ICIT's Bright Minds Q & A Series: Adversarial Simulation Is Proactive in a Reactive World
Updated: Feb 11
By Itzik Kotler, ICIT Fellow and Co-Founder & CTO, SafeBreach
In continued support of our mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, ICIT has embarked on a journey to hold candid interviews with some of the brightest minds in national security, cybersecurity, and technology. Our goal is to share their knowledge and insights with our community to shed light on solutions to the technology, policy, and human challenges facing our community. Our hope is that their words will motivate, educate, and inspire you to take on the challenges facing your organizations.
Organizations that only invest in reactive cybersecurity solutions are doomed to suffer the increasingly costly impacts of cybersecurity incidents. According to the IBM Cost of a Data Breach Report 2021, this year the average data breach costs rose from USD 3.86 million to USD 4.24 million. In addition to the financial cost of remediation, breached organizations may face reputational harm, significant downtime, or the loss of sensitive data and intellectual property. Worse, their consumers and partners may be exploited or compromised. It behooves organizations to adopt a more proactive approach to cybersecurity such as “red-teaming” or adversarial simulation.
Adversarial simulations mimic the tools, tactics, techniques, and procedures of known and emerging attackers to find exploitable vulnerabilities in networks and mission-critical systems. In this Bright Minds Q&A, ICIT Fellow Itzik Kotler, Co-Founder and CTO, SafeBreach, explains the basics and benefits of adversarial simulation and he expounds on why the proactive approach is essential for securing critical infrastructure.
Read the Full Interview