What Lawyers Need to Know About Security Technologies and Techniques (Part Three of Three)

The legal team is a crucial part of a company’s cybersecurity program and it is essential for members of that team to understand security technologies and how they are used to mitigate data breach risk. This final installment in our three-part series, featuring advice from legal and technical experts, covers how and when common types of cloud solutions are used and the attorney’s role in mitigating risk in connection with this service. It also addresses what to consider when “hacking back” to secure data. Part one explored the appropriate knowledge base for the different attorney roles, technology’s place in mitigating risk, and certain technologies and techniques, such as pen testing. Part two continued examining other security techniques, including red teaming, vulnerability scanning and social engineering. See also “Negotiating an Effective Cloud Service Agreement” (Sep. 13, 2017).

To read the full article

Continue reading your article with a CSLR subscription.