This article was first published in the Cybersecurity Law Report.

IT has an indisputably important role in implementing a defense-in-depth cybersecurity strategy, however, the legal team is also a crucial part of a company’s cyber program. With input from technical and legal experts, including DWT’s Amy Mushahwar, this three-part series addresses what attorneys need to understand about how security technologies are used to mitigate breach risk. Part one explored the appropriate knowledge base for the different attorney roles, technology’s place in mitigating risk, and certain technologies and techniques, such as pen testing. Part two continued examining other security techniques, including red teaming, vulnerability scanning and social engineering. This final installment will cover cloud security and the potential value of hacking back.

To read the full article, continue to the Cybersecurity Law Report.