Cyber School Student Login
Search
Solutions
Services
Company
Case Studies
Get In Touch
Featured
Cyber Threat Analyst Bootcamp
Learn More
Cyber Analyst Bootcamp
Career Outcomes
Testimonials
Curriculum and Labs
Instructors
Aptitude Assessment
Featured
Application Process
Learn More
Application Process
Bootcamp Dates
Pricing
Featured
Why Focal Point?
Learn More
About Focal Point Academy
Employer Perspective
FAQ
Featured
Secure and enable your remote workforce
Learn More
Initiatives
Remote Access Security
Cyber Workforce Development
IAM Modernization
Third Party Risk Management
Cloud Transformation
Privacy Compliance
Industry
Financial Services
Healthcare
Retail
Hospitality
Education
Technology
Manufacturing
Non-profit
Government
Featured
Explore Cloud Security Services
Learn More
Cyber Skills Development
Cyber Workforce Development Programs
Featured Learning Tracks
Executive Cyber Training
Virtual Learning
All Courses
Digital Badges
Cyber Strategy
Cyber Maturity Assessment
CMMC Certification Readiness
Cloud Security
DevSecOps Services
Cyber Workforce
PCI Compliance
IT Strategy
IT Organization Assessment
IT Governance and Risk Management
Digital Transformation
Application Portfolio Review
Business Continuity and Disaster Recovery
Penetration Testing
Network Security
Application Security
Social Engineering
Red Team and Purple Team Assessments
Identity and Access Management
Identity Governance
Rapid IAM Assessments
Privileged Remote Access
Managed Services
Data Privacy
Privacy Maturity Assessment
Privacy Gap Analysis and Remediation
Data Mapping
Privacy Office Services
CCPA Compliance
CPRA Compliance
GDPR Compliance
HIPAA Compliance
Risk & Compliance
Integrated Risk Management
Compliance
Third-Party Risk
ERP Services
Audit
Internal Audit
IT Audit
SOX Compliance
Digital Transformation Risk
Data Analytics
Featured
Focal Point Data Risk Joins CDW Corporation
Learn More
Life at Focal Point
Careers
News
Featured
Extrapolating DevSecOps: Principles to Apply Across Your Organization
Learn More
See All
Case Studies
Insights
Expert insights into the industry's hottest topics - from CCPA compliance to cloud security to purple team assessments. Search by topic or by content type (white paper, blog, case study, etc.) to find what you're looking for.
Webinar
Upgrading to S/4 HANA with a Security and Complian…
Learn the most important security, compliance, and GRC considerations BEFORE making the upgrade to SAP S/4 HANA
Webinar
An Internal Auditor’s Guide to Data Privacy
Practical strategies for addressing privacy risk designed for internal audit teams
Blog
7 Tips for Securing Your Privacy on Video Conferen…
Note: In late May, Zoom released version 5.0 of its videoconferencing platform, which addresses a number of security and privacy concerns. A list of these updates can be found here: https://zoom.us/docs/en-us/zoom-v5-0.html. The Covid-19 pandemic has restricted the movement of millions of people, and many companies hav…
Webinar
Protecting Your Office Away from the Office
How organizations can secure remote access for employees and third parties
Webinar
You Rolled Out VPN and MFA: Now What?
How to build a phased approach to remote access and streamline your MFA implementation.
Webinar
SecOps Under Crisis
Building and maintaining SOC resiliency, even during periods of crisis. How to structure your SOC, manage inconsistent workforce, and remain secure...
Blog
What You Need to Know about Brazil’s New Persona…
Updated April 10, 2020 The implementation of the EU’s General Data Protection Regulation (GDPR) unleashed a wave of new privacy legislation across the world, spreading across the Atlantic to Brazil. On August 14, 2018, the Brazilian Federal Senate signed the Brazilian Personal Data Protection Regulation, referred to …
Blog
Cookies and Compliance: How Key Data Privacy Regul…
Using online cookies has become ubiquitous among organizations across all industries due to their ability to enhance and simplify user experience and to inform the business on its client base. However, since cookies allow businesses to track, store, and share user behavior, cookies are now the source of privacy concern…
Blog
Privileged Account Onboarding: Are You Asking the …
In 2020, there are a host of privileged access management (PAM) tools available, each with their own set of cool features. But the success of your PAM solution implementation isn’t solely reliant on the PAM provider you choose, but also on how your organization defines and views PAM. Regardless of which PAM platform(…
Posts navigation
1
…
3
4
5
6
7
…
15