Fortifying Cyber Defenses: How to Leverage Breach and Attack Simulation to Select an EDR – Voices from Validate