Digital Risk: Enterprises Need More Than Cyber Insurance
Threatonomics

Breach and Attack Simulations: A Proactive Approach to Loss Prevention 

These simple but informative tests are like having a pen tester in your back pocket.

by Justin shattuck , Chief Information Security Officer
Published

Today’s CISOs and risk managers need to see around corners to proactively reduce risks before they turn into losses. Increasingly, CISOs also answer directly to the board of directors. No matter how tight you think your controls are or how big your budget is, I promise you things are happening in your environment that you do not know about. 

After decades as a network and security engineer and helping clients at Resilience, I know that we cannot help clients avoid all threats, but we can make them resilient to material losses.  Unlike legacy insurance providers, we provide clients with cyber insurance and a security solution that uses real loss data and data collected through our engagements to help you make better decisions about reducing cyber risk. 

We do this through continuous engagement with our clients. Rather than checking in with you once a year with a huge questionnaire, we engage with our clients more frequently to better understand their environment and give them ongoing actionable insights they can use to improve their risk posture. 

And now, with the latest release of our Essential Solution for loss prevention and our Edge Solutions for cyber risk management, we are introducing Breach & Attack Simulations and our Cyber Risk Profile Builder to help organizations take a proactive stance on risk management.  

Breach & Attack Simulation is a simple way to gather vital information to improve your cyber resilience. You can easily run a realistic simulation of the threat actors’ tactics, techniques, and procedures (TTPs)  within your environment(s) securely to assess your internal security processes, test and validate your existing controls, identify misconfigurations, and further refine improvements to your security program. 

Every team I have worked with has learned something new through the process. It’s like running a free tabletop exercise as existing controls and processes are tested, providing an opportunity to review and understand if your program is performing as expected.

One Resilience client found that their firewall configuration was leaving assets exposed to the internet; another found an obfuscated variant of Mimikatz in their environment that Microsoft Defender had not discovered despite its known availability to threat actors. 

Yet another client was unaware that their EDR was misconfigured for a subset of their endpoints. However, they identified it by conducting proactive tests in their environment. These kinds of issues are not uncommon, but they may not be captured by systems or testing.

More about Breach and Attack Simulation (BAS)

Resilience Breach and Attack Simulations (BAS), powered by AttackIQ, are a proactive approach to cybersecurity assessment that involves simulating real-world cyber attacks to identify vulnerabilities and weaknesses in an organization’s defenses. Unlike traditional security assessments, BAS goes beyond theoretical evaluations by replicating the TTPs used by actual threat actors. By doing so, BAS provides valuable insights into an organization’s security posture and helps identify areas for improvement. 

Our BAS testing includes:

  • Baseline Tests validate the effectiveness of clients’ security controls against modern malicious tactics. Our Essential Solution provides access to up to four (4) security baseline tests to assess controls against modern threats.  These tests do not require elevated privileges and run within an isolated environment that is removed at the conclusion of the test:
    • Content Filter: The Content Filtering test suite includes scenarios designed to assess the effectiveness of security technologies responsible for inspecting web-based traffic originating from the internal network. 
    • Endpoint Antivirus: This assessment package includes a selection of scenarios designed to test anti-virus (AV) efficacy with common ransomware, malware, and virus samples. It also includes “hacker tools,” which commonly evade AV detection.
    • Endpoint EDR: Scenarios included in the EDR test suite include adversarial behaviors specifically designed to elicit a response from a behavior-based endpoint protection technology. 
    • NextGen Firewall: This assessment evaluates the NGFW’s ability to prevent breaches and detect advanced threats, provide comprehensive network visibility and contextual awareness, and enable secure networking and convergence.

By integrating BAS testing into our risk quantification models, we provide clients with a comprehensive approach to cybersecurity risk management that empowers them to strengthen their defenses, mitigate vulnerabilities, and minimize the impact of cyber threats on their operations.

Learn more about Breach and Attack Simulation 

Breach and Attack Simulations (BAS) are a valuable tool for cyber insurance professionals looking to enhance their clients’ cybersecurity resilience. Incorporating BAS into service offerings enables more precise risk assessments, promotes proactive loss prevention measures, and helps clients gain a competitive advantage in the market. 

To learn more about BAS and all the new feature updates for the Resilience Essential and Edge Solutions, sign up for our free webinar today.

You might also like

What is the ROC?

The cybersecurity industry thrives on headlines. A major software vulnerability, a ransomware attack, or a widespread outage—each event sends ripples of concern through the digital ecosystem, often accompanied by a rush to assign blame and predict catastrophic consequences.  However, the reality of cyber risk is far more nuanced than these attention-grabbing headlines suggest. The key […]

Quantifying cyber risk for strategic business alignment

In Resilience’s recent webinar, “Quantifying Cyber Risk for Strategic Business Alignment,” (which I hosted along with my colleagues Eric Woelfel, Senior Cybersecurity Engineer, and Erica Leise, Senior Security Engineer) we wanted to tackle a common—and often limiting—mindset in cybersecurity. It’s a mindset I’ve seen again and again in my decade and half building machine learning […]

Ransomware and third-party breaches are driving material cyber losses

Cyber risk isn’t just evolving—it’s accelerating. And for CISOs and CROs, this shift presents a critical challenge: how to make smarter business decisions that strengthen resilience and reduce material losses. As reported in our 2024 Mid-Year Cyber Risk Report, the past year saw a dramatic shift in how businesses experience and respond to cyber threats, […]

Understanding the Digital Operational Resilience Act (DORA)

The financial sector is facing an unprecedented convergence of cyber threats, regulatory pressure, and digital transformation. The European Union’s Digital Operational Resilience Act (DORA), which took full effect on January 17, 2025, is a defining moment for financial institutions. It requires firms to prepare for, withstand, and recover from cyber threats to ensure stability in […]

Protecting your organization from dark web threats

As a Senior Threat Analyst at Resilience, I’ve observed firsthand how the dark web’s evolving landscape poses growing risks to organizations’ data and reputation. Threat actors are increasingly utilizing advanced tools and AI to scale operations and increase attack efficiency, creating unprecedented challenges for business security.  But what does that mean for you? Here are […]

Why the OODA loop matters for cybersecurity

In 2004 as I prepared to board a flight to Tokyo, I strolled through a bookstore in ATL’s international concourse looking for something to occupy my mind during the 14 hour flight. Just as I was about to head to my gate empty-handed, I noticed a book that I had just read a review about […]