Get In Touch
Secure and enable your remote workforce
Remote Access Security
Cyber Workforce Development
Third Party Risk Management
Explore Cloud Security Services
Cyber Skills Development
Cyber Workforce Development Programs
Featured Learning Tracks
Executive Cyber Training
Cyber Maturity Assessment
Security Operations Advisory
CMMC Certification Readiness
AICPA SOC for Cybersecurity
IT Organization Assessment
IT Governance and Risk Management
Application Portfolio Review
Business Continuity and Disaster Recovery
Red Team and Purple Team Assessments
PCI Pen Testing and ASV Scans
Identity and Access Management
Rapid IAM Assessments
Privileged Remote Access
Privacy Maturity Assessment
Privacy Gap Analysis and Remediation
Privacy Office Services
Risk & Compliance
Integrated Risk Management
Focal Point Brings Cyber Training to Remote Workforces
Life at Focal Point
Detecting and Preventing MageCart Attacks
Expert insights into the industry's hottest topics - from CCPA compliance to cloud security to purple team assessments. Search by topic or by content type (white paper, blog, case study, etc.) to find what you're looking for.
The GDPR, the APPI, and the DPA
The EU isn't the only one to release new privacy legislation. The Philippines and Japan have recently established stricter privacy requirements, some of which align closely with the principles of the GDPR. Check out our free guide to see where they line up...
Leveraging Data Analytics for Retail Supply Chain …
A Fortune 500 Retailer engaged Focal Point to assist with improving the inventory management and demand planning performance of the…
An Easy-to-Navigate Guide to GDPR Member State Der…
Member state derogations can add a few more steps to the GDPR compliance process. Our guide walks you through what you need to know for each EU member state.
Cybersecurity Workforce Development in Action
Focal Point recently had the privilege of helping a large retailer assess the sustainability and effectiveness of its workforce development…
The Essential Guide to Workforce Development
A step-by-step guide to building the skills your cyber security team needs to defend against tomorrow's threats...
Building Your Cyber Workforce to Stop TomorrowR…
The Keys to a Tactical, Scalable GDPR Implementati…
Understanding the Vendor Management Lifecycle
Vendors are often the weakest link in your data chain. Building an effective vendor risk management program is critical, and this guide helps you lay the basic...
The 2017 Cyber Balance Sheet Report
The Cyber Balance Sheet Report is a first-of-its-kind study exposing the critical breakdowns that plague cybersecurity professionals and the executives they...