Cyber School Student Login
Search
Solutions
Services
Company
Case Studies
Get In Touch
Featured
Cyber Threat Analyst Bootcamp
Learn More
Cyber Analyst Bootcamp
Career Outcomes
Testimonials
Curriculum and Labs
Instructors
Aptitude Assessment
Featured
Application Process
Learn More
Application Process
Bootcamp Dates
Pricing
Featured
Why Focal Point?
Learn More
About Focal Point Academy
Employer Perspective
FAQ
Featured
Secure and enable your remote workforce
Learn More
Initiatives
Remote Access Security
Cyber Workforce Development
IAM Modernization
Third Party Risk Management
Cloud Transformation
Privacy Compliance
Industry
Financial Services
Healthcare
Retail
Hospitality
Education
Technology
Manufacturing
Non-profit
Government
Featured
Explore Cloud Security Services
Learn More
Cyber Skills Development
Cyber Workforce Development Programs
Featured Learning Tracks
Executive Cyber Training
Virtual Learning
All Courses
Digital Badges
Cyber Strategy
Cyber Maturity Assessment
CMMC Certification Readiness
Cloud Security
DevSecOps Services
Cyber Workforce
PCI Compliance
IT Strategy
IT Organization Assessment
IT Governance and Risk Management
Digital Transformation
Application Portfolio Review
Business Continuity and Disaster Recovery
Penetration Testing
Network Security
Application Security
Social Engineering
Red Team and Purple Team Assessments
Identity and Access Management
Identity Governance
Rapid IAM Assessments
Privileged Remote Access
Managed Services
Data Privacy
Privacy Maturity Assessment
Privacy Gap Analysis and Remediation
Data Mapping
Privacy Office Services
CCPA Compliance
CPRA Compliance
GDPR Compliance
HIPAA Compliance
Risk & Compliance
Integrated Risk Management
Compliance
Third-Party Risk
ERP Services
Audit
Internal Audit
IT Audit
SOX Compliance
Digital Transformation Risk
Data Analytics
Featured
Focal Point Data Risk Joins CDW Corporation
Learn More
Life at Focal Point
Careers
News
Featured
Extrapolating DevSecOps: Principles to Apply Across Your Organization
Learn More
See All
Case Studies
Insights
Expert insights into the industry's hottest topics - from CCPA compliance to cloud security to purple team assessments. Search by topic or by content type (white paper, blog, case study, etc.) to find what you're looking for.
Blog
2018 in Review: A Year of Internal Penetration Tes…
I had a manager who liked to say, "There are no advanced techniques – only the basics, mastered." While I'm not sure that always applies to this field, I think the core lesson holds a lot of wisdom for information security professionals. So, in the interest of getting better at the basics, I reviewed our 2018 penetra…
Blog
Prevention Is the Best Medicine: A Guide to SAP Se…
Preventative ongoing maintenance and monitoring of your users’ SAP security access is critical to avoiding significant deficiencies or control weaknesses. A governance, risk, and compliance (GRC) tool (such as SAP GRC, Control Panel, ComplianceNow, ERP Maestro) is a great start, but there is more to monitor! Sy…
Blog
Understanding the Differences between PIAs and the…
Since May 25, 2018, organizations have been required to perform data protection impact assessments (DPIAs) under the General Data Protection Regulation (GDPR). Organizations use DPIAs to assess whether certain data processing activities are a risk to the rights and freedoms of individuals. However, because DPIAs …
Blog
Case Study: Implementing SailPoint’s IdentityIQ …
Client Overview One of the largest and most geographically expansive water utility companies located in both the United States and…
White Paper
Thinking Inside the Box: A Guide to Configuring Yo…
Database activity monitoring is an integral part of an organization's security. But without a well-configured solution (DMS), you can get lost in the noise, unable to focus on suspicious or inappropriate activity. In this guide, our experts lay out a step-by-step approach to configuring your DMS...
White Paper
Your Roadmap to U.S. Breach Notification Laws
Keeping up with each state's data breach notification laws is close to impossible. That's why we created this handy guide - a quick reference to all 50 states and...
Webinar
Enabling Key SoD Controls in a Workday Environment
White Paper
The 2018 Cyber Balance Sheet Report
The 2018 Cyber Balance Sheet Report offers a rare window on the state of cyber risk management in the boardroom.
Case Study
A Fortune 500 Food Manufacturer’s Award-Winning …
A Fortune 500 manufacturer of chocolate and other confectioneries, operating in more than 70 countries and growing through acquisitions and…
Posts navigation
1
…
10
11
12
13
14
15