In a large enterprise environment, the Chief Information Security Officer (CISO) is conducting a comprehensive risk assessment to identify potential threats and vulnerabilities. As part of the assessment, the CISO is focusing on the business impact analysis of a new system deployment that will handle highly sensitive customer data. The CISO needs to determine the potential financial losses associated with a data breach on this system. Which risk assessment methodology should the CISO use to quantify the financial impact accurately?