Schellman becomes The First ISO 42001 ANAB Accredited Certification Body!

Services
Services
SOC & Attestations
SOC & Attestations
Payment Card Assessments
Payment Card Assessments
ISO Certifications
ISO Certifications
Privacy Assessments
Privacy Assessments
Federal Assessments
Federal Assessments
Healthcare Assessments
Healthcare Assessments
Penetration Testing
Penetration Testing
Cybersecurity Assessments
Cybersecurity Assessments
Crypto and Digital Trust
Crypto and Digital Trust
Schellman Training
Schellman Training
ESG & Sustainability
ESG & Sustainability
AI Services
AI Services
Industry Solutions
Industry Solutions
Cloud Computing & Data Centers
Cloud Computing & Data Centers
Financial Services & Fintech
Financial Services & Fintech
Healthcare
Healthcare
Payment Card Processing
Payment Card Processing
US Government
US Government
Higher Education & Research Laboratories
Higher Education & Research Laboratories
About Us
About Us
Leadership Team
Leadership Team
Careers
Careers
Corporate Social Responsibility
Corporate Social Responsibility
Strategic Partnerships
Strategic Partnerships

How IoT Is Changing Privacy Security

WATCH NOW

About this Event

The Internet of Things (IoT) has positively exploded into our daily lives. We see IoT devices everywhere, from our workplace to our homes. You know that a technology will become ubiquitous when it makes the headlines and IoT has done that, over and over again.

IoT has been slated for worries over surveillance and tracking, as devices like Amazon Echo have attested. However, it can be a technology for good.  To make the most of what can be empowering technology, we need to make sure that the technology is optimized to do its job, but not expose our information. But with the IoT, we need to ensure that not just anyone can steal our data. IoT devices generate lots of personal data. They also, generally, are custodians of other Personally Identifiable Information (PII) like name, address, passwords, and even location.

This webinar will discuss the history, challenges, benefits and 5 tips to help keep the risk of leaked or stolen information to a minimum.

Join Schellman's Avani Desai and Abacode's Chief Technology Officer, Jeremy Rasmussen, as they cover a number of areas in this CPE eligible 60 minute event, including the following:

  • Discuss the history and the current state of IoT
  • What are the security and privacy challenges individuals and companies will have?
  • How privacy and security by design will help mitigate the risk?
  • What are the legal implications of ownership of data?
  • Five tips that are easily implemented to decrease the risk of breaches.

About this Event

The Internet of Things (IoT) has positively exploded into our daily lives. We see IoT devices everywhere, from our workplace to our homes. You know that a technology will become ubiquitous when it makes the headlines and IoT has done that, over and over again.

IoT has been slated for worries over surveillance and tracking, as devices like Amazon Echo have attested. However, it can be a technology for good.  To make the most of what can be empowering technology, we need to make sure that the technology is optimized to do its job, but not expose our information. But with the IoT, we need to ensure that not just anyone can steal our data. IoT devices generate lots of personal data. They also, generally, are custodians of other Personally Identifiable Information (PII) like name, address, passwords, and even location.

This webinar will discuss the history, challenges, benefits and 5 tips to help keep the risk of leaked or stolen information to a minimum.

Join Schellman's Avani Desai and Abacode's Chief Technology Officer, Jeremy Rasmussen, as they cover a number of areas in this CPE eligible 60 minute event, including the following:

  • Discuss the history and the current state of IoT
  • What are the security and privacy challenges individuals and companies will have?
  • How privacy and security by design will help mitigate the risk?
  • What are the legal implications of ownership of data?
  • Five tips that are easily implemented to decrease the risk of breaches.

The Presenters

https://www.schellman.com/hubfs/avani-desai-2.png

Avani Desai

Chief Executive Officer
Schellman

https://www.schellman.com/hubfs/headshot-about-large-rasmussen-1.png

Jeremy Rasmussen

Chief Technology Officer
Abacode