Why red teaming is the missing link in cyber resilience

by Black Hat Middle East and Africa
on
Why red teaming is the missing link in cyber resilience

Many organisations treat cybersecurity like an insurance policy: patch, monitor, repeat. But rising attack sophistication means the true differentiator is offensive insight – red-teaming – coupled with strong blue-team discipline.

Why does the status quo fail to deliver? 

Back in 2023, Aon’s global risk management survey ranked ‘Cyber Attack / Data Breach’ as the number one risk globally, ahead of business interruption, supply chain or talent risks. But today, many of those organisations are still under-prepared to absorb a large-scale cyber event. And Aon’s most recent 2025 report warns that reputation events resulting from cyber incidents can erode shareholder value by approximately 27%, up from 9% in prior years. 

Cybersecurity practitioners at Black Hat MEA talk about this over and over again. We know cyber is a top risk for organisations across industries, yet resilience remains aspirational, not embedded.

And PwC’s 2025 global digital trust insights report emphasises this. The survey of 4,042 business and tech executives found that only 2% of organisations have implemented cyber resilience actions across all areas assessed. 

Meanwhile, regulatory pressures are pushing budget increases: 96% told PwC that regulation has intensified their cybersecurity investments over the past 12 months.

So boards and execs are acknowledging the threat, but routine programs and compliance alone can’t uncover real gaps. And that’s where red teaming comes in. 

Red teams can expose false confidence 

If you’re leading a large organisation, don’t think of red teams as adversaries – but as an opportunity to stress test your blue defence. A red team attack simulates a real threat actor (from reconnaissance, to lateral movement, to data exfiltration); and that allows you to surface latent weaknesses.

What red teams reveal that audits don’t:

  • Unsafe assumptions (like ‘this network is air-gapped’)
  • Tool gaps (your blue team lacks visibility into certain protocols)
  • Organisational friction (communication bottlenecks in incident escalation)
  • Credential reuse or lateral paths that compliance reviews won’t catch

In many breach simulation engagements, the most valuable output is not the ‘attack path found’ but the narrative (how an attacker would think, move, and adapt) which can reshape defence posture.

And we need this narrative; because blue teams, operating in steady state, can get tunnel vision. They see alerts, respond and patch; but rarely get challenged with unexpected routes that a real attacker would explore. A red team forces that cognitive stretch. 

How to bridge red and blue 

If you want red and blue to deliver maximum value, they have to be aligned. Here’s how to weave them together:

  • Cycles, not silos: run regular red-blue cycles with shared debriefs. This keeps both teams sharp and avoids report fatigue.
  • Threat-context weaving: Use threat intel to build red scenarios tied to your sector or region. Attackers won’t follow generic scripts, so defenders should be tuned into context too.
  • Blue team validation: After red tests, give the blue team a chance to re-test the same path. This tests your learning process, rather than just your detection rules.
  • C-suite involvement: Turn red-blue findings into board-level metrics, like dwell time or unpatched paths. This will elevate outcomes from technical fix to business risk.

A real-world example might look like this: a red team finds that an ‘unused’ developer server had stale credentials. The blue team, now aware, modifies their alert rules to flag access attempts and prioritise that server in patch cycles. Over time, the path disappears. That cycle (attack to detection to response to fix) is the heart of resilient growth.

Four practical takeaways for security leaders 

  1. Run breach simulations yearly, at minimum. Ideally, every 3-6 months.
  2. Integrate threat intel into red scenarios.
  3. Mandate joint post-mortems. Red and blue must co-own findings and remediation.
  4. Elevate metrics upward. Report via business risk frameworks as well as security KPIs.

Offensive and defensive aren’t in opposition; we need to see them as complementary limbs in one organism. When red and blue teams operate in unison, your organisation is far better placed to learn, adapt, and fortify. 

Share on

Join newsletter

Join the newsletter to receive the latest updates in your inbox.


Follow us


Topics

Sign up for more like this.

Join the newsletter to receive the latest updates in your inbox.

Related articles

Building your 2026 cybersecurity spending guide

Building your 2026 cybersecurity spending guide

Planning your cybersecurity budget for 2026? We pull together forecasts from Gartner, IDC and the WEF to show where spend is shifting – from tooling to AI governance, supply chain trust, and layered controls

Read More