Get In Touch
Cyber Threat Analyst Bootcamp
Cyber Analyst Bootcamp
Curriculum and Labs
Why Focal Point?
About Focal Point Academy
Secure and enable your remote workforce
Remote Access Security
Cyber Workforce Development
Third Party Risk Management
Explore Cloud Security Services
Cyber Skills Development
Cyber Workforce Development Programs
Featured Learning Tracks
Executive Cyber Training
Cyber Maturity Assessment
Security Operations Advisory
CMMC Certification Readiness
IT Organization Assessment
IT Governance and Risk Management
Application Portfolio Review
Business Continuity and Disaster Recovery
Red Team and Purple Team Assessments
PCI Pen Testing and ASV Scans
Identity and Access Management
Rapid IAM Assessments
Privileged Remote Access
Privacy Maturity Assessment
Privacy Gap Analysis and Remediation
Privacy Office Services
Risk & Compliance
Integrated Risk Management
Digital Transformation Risk
Focal Point Data Risk Joins CDW Corporation
Life at Focal Point
Extrapolating DevSecOps: Principles to Apply Across Your Organization
Expert insights into the industry's hottest topics - from CCPA compliance to cloud security to purple team assessments. Search by topic or by content type (white paper, blog, case study, etc.) to find what you're looking for.
An Easy-to-Navigate Guide to GDPR Member State Der…
Member state derogations can add a few more steps to the GDPR compliance process. Our guide walks you through what you need to know for each EU member state.
Cybersecurity Workforce Development in Action
Focal Point recently had the privilege of helping a large retailer assess the sustainability and effectiveness of its workforce development…
The Essential Guide to Workforce Development
A step-by-step guide to building the skills your cyber security team needs to defend against tomorrow's threats...
Building Your Cyber Workforce to Stop TomorrowR…
The Keys to a Tactical, Scalable GDPR Implementati…
Understanding the Vendor Management Lifecycle
Vendors are often the weakest link in your data chain. Building an effective vendor risk management program is critical, and this guide helps you lay the basic...
The 2017 Cyber Balance Sheet Report
The Cyber Balance Sheet Report is a first-of-its-kind study exposing the critical breakdowns that plague cybersecurity professionals and the executives they...
5 Common Pitfalls of Data Analytics
Building data analytics into your internal audit program is hard. Read the biggest mistakes that other people have made, and our tips on avoiding those pitfalls...
5 Common Pitfalls of IAM
Investing in IAM is a huge step for an organization. Make sure your organization is avoiding these common mistakes...