This article was first published in the Cybersecurity Law Report.

IT has an indisputably important role in implementing a defense-in-depth cybersecurity strategy, however, the legal team is also a crucial part of a company’s cyber program. With input from technical and legal experts, including DWT’s Amy Mushahwar, this three-part series addresses what attorneys need to understand about how security technologies are used to mitigate breach risk. This first installment explores the knowledge base needed depending on the lawyer’s role, whether security certification is necessary, technology’s overall role in mitigating risk, and surveys certain technologies and techniques, such as pen testing.

To read the full article, continue to the Cybersecurity Law Report.