Get In Touch
Secure and enable your remote workforce
Remote Access Security
Cyber Workforce Development
Third Party Risk Management
Explore Cloud Security Services
Cyber Skills Development
Cyber Workforce Development Programs
Featured Learning Tracks
Executive Cyber Training
Cyber Maturity Assessment
Security Operations Advisory
CMMC Certification Readiness
AICPA SOC for Cybersecurity
IT Organization Assessment
IT Governance and Risk Management
Application Portfolio Review
Business Continuity and Disaster Recovery
Red Team and Purple Team Assessments
PCI Pen Testing and ASV Scans
Identity and Access Management
Rapid IAM Assessments
Privileged Remote Access
Privacy Maturity Assessment
Privacy Gap Analysis and Remediation
Privacy Office Services
Risk & Compliance
Integrated Risk Management
Digital Transformation Risk
Focal Point Brings Cyber Training to Remote Workforces
Life at Focal Point
Extrapolating DevSecOps: Principles to Apply Across Your Organization
Expert insights into the industry's hottest topics - from CCPA compliance to cloud security to purple team assessments. Search by topic or by content type (white paper, blog, case study, etc.) to find what you're looking for.
Building Your Cyber Workforce to Stop TomorrowR…
The Keys to a Tactical, Scalable GDPR Implementati…
Understanding the Vendor Management Lifecycle
Vendors are often the weakest link in your data chain. Building an effective vendor risk management program is critical, and this guide helps you lay the basic...
The 2017 Cyber Balance Sheet Report
The Cyber Balance Sheet Report is a first-of-its-kind study exposing the critical breakdowns that plague cybersecurity professionals and the executives they...
5 Common Pitfalls of Data Analytics
Building data analytics into your internal audit program is hard. Read the biggest mistakes that other people have made, and our tips on avoiding those pitfalls...
5 Common Pitfalls of IAM
Investing in IAM is a huge step for an organization. Make sure your organization is avoiding these common mistakes...
5 Reasons to Audit your IAM Program
A maturity audit is the key to gaining the full value of your IAM solution and enhancing your cyber security program...