Cyber School Student Login
Search
Solutions
Services
Company
Case Studies
Get In Touch
Featured
Cyber Threat Analyst Bootcamp
Learn More
Cyber Analyst Bootcamp
Career Outcomes
Testimonials
Curriculum and Labs
Instructors
Aptitude Assessment
Featured
Application Process
Learn More
Application Process
Bootcamp Dates
Pricing
Featured
Why Focal Point?
Learn More
About Focal Point Academy
Employer Perspective
FAQ
Featured
Secure and enable your remote workforce
Learn More
Initiatives
Remote Access Security
Cyber Workforce Development
IAM Modernization
Third Party Risk Management
Cloud Transformation
Privacy Compliance
Industry
Financial Services
Healthcare
Retail
Hospitality
Education
Technology
Manufacturing
Non-profit
Government
Featured
Explore Cloud Security Services
Learn More
Cyber Skills Development
Cyber Workforce Development Programs
Featured Learning Tracks
Executive Cyber Training
Virtual Learning
All Courses
Digital Badges
Cyber Strategy
Cyber Maturity Assessment
CMMC Certification Readiness
Cloud Security
DevSecOps Services
Cyber Workforce
PCI Compliance
IT Strategy
IT Organization Assessment
IT Governance and Risk Management
Digital Transformation
Application Portfolio Review
Business Continuity and Disaster Recovery
Penetration Testing
Network Security
Application Security
Social Engineering
Red Team and Purple Team Assessments
Identity and Access Management
Identity Governance
Rapid IAM Assessments
Privileged Remote Access
Managed Services
Data Privacy
Privacy Maturity Assessment
Privacy Gap Analysis and Remediation
Data Mapping
Privacy Office Services
CCPA Compliance
CPRA Compliance
GDPR Compliance
HIPAA Compliance
Risk & Compliance
Integrated Risk Management
Compliance
Third-Party Risk
ERP Services
Audit
Internal Audit
IT Audit
SOX Compliance
Digital Transformation Risk
Data Analytics
Featured
Focal Point Data Risk Joins CDW Corporation
Learn More
Life at Focal Point
Careers
News
Featured
Extrapolating DevSecOps: Principles to Apply Across Your Organization
Learn More
See All
Case Studies
Insights
Expert insights into the industry's hottest topics - from CCPA compliance to cloud security to purple team assessments. Search by topic or by content type (white paper, blog, case study, etc.) to find what you're looking for.
Blog
4 Free Cybersecurity Awareness Email Templates To …
Check out our Covid-19 cyber awareness email template here. The 2019 Verizon Data Breach Report identified phishing as the number one cause of data breaches and the most disruptive type of cyberattack. These schemes are common because: They're easy. Even novice criminals can execute a phishing scheme…
Blog
Recent Data Breaches and Increasing Standards of C…
Last year, there were over 2,000 confirmed data breaches. While most breaches highlighted in the media occur at large, well-known companies, those that happen at smaller companies can still have a devastating impact on consumers and result in severe consequences. Two unrelated web-based companies, i-Dressup and ClixSen…
Blog
What You Should Know about NIST’s New Privac…
A recent Cisco study found that 80% of consumers are willing to act to protect their privacy, saying they would spend more time and money to do so and that they consider it a buying factor. Nearly half of these respondents also indicated that they had switched companies over data privacy policies or data sharing practi…
Blog
Choosing the Right Privacy Governance Tool for you…
Ninety percent of the world’s data was generated over the last two years. By 2025, it’s estimated that over 460 exabytes of data will be created every day. While this flood of data has become indispensable for performing daily tasks in most organizations, the mismanagement or loss of it could result in operational …
Blog
4 Ways Your Current Cybersecurity Training Strateg…
Less than 30% of organizations have formal workforce development plans in place for their IT and security staff, according to Gartner. With training consistently ranking among the most requested benefits by employees, especially those of younger generations, the lack of commitment to workforce development is particular…
Blog
The Future of Internal Audit: 10 Audit Trends to P…
Today’s businesses must be constantly evolving to meet changing business models, new regulatory requirements, technology innovations, and an increase in cyberattacks. To help businesses meet these new challenges, internal audit (IA) functions must evolve as well. While internal audit is not the sole owner of risk wit…
Blog
The Top 8 Cyber Workforce Development Trends for 2…
It’s prediction season! In 2019, we discussed cyber workforce development with hundreds of security leaders, including many CISOs from Fortune 500 companies in the technology, retail, financial services, and healthcare space, as well as top cybersecurity workforce experts in the U.S. government and military. As …
Blog
9 Data Privacy Trends to Watch in 2020
The General Data Protection Regulation (GDPR) may have pushed data privacy into the spotlight in 2017 and 2018, but in 2019, privacy became a global superstar. Privacy has become a major debate in the U.S. as companies rushed to comply with the California Consumer Protection Act (CCPA), and more states introduce t…
Blog
5 Reasons Private Companies Should Start on ASC 84…
When the Financial Accounting Standards Board (FASB) officially delayed the effective date for the ASC 842 lease accounting standard until January 2021, many private companies breathed a sigh of relief. After having to adopt the new revenue standard ASC 606 last year, implementing another major accounting standard imme…
Posts navigation
1
…
4
5
6
7
8
…
15