Fortifying Cyber Defenses: How to Leverage Breach and Attack Simulation to Select an EDR