The impact of Data Security in the IoT –GDPR, EU-US Privacy Shield & Brexit

During this webinar you will learn about the impact of data security in the IoT with focus on new legal requirements and advice for compliance, including:GDPR, EU-US Privacy Shield (replacing Safe Harbor).
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Will your new IoT device break your business?

Security is one of the biggest factors holding back deployment and adoption of IoT, and one of the most difficult to overcome. Get it wrong and you can undermine trust in your brand for years to come. Then there’s ‘Secure by Design’ (SbD); the UK is set to be the first country to enshrine it in law, with standards in other territories such as the EU and US also aligned to it.
Watch Now

Tax Research for the Future: An Exclusive First Look at Checkpoint Edge

Checkpoint Edge, the most intelligent tax research platform ever, gives you fast, accurate answers from a more fluid and intuitive user experience built to incorporate the latest in artificial intelligence. View the webinar for an exclusive look at how Checkpoint Edge can help researchers be more efficient, responsive, and confi
Watch Now

Application of IoT in construction

WebinarTV

The construction is in full swing. The market is increasingly demanding smart and sustainable buildings. But how do you make a building smart and sustainable? That is what we tell in this webinar!We are learning more and more about buildings through sensors. For example, sensors can be used to examine the occupation of workspaces and meeting rooms, but also the temperature in a department. By deploying this smartly, employees can quickly see which workspaces are free and cleaners can see which areas have been used so that they know where to clean.
Watch Now

Cyberthreats in the Internet of Things

Event 24

On July 16, 2019, Nathan Salminen, Allison Holt, and Paul Otto from the Hogan Lovells Privacy and Cybersecurity and Litigation teams presented a webinar, “Cyberthreats in the Internet of Things” where they explored some techniques that can be used to exploit potential vulnerabilities in connected devices and how those types of events impact organizations from a regulatory and litigation perspective.
Watch Now