10 Key Lessons Learned in the Field on Breach and Attack Simulation