, or industry benchmarks.

Worked ALE calculator (3 examples)

The mechanics become clearer with examples. Three scenarios common to mid-market and enterprise organizations:

Example 1: Ransomware encrypting a file server

Asset Value (AV)$500,000 (server cost + 5 days downtime revenue + remediation)
Exposure Factor (EF)0.6 (60% of asset value lost per event)
SLE (AV × EF)$300,000
ARO0.2 (20% chance per year, once every 5 years)
ALE (SLE × ARO)$60,000 per year

Decision: spending up to $60K/year on ransomware-specific controls (EDR, backups, tabletop exercises) is justified by ALE.

Example 2: Phishing-driven account takeover

Asset Value (AV)$200,000 (incident response + customer notification + lost trust)
Exposure Factor (EF)1.0 (full asset cost realized per event)
SLE (AV × EF)$200,000
ARO1.5 (1.5 events per year based on historical pattern)
ALE (SLE × ARO)$300,000 per year

Decision: phishing-resistant MFA across the organization typically costs $50K–$100K/year and drops ARO toward zero. ALE delta justifies the investment several times over.

Example 3: DDoS on customer-facing portal

Asset Value (AV)$1,000,000 (one-day customer-portal revenue + SLA penalties)
Exposure Factor (EF)0.25 (25% of revenue lost per event, partial mitigation works)
SLE (AV × EF)$250,000
ARO2.0 (two events per year, growing trend)
ALE (SLE × ARO)$500,000 per year

Decision: DDoS protection from a CDN provider costs $25K–$100K/year and reduces both EF and ARO. The ROI math is unambiguous.

How to use ALE in practice

1. Prioritize remediation

Build your risk register with ALE as the primary sort column. Highest-ALE risks get worked first. This is the cleanest operational use of ALE — it produces a defensible work queue that the security team, engineering owners, and executive sponsors can all reference.

2. Justify security investments

Every security control reduces ALE by some amount — typically by lowering ARO, lowering EF, or both. Compute pre-remediation ALE and post-remediation ALE; the difference is the dollar risk reduction. Divide by the cost of the control to get ROI. CFOs accept this math because it matches how they evaluate any other investment.

3. Defend security budget

When the CFO asks "why $2M for cybersecurity?", ALE-based answers work where severity-based answers don't. "We have $8M of measured ALE across our risk register; the proposed program reduces it to $3M; the $5M reduction at $2M cost is positive expected value." This frames cybersecurity as risk-adjusted investment rather than insurance against the unknown.

4. Communicate with the board

Boards understand dollars. ALE-driven risk reporting maps cleanly to the board materials boards already consume. Quarterly ALE trend lines (total ALE rising, falling, by category) translate cybersecurity progress into a metric directors can govern against — replacing the heat-map dashboards they don't trust.

Limitations of basic ALE

Basic ALE has a known weakness: it uses point estimates for inputs. You don't actually know that Exposure Factor is exactly 0.6 — you know it's somewhere between maybe 0.4 and 0.8 depending on which day, which system, which attacker. Treating uncertain values as precise produces ALE numbers that look more confident than they are.

Three failure modes commonly arise:

  • False precision. ALE = $300,000 looks definitive but is sensitive to input assumptions that may vary by 50% in either direction. Decision-makers can over-rely on the number.
  • Anchor bias. The first ALE estimate gets anchored as "the answer," even when the underlying assumptions are revisited and changed.
  • Tail-risk blindness. ALE captures expected loss, not catastrophic-case loss. A risk with $50K expected loss but a 5% chance of $50M outcome looks small in ALE terms — but the tail risk is what kills companies.

The graduation path from basic ALE is FAIR-based modeling with Monte Carlo simulation. Instead of point estimates, FAIR uses probability distributions for each input — and the simulation runs thousands of scenarios to produce a loss distribution rather than a single number. The output is typically expressed as percentile loss (e.g., "50th percentile annual loss is $300K, 95th percentile is $2.5M"), which captures both expected loss and tail risk.

This is the methodology vCSO.ai's Theodolite implements — every finding from CSPM, DSPM, sensitive data discovery, and risk-based vulnerability management feeds into a Monte Carlo loss model that produces both expected and tail-risk estimates. The platform was built to close the gap between "we know basic ALE" and "we have audit-grade probabilistic risk quantification."


vCSO.ai is the operator-led cybersecurity advisory firm of Nick Shevelyov, former 15-year Chief Security Officer at Silicon Valley Bank. Theodolite, vCSO.ai's security platform, implements FAIR-based Monte Carlo risk quantification across CSPM, DSPM, sensitive data discovery, and risk-based vulnerability findings — translating technical findings into both expected loss and tail-risk estimates a board, CFO, or insurance underwriter can act on. Nick's book on cybersecurity strategy, Cyber War…and Peace, draws on three decades of operator experience.

Questions & answers

What is annual loss expectancy?

Annual loss expectancy (ALE) is the expected financial loss from a specific risk over a one-year period, calculated as Single Loss Expectancy (SLE) × Annualized Rate of Occurrence (ARO). ALE turns risk from a qualitative ranking ("high," "medium," "low") into a dollar figure that boards, CFOs, and risk committees can use for budget decisions. It's the foundational unit of quantitative cybersecurity risk analysis, used in FAIR (Factor Analysis of Information Risk) and adjacent methodologies.

What is the annual loss expectancy formula?

ALE = SLE × ARO. Where SLE (Single Loss Expectancy) = Asset Value × Exposure Factor — the dollar loss from one occurrence of the risk event. ARO (Annualized Rate of Occurrence) = the expected number of times per year the event occurs (can be fractional, e.g., 0.1 = once per 10 years). Multiply them and you get the annualized expected loss in dollars.

How do you calculate annual loss expectancy?

Five steps. (1) Identify the risk event (e.g., ransomware encrypting a file server). (2) Determine asset value (replacement cost + lost revenue + remediation cost). (3) Estimate exposure factor — what percentage of asset value is lost per event (often 30–80% for ransomware, varies for other events). (4) Estimate annualized rate of occurrence using historical data, threat intel, or industry benchmarks. (5) Multiply: ALE = (Asset Value × Exposure Factor) × ARO. The result is the dollar amount you'd "expect" to lose per year if you took no further action.

What are some examples of annual loss expectancy calculations?

Example 1 — Ransomware on a file server: Asset value $500K (replacement + downtime), exposure factor 60%, ARO 0.20 (20% chance per year). ALE = ($500K × 0.6) × 0.2 = $60K. Example 2 — Phishing-driven account takeover: Asset value $200K (incident response + customer notification), exposure factor 100%, ARO 1.5 (1.5 events per year). ALE = ($200K × 1.0) × 1.5 = $300K. Example 3 — DDoS on customer portal: Asset value $1M (downtime revenue), exposure factor 25%, ARO 2.0. ALE = ($1M × 0.25) × 2.0 = $500K. Worked examples on the page below show the math in detail.

How is ALE used in cybersecurity risk management?

Three primary uses. (1) Prioritize remediation — risks ranked by ALE descending become the work queue, with security spend allocated to highest-ALE items first. (2) Justify security investments — comparing pre-remediation ALE to post-remediation ALE quantifies the dollar risk reduction, which lets you compute ROI on security spend. (3) Communicate with executives and boards — ALE in dollars is the universal language for risk decisions, replacing severity ratings that don't translate to budget conversations.

What is the difference between ALE and SLE?

SLE (Single Loss Expectancy) is the cost of one occurrence of a risk event. ALE (Annualized Loss Expectancy) is the cost over a year, accounting for how often the event occurs. ALE = SLE × ARO. SLE answers "what does it cost when it happens?" ALE answers "what does it cost us per year on average?" Most decisions use ALE because annual budget cycles align with annualized risk; SLE is useful for sizing single-event impact (e.g., for breach insurance underwriting).

Is ALE the same as FAIR?

No. FAIR (Factor Analysis of Information Risk) is the methodology — a structured approach to decomposing risk into measurable components (threat event frequency, vulnerability, contact frequency, probability of action, magnitude of loss). ALE is one of the outputs FAIR produces. FAIR is more sophisticated than basic ALE calculations: it uses Monte Carlo simulation to model probability distributions rather than point estimates, capturing the uncertainty in each input. Basic ALE assumes you know the values precisely; FAIR-style analysis acknowledges you don't and produces a range of possible losses.

Ready to turn this into a working plan?

Nick's team helps growth-stage companies, PE/VC sponsors, and cybersecurity product teams translate security questions into board-ready decisions. First call is strategy, not vendor pitch.