Search

Insight

HPE’s Deputy CISO Discusses Cyber Workforce Development

This is the first episode in Focal Point's Practitioner Interview Series, in which Focal Point experts sit down with real-world security leaders to discuss strategies for overcoming common security challenges. Drew Simonis, Deputy CISO of Hewlett Packard Enterprise, graciously sat down with Focal Point's Justin Avery to discuss his strategy on hiring, training, and retaining employees on his cybersecurity team.
Insight

An Interview with HPE’s Drew Simonis: Cyber Workforce Development

This is the first episode in Focal Point’s Practitioner Interview Series, in which Focal Point experts sit down with real-world…
Page

Kickstart Your Career as an IAM Integration Consultant

Despite your education, qualifications, and solid past experiences, landing a position can feel nearly impossible, especially when also managing a…
News Article

Focal Point Data Risk Names New CFO

Focal Point adds recognized financial leader Louise Lopez to executive team, appointing her as the Chief Financial Officer. Louise joins Focal Point for MGT of America Consulting and PricewaterhouseCoopers.
Insight

Tips for Improving Data Privacy Conversations in the Boardroom

When you add up business disruptions, productivity and revenue losses, settlements, fines, and penalties, the average cost to a company not compliant with data protection, state, federal, international, or industry regulations is around $15 million. With a skyrocketing number of new data protection laws (e.g., the CCPA, the GDPR, Japan’s APPI, and China’s National Data Protection Standard), your board of directors can no longer afford to ignore data privacy. While board members have a duty to protect their organization, their longstanding view of compliance as an expense to be minimized (with the average compliance program costing $5 million) has led many boards to de-prioritize investments in data protection. This short-sighted strategy can create a number of serious risks for your organization. As a Chief Privacy Officer (CPO) or security, legal, or compliance leader, you are now responsible for educating your board on your organization’s approach to data privacy, the impact of privacy risk on the business, and the potential negative outcomes of not investing in privacy. To help facilitate better board-level conversations around data privacy, we’ll address the common misconceptions board members have about data privacy, tips you can leverage when addressing the board, and ways to improve conversations around data privacy in the boardroom.
Person

Jeremy Archer

Jeremy is the Director of Focal Point’s Penetration Testing practice, with over 20 years of information technology and security experience.
Insight

How to Build Obfuscated Macros for your Next Social Engineering Campaign

Attention, pen testers: Are you looking to run a phishing campaign that puts your antivirus software to the test? Then this post is for you. In this post, I will guide you through how to build a malicious obfuscated macro in a Word document. I know you may be thinking that there are plenty of tools that generate Visual Basic for Applications (VBA) for macros, but many of these are either without any obfuscation or already have built-in automatic obfuscators and are often detected or removed by antivirus software. This post will demonstrate how to leverage different tools and techniques to create an obfuscated macro that evades antivirus software. This method will give you ideas on how to execute a social engineering campaign that really puts your people, not just your antivirus software, to the test.
Person

Corey Gant

Corey is a Director with Focal Point’s national Data Privacy practice and has more than 12 years of experience in both leading and supporting governance, risk and compliance initiatives.
Person

Ashlee Holt

Ashlee Holt is a Director in Focal Point’s Internal Audit Practice, bringing over 12 years of experience in managing and supporting the project planning and execution of dynamic audit initiatives.
New Search