Get In Touch
Modernize your IAM program
Cyber Workforce Development
Third Party Risk Management
Explore Red Team and Purple Team Assessments
Cyber Skills Development
Cyber Workforce Development Programs
Featured Learning Tracks
Executive Cyber Training
Cyber Training for Auditors
Cyber Strategy Assessment
AICPA SOC for Cybersecurity
IT Organization Assessment
IT Governance and Risk Management
Application Portfolio Review
Business Continuity and Disaster Recovery
Red Team and Purple Team Assessments
PCI Pen Testing and ASV Scans
Identity and Access Management
Rapid IAM Assessments
Privileged Remote Access
Privacy Assessments and Gap Remediation
Privacy Strategy and Planning
Privacy Office Services
Risk & Compliance
Focal Point Launches Digital Badging Program
Life at Focal Point
Your CCPA Starter Kit
Data Protection Laws
Product and Service Updates
Threat and Vulnerability
Trends & Research
A Focal Point team member will be in touch shortly. In the meantime, join us on LinkedIn to get the…
Cyber Threat Hunter
Sam is an incident responder with two years of experience. Sam will be participating in a development program to build threat-hunting capabilities.
Malware Triage Analyst
Alex is an incident responder on her company’s cybersecurity team. After a year, she is looking to advance her skills. Her love for research and analysis makes her a perfect fit for malware triage analysis.
Malware Reverse Engineer
Olivia is a software developer who has been with her company for 6 years. Through a company program, she has elected to complete cybersecurity training and is transitioning to a Reverse Engineering role.
SOC Analyst 1
Raj had been in an IT admin role at his old company for 4 years, growing into a senior admin. He is looking for an opportunity to start a career in cybersecurity.
The HITRUST CSF® provides organizations with a comprehensive, flexible, and efficient approach to regulatory compliance and risk management.
A SOC 2 report provides your customers with assurance that your organization has operational controls in place to protect their security, availability, processing integrity, confidentiality, and privacy.
A SOC 1 report can take your client relationships to the next level by providing assurance that your organization has the controls in place to protect their financial reporting processes.
Rapid IAM Assessments
Measure your identity and access management maturity with a targeted assessment and actionable roadmap.