A sure way to get senior management to focus on the company’s cybersecurity preparedness is to demonstrate how its defenses will fare in an attack. “Red-teaming,” which involves gaining access to, or disrupting, a company’s system by any available means, is one valuable technique. This article synthesizes insights shared by cybersecurity professionals at the International Conference on Cyber Security, hosted by the FBI and Fordham University, regarding how red-teaming fits into a cybersecurity plan, how it differs from other forms of testing and how it can help to obtain buy-in for cybersecurity efforts. See “What Lawyers Need to Know About Security Technologies and Techniques (Part Two of Three)” (Jun. 6, 2018).