Events and webinars

Cybersecurity Preparedness in Three “Acts” – Is Your Organization Prepared?

Join us for our exclusive cybersecurity program and networking opportunity in partnership with Optiv, a leading cybersecurity advisory and solutions specialist, and Western Union, a...

A Seat at the Table: FDA charts an ambitious new course on nutrition policy: “healthy,” front-of-pack labelling, added sugars, and more

Don't get lost or left behind. Join the Hogan Lovells Food & Beverage team on Tuesday, 15 November 2022, for some important direction on these topics as we present the next webinar in...

Mind the vertical gap: An update on the new rules on vertical agreements in the EU and UK

Join the Hogan Lovells Antitrust and Competition team on Thursday, 29 September, 2022 for a discussion on the key recent changes to the vertical agreement block exemptions in both the EU...

Antitrust for emerging companies – what you need to know

Antitrust isn't just for big companies! Emerging companies may view antitrust as an issue primarily for large companies or as a lower priority given their size. However, emerging companies...

A Seat at the Table: Ransomware in the food industry

On Wednesday, February 9, 2022, the Hogan Lovells Food & Beverage and Privacy and Cybersecurity teams had an insightful discussion on cybersecurity and privacy issues of interest to the ...

The Rise in Ransomware Attacks and Important Takeaways: Handling a Ransomware Attack When Your Company is the Victim and Critical Steps to Avoid in the First Few Days

The premier event that insurance and reinsurance legal compliance attend to learn, network and benchmark alongside industry peers.

The Schrems II Decision: The Day After

We hope you can join us for this timely webinar brought to you by IAPP featuring Eduardo Ustaran, Global co-head of the Hogan Lovells Privacy and Cybersecurity practice.

Cyberthreats in the Internet of Things

The Hogan Lovells Privacy and Cybersecurity and Litigation teams presented our webinar Cyberthreats in the Internet of Things. We explored some techniques that can be used to exploit...

Loading data