Digital Risk: Enterprises Need More Than Cyber Insurance

Breach and Attack Simulations: A Proactive Approach to Loss Prevention 

These simple but informative tests are like having a pen tester in your back pocket.

by Justin shattuck , Chief Information Security Officer

Today’s CISOs and risk managers need to see around corners to proactively reduce risks before they turn into losses. Increasingly, CISOs also answer directly to the board of directors. No matter how tight you think your controls are or how big your budget is, I promise you things are happening in your environment that you do not know about. 

After decades as a network and security engineer and helping clients at Resilience, I know that we cannot help clients avoid all threats, but we can make them resilient to material losses.  Unlike legacy insurance providers, we provide clients with cyber insurance and a security solution that uses real loss data and data collected through our engagements to help you make better decisions about reducing cyber risk. 

We do this through continuous engagement with our clients. Rather than checking in with you once a year with a huge questionnaire, we engage with our clients more frequently to better understand their environment and give them ongoing actionable insights they can use to improve their risk posture. 

And now, with the latest release of our Essential Solution for loss prevention and our Edge Solutions for cyber risk management, we are introducing Breach & Attack Simulations and our Cyber Risk Profile Builder to help organizations take a proactive stance on risk management.  

Breach & Attack Simulation is a simple way to gather vital information to improve your cyber resilience. You can easily run a realistic simulation of the threat actors’ tactics, techniques, and procedures (TTPs)  within your environment(s) securely to assess your internal security processes, test and validate your existing controls, identify misconfigurations, and further refine improvements to your security program. 

Every team I have worked with has learned something new through the process. It’s like running a free tabletop exercise as existing controls and processes are tested, providing an opportunity to review and understand if your program is performing as expected.

One Resilience client found that their firewall configuration was leaving assets exposed to the internet; another found an obfuscated variant of Mimikatz in their environment that Microsoft Defender had not discovered despite its known availability to threat actors. 

Yet another client was unaware that their EDR was misconfigured for a subset of their endpoints. However, they identified it by conducting proactive tests in their environment. These kinds of issues are not uncommon, but they may not be captured by systems or testing.

More about Breach and Attack Simulation (BAS)

Resilience Breach and Attack Simulations (BAS), powered by AttackIQ, are a proactive approach to cybersecurity assessment that involves simulating real-world cyber attacks to identify vulnerabilities and weaknesses in an organization’s defenses. Unlike traditional security assessments, BAS goes beyond theoretical evaluations by replicating the TTPs used by actual threat actors. By doing so, BAS provides valuable insights into an organization’s security posture and helps identify areas for improvement. 

Our BAS testing includes:

  • Baseline Tests validate the effectiveness of clients’ security controls against modern malicious tactics. Our Essential Solution provides access to up to four (4) security baseline tests to assess controls against modern threats.  These tests do not require elevated privileges and run within an isolated environment that is removed at the conclusion of the test:
    • Content Filter: The Content Filtering test suite includes scenarios designed to assess the effectiveness of security technologies responsible for inspecting web-based traffic originating from the internal network. 
    • Endpoint Antivirus: This assessment package includes a selection of scenarios designed to test anti-virus (AV) efficacy with common ransomware, malware, and virus samples. It also includes “hacker tools,” which commonly evade AV detection.
    • Endpoint EDR: Scenarios included in the EDR test suite include adversarial behaviors specifically designed to elicit a response from a behavior-based endpoint protection technology. 
    • NextGen Firewall: This assessment evaluates the NGFW’s ability to prevent breaches and detect advanced threats, provide comprehensive network visibility and contextual awareness, and enable secure networking and convergence.

By integrating BAS testing into our risk quantification models, we provide clients with a comprehensive approach to cybersecurity risk management that empowers them to strengthen their defenses, mitigate vulnerabilities, and minimize the impact of cyber threats on their operations.

Learn more about Breach and Attack Simulation 

Breach and Attack Simulations (BAS) are a valuable tool for cyber insurance professionals looking to enhance their clients’ cybersecurity resilience. Incorporating BAS into service offerings enables more precise risk assessments, promotes proactive loss prevention measures, and helps clients gain a competitive advantage in the market. 

To learn more about BAS and all the new feature updates for the Resilience Essential and Edge Solutions, sign up for our free webinar today.

You might also like

Are You Board Ready? Five Takeaways from Our Panel at RSA

RSA is in the rearview mirror, but we’re still thinking about all the great things we learned by mingling with our peers. We were honored to host an engaged group of attendees as founder Raj Shah moderated a panel discussion entitled “Are you board ready.” Resilience advisor Richard Siersen, Stanley Black & Decker CISO Lucia […]

Resilience Threat Researchers Identify New Campaigns from Scattered Spider

Following their attacks on MGM and Caesars’ casinos, threat actor group Scattered Spider is believed to be behind attacks on multiple companies in the finance and insurance industries. Using convincing lookalike domains and login pages as well as efficiently timed attacks, the group is aggressively targeting a wider array of companies. We have also observed […]

Seven Essential Steps to Vulnerability Management: Learnings from the Ivanti Exposures  

In light of the most recent Ivanti vulnerability, the importance of a robust vulnerability management strategy and incident response plan has never been clearer.  The Ivanti vulnerabilities, particularly CVE-2024-22024, unveiled on February 8th, 2024, serve as a stark reminder of the relentless nature of cyber threats. These vulnerabilities, which allow unauthenticated, remote attackers to access […]

Five Predictions on the State of Cyber Claims in 2024

Unravel the complexities of cyber risk with the 2023 Mid-Year Claims Report by Resilience. Dive into our analysis and predictions for the cyber insurance industry in 2024, including the pivotal role of AI and regulatory changes.