
The Cyber Threat Perspective Episode 153: How to Prove Your Security Works Before Attackers Do
Oct 17, 2025
Discover how to transition from thinking you're secure to having proof of it. The hosts discuss the importance of validating security controls and using real-world pen tests to demonstrate effectiveness. Learn the four levels of security outcomes and why it's crucial to validate expensive tools. They highlight common misconfigurations and what to prioritize in testing, from EDR assessments to backup verification. Plus, find out how AI can assist in creating test plans tailored to your security needs.
AI Snips
Chapters
Transcript
Episode notes
Define Proof By Observable Outcomes
- Proof means demonstrating that controls actually blocked, alerted, or caused action during an attack simulation.
- Validate security by showing concrete detections, blocks, or responses rather than assuming tools work.
Identity Firewall POC Stopped AD Abuse
- During an internal pen test for a law firm, Silverfort blocked pass-the-hash, pass-the-ticket, and certificate abuse.
- The engagement proved the identity firewalling POC prevented real attack techniques using a domain admin account.
Validate New Tools With Real Tests
- Test new security purchases with real attack techniques to prove value before declaring success.
- Either run the tests yourself or hire/ask vendors and testers to demonstrate the tool working in your environment.
