Cyber School Student Login
Search
Solutions
Services
Company
Case Studies
Get In Touch
Featured
Cyber Threat Analyst Bootcamp
Learn More
Cyber Analyst Bootcamp
Career Outcomes
Testimonials
Curriculum and Labs
Instructors
Aptitude Assessment
Featured
Application Process
Learn More
Application Process
Bootcamp Dates
Pricing
Featured
Why Focal Point?
Learn More
About Focal Point Academy
Employer Perspective
FAQ
Featured
Secure and enable your remote workforce
Learn More
Initiatives
Remote Access Security
Cyber Workforce Development
IAM Modernization
Third Party Risk Management
Cloud Transformation
Privacy Compliance
Industry
Financial Services
Healthcare
Retail
Hospitality
Education
Technology
Manufacturing
Non-profit
Government
Featured
Explore Cloud Security Services
Learn More
Cyber Skills Development
Cyber Workforce Development Programs
Featured Learning Tracks
Executive Cyber Training
Virtual Learning
All Courses
Digital Badges
Cyber Strategy
Cyber Maturity Assessment
CMMC Certification Readiness
Cloud Security
DevSecOps Services
Cyber Workforce
PCI Compliance
IT Strategy
IT Organization Assessment
IT Governance and Risk Management
Digital Transformation
Application Portfolio Review
Business Continuity and Disaster Recovery
Penetration Testing
Network Security
Application Security
Social Engineering
Red Team and Purple Team Assessments
Identity and Access Management
Identity Governance
Rapid IAM Assessments
Privileged Remote Access
Managed Services
Data Privacy
Privacy Maturity Assessment
Privacy Gap Analysis and Remediation
Data Mapping
Privacy Office Services
CCPA Compliance
CPRA Compliance
GDPR Compliance
HIPAA Compliance
Risk & Compliance
Integrated Risk Management
Compliance
Third-Party Risk
ERP Services
Audit
Internal Audit
IT Audit
SOX Compliance
Digital Transformation Risk
Data Analytics
Featured
Focal Point Data Risk Joins CDW Corporation
Learn More
Life at Focal Point
Careers
News
Featured
Extrapolating DevSecOps: Principles to Apply Across Your Organization
Learn More
See All
Case Studies
Search
Search Term
Topic
All Topics...
Audit Insights
Compliance
Cyber Risk
Cyber Workforce
Cybersecurity
Data Protection Laws
Enterprise Risk
Identity
IT Risk
Privacy Risk
Product and Service Updates
Templates
Threat and Vulnerability
Trends & Research
Type
All Types...
Insights
Pages
Services
Initiatives
Industries
News Articles
People
Go
Service
Network Security
Focal Point’s network security services don’t just identify vulnerabilities – they demonstrate attack vectors against your security infrastructure. The goal is to determine the real-world effectiveness of your program.
Service
Business Continuity and Disaster Recovery
In today’s fast-paced business culture, unexpected downtime can cause your customers to flock to competitors. Focal Point can help you develop a strategy for preventing and recovering from these interruptions.
Service
Application Portfolio Review
Too much software? Not sure if you're getting enough value from the tools you have? Focal Point can help rationalize your application portfolio, reducing licensing fees and improving security outcomes.
Service
Digital Transformation
Unlock innovation and revolutionize customer experiences, revenue streams, and internal processes through digital transformation. Focal Point can support from strategy development through execution.
Service
IT Governance and Risk Management
Focal Point can help you determine whether your IT policies, procedures, infrastructure, applications, and security posture are aligned with your organization’s short- and long-term business objectives.
Service
IT Organization Assessment
Strengthen your IT team and equip them with the skills, resources, and tools they need to better protect your organization.
Service
PCI Compliance
The PCI DSS is the benchmark for securing payment card data, but compliance with the PCI DSS can be complicated, especially for large, global organizations.
Service
Cloud Security Assessment
Cloud spending is projected to reach a total of $214.3 billion in 2019, according to Gartner. While cloud transformation is exciting, cloud migrations also present a number of new cyber risks and challenges.
Service
Cyber Workforce
Posts navigation
1
…
20
21
22
23
24
…
35
New Search