Search

News Article

Focal Point Launches Digital Badging Program for Cybersecurity Professionals

Tampa, FL – Focal Point Data Risk, a leading data security firm, today announced the launch of its new digital badging…
Page

Digital Badges

Display your skill mastery or role proficiency with a digital badge from Focal Point Academy, signaling to current and future employers that you're ready to tackle big challenges.
Insight

A Closer Look at the AICPA’S SOC for Cybersecurity

Headline-making breaches. Compromised data. Regulatory Fines. Reputational damage. The threat of these consequences puts organizations under intense pressure to prove they are managing cybersecurity threats effectively and are prepared to handle an incident at any moment. With new data protection regulations like the GDPR  and CCPA passing every year, data security is becoming a bigger focus for many small and mid-sized organizations, leading them to ask:  Do we have enough protections in place to protect our critical data and our customers’ data? How can we prove that our security processes and policies are effectively managing these threats? How do we demonstrate the effectiveness our cybersecurity program to executive leadership and the board? How do we show our customers that we have security measures in place to protect their data?
Service

All Courses

Page

Thank you!

A Focal Point team member will be in touch shortly. In the meantime, join us on LinkedIn to get the…
Service

Cyber Threat Hunter

Sam is an incident responder with two years of experience. Sam will be participating in a development program to build threat-hunting capabilities.
Service

Malware Triage Analyst

Alex is an incident responder on her company’s cybersecurity team. After a year, she is looking to advance her skills. Her love for research and analysis makes her a perfect fit for malware triage analysis.
Service

Malware Reverse Engineer

Olivia is a software developer who has been with her company for 6 years. Through a company program, she has elected to complete cybersecurity training and is transitioning to a Reverse Engineering role.
Service

Cyber Threat Analyst I

Raj had been in an IT admin role at his old company for 4 years, growing into a senior admin. He is looking for an opportunity to start a career in cybersecurity.
New Search