Cyber School Student Login
Search
Solutions
Services
Company
Case Studies
Get In Touch
Featured
Cyber Threat Analyst Bootcamp
Learn More
Cyber Analyst Bootcamp
Career Outcomes
Testimonials
Curriculum and Labs
Instructors
Aptitude Assessment
Featured
Application Process
Learn More
Application Process
Bootcamp Dates
Pricing
Featured
Why Focal Point?
Learn More
About Focal Point Academy
Employer Perspective
FAQ
Featured
Secure and enable your remote workforce
Learn More
Initiatives
Remote Access Security
Cyber Workforce Development
IAM Modernization
Third Party Risk Management
Cloud Transformation
Privacy Compliance
Industry
Financial Services
Healthcare
Retail
Hospitality
Education
Technology
Manufacturing
Non-profit
Government
Featured
Explore Cloud Security Services
Learn More
Cyber Skills Development
Cyber Workforce Development Programs
Featured Learning Tracks
Executive Cyber Training
Virtual Learning
All Courses
Digital Badges
Cyber Strategy
Cyber Maturity Assessment
CMMC Certification Readiness
Cloud Security
DevSecOps Services
Cyber Workforce
PCI Compliance
IT Strategy
IT Organization Assessment
IT Governance and Risk Management
Digital Transformation
Application Portfolio Review
Business Continuity and Disaster Recovery
Penetration Testing
Network Security
Application Security
Social Engineering
Red Team and Purple Team Assessments
Identity and Access Management
Identity Governance
Rapid IAM Assessments
Privileged Remote Access
Managed Services
Data Privacy
Privacy Maturity Assessment
Privacy Gap Analysis and Remediation
Data Mapping
Privacy Office Services
CCPA Compliance
CPRA Compliance
GDPR Compliance
HIPAA Compliance
Risk & Compliance
Integrated Risk Management
Compliance
Third-Party Risk
ERP Services
Audit
Internal Audit
IT Audit
SOX Compliance
Digital Transformation Risk
Data Analytics
Featured
Focal Point Data Risk Joins CDW Corporation
Learn More
Life at Focal Point
Careers
News
Featured
Extrapolating DevSecOps: Principles to Apply Across Your Organization
Learn More
See All
Case Studies
Insights
Expert insights into the industry's hottest topics - from CCPA compliance to cloud security to purple team assessments. Search by topic or by content type (white paper, blog, case study, etc.) to find what you're looking for.
Webinar
Measuring Your Identity Fitness
A look at the strategies and tools that will prepare your identity and access management program for 2021
Webinar
RPA and the Path to Digitalization
For many Audit functions, digitalization starts with RPA - a technology that has left the wings and entered center stage. In addition to leveraging RPA to realize efficiency gains, cost savings, and improved visibility, Internal Audit functions must consider the impact of RPA on controls and business processes. From an…
Blog
How to Achieve the CMMC Level 3 Certification
Under the Cybersecurity Maturity Model Certification (CMMC), all DoD contractors are required to be evaluated on the maturity and reliability of their cybersecurity infrastructure, earning certifications ranging from Level 1 (basic cyber hygiene) to Level 5 (advanced security). The five CMMC certification levels are ti…
Webinar
Building an Enterprise Privacy Framework
Chris Jurs, VP of our Data Privacy practice, and Donel Martinez, a Director in our Risk Consulting group, discuss practical ways organizations can leverage the NIST Privacy Framework to build an enterprise-wide privacy strategy. This conversations is designed for privacy, audit, and compliance professionals.
Blog
More Changes Coming to the CCPA
2020 has been a major year for the California Consumer Privacy Act (CCPA). After two years of anticipation, the CCPA went into effect on January 1, 2020 and then enforcement for the law began six months later on July 1, 2020. The Attorney General also submitted the final proposed regulations for the CCPA to the Office …
Blog
How to Achieve the CMMC Level 2 Certification
Under the Cybersecurity Maturity Model Certification (CMMC), all DoD contractors are required to be evaluated on the maturity and reliability of their cybersecurity infrastructure, earning certifications ranging from Level 1 (basic cyber hygiene) to Level 5 (advanced security). The five CMMC certification levels are ti…
Webinar
Detecting and Preventing MageCart Attacks
A practical look at MageCart attacks (and other similar attack methods) and the controls and tools to identify and stop them...
Webinar
Webinar: A Buyer’s Guide to Penetration Test…
Whether you're looking to refresh your pen testing routine or to integrate a new type of test (maybe application testing or a device testing), buying a pen test doesn't have to be painful. In this webinar, Jeremy Archer, Managing Director of our Cyber Defense practice, sits down with sales leader Scott Maxwell to d…
Blog
How to Achieve the CMMC Level 1 Certification
Each year, roughly $600 billion is lost because of cyberattacks. In a push to protect the U.S. defense supply chain from both foreign and domestic cyber threats and security risks, the Department of Defense (DoD) created the Cybersecurity Maturity Model Certification (CMMC). This new unified standard will ensure the mo…
Posts navigation
1
2
3
4
…
15