The legal team is a crucial part of a company’s cybersecurity program and it is essential for members of that team to understand security technologies and how they are used to mitigate data breach risk. This final installment in our three-part series, featuring advice from legal and technical experts, covers how and when common types of cloud solutions are used and the attorney’s role in mitigating risk in connection with this service. It also addresses what to consider when “hacking back” to secure data. Part one
explored the appropriate knowledge base for the different attorney roles, technology’s place in mitigating risk, and certain technologies and techniques, such as pen testing. Part two
continued examining other security techniques, including red teaming, vulnerability scanning and social engineering. See also “Negotiating an Effective Cloud Service Agreement
” (Sep. 13, 2017).