Insights

Expert insights into the industry's hottest topics - from CCPA compliance to cloud security to purple team assessments. Search by topic or by content type (white paper, blog, case study, etc.) to find what you're looking for.
White Paper

Identity Governance in Healthcare

Use cases for building a practical, strategic approach to identity governance within a healthcare organization
White Paper

Internal Audit and Data Privacy

In our new white paper, our experts further explore the role of internal auditors in data privacy and practical ways the two teams can work together to mitigate risk.
Webinar

An Interview with Expedia Group’s Aaron Shan…

Aaron Shanas, Director of Cyber Defense at Expedia Group, graciously sat down with Focal Point's Justin Avery to discuss his personal philosophy on cybersecurity workforce development, how he trains his employees, and why some certifications may be overrated.
Blog

Privacy Shield Is Gone: Now What?

In a highly anticipated ruling on July 16, 2020, the Court of Justice of the European Union (CJEU) announced the immediate invalidation of the Privacy Shield agreement between the European Union (EU) and the United States (U.S.). Privacy Shield was a trans-Atlantic mechanism that allowed U.S. companies to freely transf…
Blog

Debunking Common Myths Around the DoD’s CMMC…

Which of these statements is true? Bananas grow on trees. The Great Wall of China can be seen from space. CMMC compliance won’t impact your work with the Department of Defense. The answer: none of them. The Cybersecurity Maturity Model Certification (CMMC) is the DoD’s new cybersecurity standard, and certification …
Webinar

Internal Audit and Cybersecurity: A Guide to Worki…

In this three-part webinar series, our Internal Audit team will sit down with leading cybersecurity experts to explore the different facets of a cybersecurity program and practical ways internal audit can work alongside cybersecurity teams to manage risk.
Blog

How to Get Started on the DoD’s CMMC Certifi…

Updated July 15, 2020 With more than 300,000 Department of Defense (DoD) companies and subcontractors essential to military operations, the defense industrial base (DIB) is a frequent and valuable target for malicious cyberattacks. Potential breaches of intellectual property in this sector could weaken U.S. defense cap…
Blog

Building Operational Agility in Healthcare: Focus …

If the past few months have taught us anything, it’s that healthcare organizations need to be able to scale – quickly, securely, and with patient care at the forefront. The key is operational agility. Operational agility is the ability to respond quickly to changing external conditions, without compromising long-te…
Blog

The Name of Your SOC Matters: Tips for Picking a N…

Focal Point has worked with a number of security operations teams, helping them advance their capabilities, execute on their strategies, and strengthen their skills. More often than not, we’re brought in because stakeholders don’t feel like their security operations are meeting the needs of the organization. When w…