Safety would not fail on the level of breach. It fails on the level of influence.
That line set the tone for this yr’s Picus Breach and Simulation (BAS) Summit, the place researchers, practitioners, and CISOs all echoed the identical theme: cyber protection is not about prediction. It is about proof.
When a brand new exploit drops, scanners scour the web in minutes. As soon as attackers achieve a foothold, lateral motion typically follows simply as quick. In case your controls have not been examined towards the precise methods in play, you are not defending, you are hoping issues do not go critically pear-shaped.
That is why stress builds lengthy earlier than an incident report is written. The identical hour an exploit hits Twitter, a boardroom needs solutions. As one speaker put it, “You may’t inform the board, ‘I will have a solution subsequent week.’ We now have hours, not days.”
BAS has outgrown its compliance roots and change into the day by day voltage check of cybersecurity, the present you run by means of your stack to see what really holds.
This text is not a pitch or a walkthrough. It is a recap of what got here up on stage, in essence, how BAS has developed from an annual checkbox exercise to a easy and efficient on a regular basis means of proving that your defenses are literally working.
Safety is not about design, it is about response
For many years, safety was handled like structure: design, construct, examine, certify. A guidelines method constructed on plans and paperwork.
Attackers by no means agreed to that plan, nevertheless. They deal with protection like physics, making use of steady stress till one thing bends or breaks. They do not care what the blueprint says; they care the place the construction fails.
Pentests nonetheless matter, however they’re snapshots in movement.
BAS modified that equation. It would not certify a design; it stress-tests the response. It runs protected, managed adversarial behaviors in stay environments to show whether or not defenses really reply as they need to or not.
As Chris Dale, Principal Teacher at SANS, explains: The distinction is mechanical: BAS measures response, not potential. It would not ask, “The place are the vulnerabilities?” however “What occurs once we hit them?”
As a result of in the end, you do not lose when a breach occurs, you lose when the influence of that breach lands.
Actual protection begins with figuring out your self
Earlier than you emulate/simulate the enemy, you must perceive your self. You may’t defend what you do not see – the forgotten property, the untagged accounts, the legacy script nonetheless working with area admin rights.
sıla-blog-video-1_1920x1080.mp4
Then assume a breach and work backward from the result you worry probably the most.
Take Akira, as an illustration, a ransomware chain that deletes backups, abuses PowerShell, and spreads by means of shared drives. Replay that conduct safely inside your setting, and you will be taught, not guess, whether or not your defenses can break it midstream.
Two rules separated mature applications from the remainder:
- Consequence first: begin from influence, not stock.
- Purple by default: BAS is not red-versus-blue theater; it is how intel, engineering, and operations converge — simulate → observe → tune → re-simulate.
As John Sapp, CISO at Texas Mutual Insurance coverage famous, “groups that make validation a weekly rhythm begin seeing proof the place they used to see assumptions.”
The true work of AI is curation, not creation
AI was in every single place this yr, however probably the most priceless perception wasn’t about energy, it was about restraint. Pace issues, however provenance issues extra. No person needs an LLM mannequin improvising payloads or making assumptions about assault conduct.
For now, not less than, probably the most helpful form of AI is not the one which creates, it is the one which organizes, taking messy, unstructured menace intelligence and turning it into one thing defenders can really use.
sıla-blog-video-2_1920x1080.mp4
AI now acts much less like a single mannequin and extra like a relay of specialists, every with a selected job and a checkpoint in between:
- Planner — defines what must be collected.
- Researcher — verifies and enriches menace knowledge.
- Builder — buildings the data right into a protected emulation plan.
- Validator — checks constancy earlier than something runs.
Every agent opinions the final, conserving accuracy excessive and threat low.
One instance summed it up completely:
“Give me the hyperlink to the Fin8 marketing campaign, and I will present you the MITRE methods it maps to in hours, not days.”
That is not aspirational, it is operational. What as soon as took every week of guide cross-referencing, scripting, and validation now matches inside a single workday.
Headline → Emulation plan → Protected run. Not flashy, simply sooner. Once more, hours, not days.
Proof from the sector exhibits that BAS works
One of the crucial anticipated classes of the occasion was a stay showcase of BAS in actual environments. It wasn’t idea, it was operational proof.
A healthcare staff ran ransomware chains aligned with sector menace intel, measuring time-to-detect and time-to-respond, feeding missed detections again into SIEM and EDR guidelines till the chain broke early.
An insurance coverage supplier demonstrated weekend BAS pilots to confirm whether or not endpoint quarantines really triggered. These runs uncovered silent misconfigurations lengthy earlier than attackers might.
The takeaway was clear:
BAS is already a part of day by day safety operations, not a lab experiment. When management asks, “Are we protected towards this?” the reply now comes from proof, not opinion.
Validation turns “patch all the things” into “patch what issues”
One of many summit’s sharpest moments got here when the acquainted board query surfaced: “Do we have to patch all the things?”
The reply was unapologetically clear, no.
sıla-blog-video-3_1920x1080.mp4
BAS-driven validation proved that patching all the things is not simply unrealistic; it is pointless.
What issues is figuring out which vulnerabilities are really exploitable in your setting. By combining vulnerability knowledge with stay management efficiency, safety groups can see the place actual threat concentrates, not the place a scoring system says it ought to.
“You should not patch all the things,” Volkan Ertürk, Picus Co-Founder & CTO stated. “Leverage management validation to get a prioritized listing of exposures and concentrate on what’s really exploitable for you.”
A CVSS 9.8 shielded by validated prevention and detection might carry little hazard, whereas a medium-severity flaw on an uncovered system can open a stay assault path.
That shift, from patching on assumption to patching on proof, was one of many occasion’s defining moments. BAS would not inform you what’s fallacious in every single place; it tells you what can harm you right here, turning Steady Risk Publicity Administration (CTEM) from idea into technique.
You do not want a moonshot to begin
One other key takeaway from Picus safety structure leaders Gürsel Arıcı and Autumn Stambaugh’s session was that BAS would not require a grand rollout; it merely must get began.
Groups started with out fuss or fanfare, proving worth in weeks, not quarters.
- Most picked one or two scopes, finance endpoints, or a manufacturing cluster, and mapped the controls defending them.
- Then they selected a sensible consequence, like knowledge encryption, and constructed the smallest TTP chain that might make it occur.
- Run it safely, see the place prevention or detection fails, repair what issues, and run it once more.
In observe, that loop accelerated quick.
By week three, AI-assisted workflows have been already refreshing menace intel and regenerating protected actions. By week 4, validated management knowledge and vulnerability findings merged into publicity scorecards that executives might learn at a look.
The second a staff watched a simulated kill chain cease mid-run due to a rule shipped the day earlier than, all the things clicked, BAS stopped being a venture and have become a part of their day by day safety observe.
BAS works because the verb inside CTEM
Gartner’s Steady Risk Publicity Administration (CTEM) mannequin: “Assess, validate, mobilize” solely works when validation is steady, contextual, and tied to motion.
That is the place BAS lives now.
It is not a standalone software; it is the engine that retains CTEM trustworthy, feeding publicity scores, guiding management engineering, and sustaining agility as each your tech stack and the menace floor shift.
The perfect groups run validation like a heartbeat. Each change, each patch, each new CVE triggers one other pulse. That is what steady validation really means.
The long run lies in proof
Safety used to run on perception. BAS replaces perception with proof, working electrical present by means of your defenses to see the place the circuit fails.
AI brings velocity. Automation brings scale. Validation brings fact. BAS is not the way you discuss safety anymore. It is the way you show it.
Be among the many first to expertise AI-powered menace intelligence. Get your early entry now!
Word: This text was expertly written and contributed by Sila Ozeren Hacioglu, Safety Analysis Engineer at Picus Safety.









