Cyber School Student Login
Search
Solutions
Services
Company
Case Studies
Get In Touch
Featured
Cyber Threat Analyst Bootcamp
Learn More
Cyber Analyst Bootcamp
Career Outcomes
Testimonials
Curriculum and Labs
Instructors
Aptitude Assessment
Featured
Application Process
Learn More
Application Process
Bootcamp Dates
Pricing
Featured
Why Focal Point?
Learn More
About Focal Point Academy
Employer Perspective
FAQ
Featured
Secure and enable your remote workforce
Learn More
Initiatives
Remote Access Security
Cyber Workforce Development
IAM Modernization
Third Party Risk Management
Cloud Transformation
Privacy Compliance
Industry
Financial Services
Healthcare
Retail
Hospitality
Education
Technology
Manufacturing
Non-profit
Government
Featured
Explore Cloud Security Services
Learn More
Cyber Skills Development
Cyber Workforce Development Programs
Featured Learning Tracks
Executive Cyber Training
Virtual Learning
All Courses
Digital Badges
Cyber Strategy
Cyber Maturity Assessment
CMMC Certification Readiness
Cloud Security
DevSecOps Services
Cyber Workforce
PCI Compliance
IT Strategy
IT Organization Assessment
IT Governance and Risk Management
Digital Transformation
Application Portfolio Review
Business Continuity and Disaster Recovery
Penetration Testing
Network Security
Application Security
Social Engineering
Red Team and Purple Team Assessments
Identity and Access Management
Identity Governance
Rapid IAM Assessments
Privileged Remote Access
Managed Services
Data Privacy
Privacy Maturity Assessment
Privacy Gap Analysis and Remediation
Data Mapping
Privacy Office Services
CCPA Compliance
CPRA Compliance
GDPR Compliance
HIPAA Compliance
Risk & Compliance
Integrated Risk Management
Compliance
Third-Party Risk
ERP Services
Audit
Internal Audit
IT Audit
SOX Compliance
Digital Transformation Risk
Data Analytics
Featured
Focal Point Data Risk Joins CDW Corporation
Learn More
Life at Focal Point
Careers
News
Featured
Extrapolating DevSecOps: Principles to Apply Across Your Organization
Learn More
See All
Case Studies
Insights
Expert insights into the industry's hottest topics - from CCPA compliance to cloud security to purple team assessments. Search by topic or by content type (white paper, blog, case study, etc.) to find what you're looking for.
Blog
The Final Countdown: The CCPA’S Employee Informa…
Updated October 19: On September 30, 2020, the California Attorney General signed AB 1281 into law extending the exemption on employee rights until January 1, 2022. In October 2019, the California legislature passed Assembly Bill 25, an amendment that exempts employers from complying with certain CCPA requirements when…
Blog
The California Privacy Rights Act (CPRA): Is it th…
Companies have barely had time to catch their breath since the California Consumer Privacy Act (CCPA) took effect this year, and California is already looking to pass a second, possibly tougher law. Many considered the CCPA to be the strictest privacy law ever in the U.S., which may not be true soon. Instead, the Calif…
Blog
Choosing the Right Approach for Upgrading to SAP S…
After rebuilding their Enterprise Resource Planning (ERP) solution, SAP launched S/4 HANA, its fourth-generation business suite to help businesses transform their digital needs. S/4 HANA is the successor to SAP ERP Control Center (ECC) and SAP R/3, delivering more advanced data compression technology, a simplified plat…
White Paper
Identity Governance in Healthcare
Use cases for building a practical, strategic approach to identity governance within a healthcare organization
White Paper
Internal Audit and Data Privacy
In our new white paper, our experts further explore the role of internal auditors in data privacy and practical ways the two teams can work together to mitigate risk.
Webinar
An Interview with Expedia Group’s Aaron Shan…
Aaron Shanas, Director of Cyber Defense at Expedia Group, graciously sat down with Focal Point's Justin Avery to discuss his personal philosophy on cybersecurity workforce development, how he trains his employees, and why some certifications may be overrated.
Blog
Privacy Shield Is Gone: Now What?
In a highly anticipated ruling on July 16, 2020, the Court of Justice of the European Union (CJEU) announced the immediate invalidation of the Privacy Shield agreement between the European Union (EU) and the United States (U.S.). Privacy Shield was a trans-Atlantic mechanism that allowed U.S. companies to freely transf…
Blog
Debunking Common Myths Around the DoD’s CMMC…
Which of these statements is true? Bananas grow on trees. The Great Wall of China can be seen from space. CMMC compliance won’t impact your work with the Department of Defense. The answer: none of them. The Cybersecurity Maturity Model Certification (CMMC) is the DoD’s new cybersecurity standard, and certification …
Webinar
Internal Audit and Cybersecurity: A Guide to Worki…
In this three-part webinar series, our Internal Audit team will sit down with leading cybersecurity experts to explore the different facets of a cybersecurity program and practical ways internal audit can work alongside cybersecurity teams to manage risk.
Posts navigation
1
2
3
4
5
…
15