Cyber School Student Login
Search
Solutions
Services
Company
Case Studies
Get In Touch
Featured
Cyber Threat Analyst Bootcamp
Learn More
Cyber Analyst Bootcamp
Career Outcomes
Testimonials
Curriculum and Labs
Instructors
Aptitude Assessment
Featured
Application Process
Learn More
Application Process
Bootcamp Dates
Pricing
Featured
Why Focal Point?
Learn More
About Focal Point Academy
Employer Perspective
FAQ
Featured
Secure and enable your remote workforce
Learn More
Initiatives
Remote Access Security
Cyber Workforce Development
IAM Modernization
Third Party Risk Management
Cloud Transformation
Privacy Compliance
Industry
Financial Services
Healthcare
Retail
Hospitality
Education
Technology
Manufacturing
Non-profit
Government
Featured
Explore Cloud Security Services
Learn More
Cyber Skills Development
Cyber Workforce Development Programs
Featured Learning Tracks
Executive Cyber Training
Virtual Learning
All Courses
Digital Badges
Cyber Strategy
Cyber Maturity Assessment
CMMC Certification Readiness
Cloud Security
DevSecOps Services
Cyber Workforce
PCI Compliance
IT Strategy
IT Organization Assessment
IT Governance and Risk Management
Digital Transformation
Application Portfolio Review
Business Continuity and Disaster Recovery
Penetration Testing
Network Security
Application Security
Social Engineering
Red Team and Purple Team Assessments
Identity and Access Management
Identity Governance
Rapid IAM Assessments
Privileged Remote Access
Managed Services
Data Privacy
Privacy Maturity Assessment
Privacy Gap Analysis and Remediation
Data Mapping
Privacy Office Services
CCPA Compliance
CPRA Compliance
GDPR Compliance
HIPAA Compliance
Risk & Compliance
Integrated Risk Management
Compliance
Third-Party Risk
ERP Services
Audit
Internal Audit
IT Audit
SOX Compliance
Digital Transformation Risk
Data Analytics
Featured
Focal Point Data Risk Joins CDW Corporation
Learn More
Life at Focal Point
Careers
News
Featured
Extrapolating DevSecOps: Principles to Apply Across Your Organization
Learn More
See All
Case Studies
Insights
Expert insights into the industry's hottest topics - from CCPA compliance to cloud security to purple team assessments. Search by topic or by content type (white paper, blog, case study, etc.) to find what you're looking for.
Blog
How to Get Started on the DoD’s CMMC Certifi…
Updated July 15, 2020 With more than 300,000 Department of Defense (DoD) companies and subcontractors essential to military operations, the defense industrial base (DIB) is a frequent and valuable target for malicious cyberattacks. Potential breaches of intellectual property in this sector could weaken U.S. defense cap…
Blog
Building Operational Agility in Healthcare: Focus …
If the past few months have taught us anything, it’s that healthcare organizations need to be able to scale – quickly, securely, and with patient care at the forefront. The key is operational agility. Operational agility is the ability to respond quickly to changing external conditions, without compromising long-te…
Blog
The Name of Your SOC Matters: Tips for Picking a N…
Focal Point has worked with a number of security operations teams, helping them advance their capabilities, execute on their strategies, and strengthen their skills. More often than not, we’re brought in because stakeholders don’t feel like their security operations are meeting the needs of the organization. When w…
Blog
The Countdown to CCPA Enforcement
The Covid-19 pandemic brought much of the world to a standstill, but one thing it has not impacted is the enforcement date for the California Consumer Privacy Act (CCPA). The CCPA, which went into effect on January 1 of this year, grants California residents new privacy rights for their personal information and is cons…
Webinar
An Interview with Cisco’s Mike Scheck: Cyber…
Mike Scheck, Sr. Director of Incident Command at Cisco Systems, graciously sat down with Focal Point's Justin Avery to discuss his strategy on hiring, training, and retaining employees on his cybersecurity team.
Blog
A Free Covid-19 Cyber Awareness Email Template
Since the end of February, phishing emails have spiked by over 600% as cyber attackers look to capitalize on the stress and uncertainty generated by the Covid-19 pandemic. The attackers behind these malicious emails typically pose as a trusted organization or a legitimate source (i.e., World Health Organization (WHO), …
Webinar
An Interview with Gary McIntyre: Why SOCs Suck and…
In this interview, Gary McIntyre, Managing Director of Focal Point's Cyber Defense practice and leading expert on SOC maturity, sits down with Justin Avery, our VP of Sales for Workforce Development, to discuss why many SOCs don't meet performance expectations.
Blog
3 Key Risks Threatening Cloud Security in 2020
For years now, organizations have resisted moving key enterprise systems to the cloud because of their concerns around cloud security. However, the idea that cloud offerings like IaaS, SaaS, and PaaS lack strong security controls is myth. In fact, Gartner posits that public cloud service providers (CSPs) are even more …
Webinar
Your Toolkit for Securing Remote Access
Guides, checklists, and tips for securing and enabling your remote workforce during global disruption
Posts navigation
1
2
3
4
5
6
…
15