Adversary simulation is a key component of a mature security program. Without it organizations might not truly understand their weaknesses until they face a real world adversary. This talk will promote the concept of the “Assumed Breach” model and discuss some steps security program owners can take to validate a security program is effective.