Cyber School Student Login
Search
Solutions
Services
Company
Case Studies
Get In Touch
Featured
Cyber Threat Analyst Bootcamp
Learn More
Cyber Analyst Bootcamp
Career Outcomes
Testimonials
Curriculum and Labs
Instructors
Aptitude Assessment
Featured
Application Process
Learn More
Application Process
Bootcamp Dates
Pricing
Featured
Why Focal Point?
Learn More
About Focal Point Academy
Employer Perspective
FAQ
Featured
Secure and enable your remote workforce
Learn More
Initiatives
Remote Access Security
Cyber Workforce Development
IAM Modernization
Third Party Risk Management
Cloud Transformation
Privacy Compliance
Industry
Financial Services
Healthcare
Retail
Hospitality
Education
Technology
Manufacturing
Non-profit
Government
Featured
Explore Cloud Security Services
Learn More
Cyber Skills Development
Cyber Workforce Development Programs
Featured Learning Tracks
Executive Cyber Training
Virtual Learning
All Courses
Digital Badges
Cyber Strategy
Cyber Maturity Assessment
CMMC Certification Readiness
Cloud Security
DevSecOps Services
Cyber Workforce
PCI Compliance
IT Strategy
IT Organization Assessment
IT Governance and Risk Management
Digital Transformation
Application Portfolio Review
Business Continuity and Disaster Recovery
Penetration Testing
Network Security
Application Security
Social Engineering
Red Team and Purple Team Assessments
Identity and Access Management
Identity Governance
Rapid IAM Assessments
Privileged Remote Access
Managed Services
Data Privacy
Privacy Maturity Assessment
Privacy Gap Analysis and Remediation
Data Mapping
Privacy Office Services
CCPA Compliance
CPRA Compliance
GDPR Compliance
HIPAA Compliance
Risk & Compliance
Integrated Risk Management
Compliance
Third-Party Risk
ERP Services
Audit
Internal Audit
IT Audit
SOX Compliance
Digital Transformation Risk
Data Analytics
Featured
Focal Point Data Risk Joins CDW Corporation
Learn More
Life at Focal Point
Careers
News
Featured
Extrapolating DevSecOps: Principles to Apply Across Your Organization
Learn More
See All
Case Studies
Services
>
Data Privacy
>
CCPA Compliance
Services
Service
CCPA Compliance
The California Consumer Privacy Act of 2018 has been heralded by many as the strictest U.S. privacy law. Is your company compliant?
Service
Privacy Office Services
Bolster your staff without the hassle of hiring. We can extend your bandwidth quickly, developing new policies, redesigning processes, and managing the labor-intensive functions of your privacy program.
Service
Data Mapping
Data is the lifeblood of your organization, but it's impossible to protect if you don't know how it flows. Data mapping is the first and most important step in protecting your critical data assets.
Service
Privacy Strategy and Planning
Chasing compliance is a never-ending challenge. It's time to take a different approach. Stop scrambling and design a future-proof privacy program that will adapt with changing regulations.
Service
Privacy Gap Analysis and Remediation
In a world of fast-paced regulatory change and skyrocketing fines, there's little room for gaps in your compliance program. Aligning with laws like the GDPR and CCPA is the first step to building a stronger privacy program.
Service
Social Engineering
Focal Point offers both physical and electronic social engineering to test the human elements of your security program, evaluating the real-world security of your physical systems and employees.
Service
Application Security
Using a hybrid approach of automated and manual analysis, our team performs a comprehensive test of the security controls protecting your application's exposed user interface.
Service
Network Security
Focal Point’s network security services don’t just identify vulnerabilities – they demonstrate attack vectors against your security infrastructure. The goal is to determine the real-world effectiveness of your program.
Service
Business Continuity and Disaster Recovery
In today’s fast-paced business culture, unexpected downtime can cause your customers to flock to competitors. Focal Point can help you develop a strategy for preventing and recovering from these interruptions.
Posts navigation
1
…
3
4
5
6
7
8