Cyber School Student Login
Search
Solutions
Services
Company
Case Studies
Get In Touch
Featured
Cyber Threat Analyst Bootcamp
Learn More
Cyber Analyst Bootcamp
Career Outcomes
Testimonials
Curriculum and Labs
Instructors
Aptitude Assessment
Featured
Application Process
Learn More
Application Process
Bootcamp Dates
Pricing
Featured
Why Focal Point?
Learn More
About Focal Point Academy
Employer Perspective
FAQ
Featured
Secure and enable your remote workforce
Learn More
Initiatives
Remote Access Security
Cyber Workforce Development
IAM Modernization
Third Party Risk Management
Cloud Transformation
Privacy Compliance
Industry
Financial Services
Healthcare
Retail
Hospitality
Education
Technology
Manufacturing
Non-profit
Government
Featured
Explore Cloud Security Services
Learn More
Cyber Skills Development
Cyber Workforce Development Programs
Featured Learning Tracks
Executive Cyber Training
Virtual Learning
All Courses
Digital Badges
Cyber Strategy
Cyber Maturity Assessment
CMMC Certification Readiness
Cloud Security
DevSecOps Services
Cyber Workforce
PCI Compliance
IT Strategy
IT Organization Assessment
IT Governance and Risk Management
Digital Transformation
Application Portfolio Review
Business Continuity and Disaster Recovery
Penetration Testing
Network Security
Application Security
Social Engineering
Red Team and Purple Team Assessments
Identity and Access Management
Identity Governance
Rapid IAM Assessments
Privileged Remote Access
Managed Services
Data Privacy
Privacy Maturity Assessment
Privacy Gap Analysis and Remediation
Data Mapping
Privacy Office Services
CCPA Compliance
CPRA Compliance
GDPR Compliance
HIPAA Compliance
Risk & Compliance
Integrated Risk Management
Compliance
Third-Party Risk
ERP Services
Audit
Internal Audit
IT Audit
SOX Compliance
Digital Transformation Risk
Data Analytics
Featured
Focal Point Data Risk Joins CDW Corporation
Learn More
Life at Focal Point
Careers
News
Featured
Extrapolating DevSecOps: Principles to Apply Across Your Organization
Learn More
See All
Case Studies
Search
Search Term
Topic
All Topics...
Audit Insights
Compliance
Cyber Risk
Cyber Workforce
Cybersecurity
Data Protection Laws
Enterprise Risk
Identity
IT Risk
Privacy Risk
Product and Service Updates
Templates
Threat and Vulnerability
Trends & Research
Type
All Types...
Insights
Pages
Services
Initiatives
Industries
News Articles
People
Go
Service
HIPAA Compliance
As healthcare operations and technologies evolve, your HIPAA compliance program must adapt.
Service
GDPR Compliance
The GDPR put privacy in the global spotlight. Is your program aligned with the new data protection gold standard?
Service
CCPA Compliance
The California Consumer Privacy Act of 2018 has been heralded by many as the strictest U.S. privacy law. Is your company compliant?
Service
Privacy Office Services
Bolster your staff without the hassle of hiring. We can extend your bandwidth quickly, developing new policies, redesigning processes, and managing the labor-intensive functions of your privacy program.
Service
Data Mapping
Data is the lifeblood of your organization, but it's impossible to protect if you don't know how it flows. Data mapping is the first and most important step in protecting your critical data assets.
Service
Privacy Strategy and Planning
Chasing compliance is a never-ending challenge. It's time to take a different approach. Stop scrambling and design a future-proof privacy program that will adapt with changing regulations.
Service
Privacy Gap Analysis and Remediation
In a world of fast-paced regulatory change and skyrocketing fines, there's little room for gaps in your compliance program. Aligning with laws like the GDPR and CCPA is the first step to building a stronger privacy program.
Service
Social Engineering
Focal Point offers both physical and electronic social engineering to test the human elements of your security program, evaluating the real-world security of your physical systems and employees.
Service
Application Security
Using a hybrid approach of automated and manual analysis, our team performs a comprehensive test of the security controls protecting your application's exposed user interface.
Posts navigation
1
…
19
20
21
22
23
…
35
New Search