The document discusses shortcomings of traditional penetration testing and proposes an attacker emulation approach. It notes doctors once performed unnecessary medical procedures without understanding effectiveness. Similarly, penetration tests focus on finding bugs but not how real attackers operate. The document advocates profiling attacker groups, rebuilding their playbooks, replaying the playbooks against organizations, and using the results to strengthen defenses. It provides examples of how different attackers operate and argues this method could improve security assessments.