This article was first published in the Cybersecurity Law Report.

IT has an indisputably important role in implementing a defense-in-depth cybersecurity strategy, however, the legal team is also a crucial part of a company’s cyber program. With input from technical and legal experts, including DWT’s Amy Mushahwar, this three-part series addresses what attorneys need to understand about how security technologies are used to mitigate breach risk. This second installment will address additional security techniques, including red teaming, vulnerability scanning and social engineering.

To read the full article, continue to the Cybersecurity Law Report.