- Program/Posture Assessment
- Controls Validation
- Adversary Simulation
- Adversary Emulation ^not the same^
(I liken this to The Game by Michael Douglas)
imdb.com/title/tt011917…
Compared to a strong program, where cat/mouse games and even specific adversary emulation is valuable.
Then the business may think: "Our security is great, we don't need to change a thing. De-prioritize security projects."
(And yes, red teams are defenders first.)
I can tell an IT Exec in advance roughly how we will breach them. Won't matter. Human nature & these biases will result in "that won't happen to us" mentality.
If we actually DO IT first, then the biases are eliminated (mostly).