Focal Point of View Header 2

Focal Point of View

What You Need to Know about Brazil’s New Personal Data Protection Regulation Now

Privacy Updates

What You Need to Know about Brazil’s New Personal Data Protection Regulation Now

How to Spot Hidden Cyber Security Talent at your Company

Cybersecurity

How to Spot Hidden Cyber Security Talent at your Company

Why the EU-Japan Data Transfer Agreement Is So Significant

Privacy Updates

Why the EU-Japan Data Transfer Agreement Is So Significant

When is a DPIA Required under the GDPR?

Privacy Updates

When is a DPIA Required under the GDPR?

Regulation Comparison: The California Consumer Privacy Act and the GDPR

Privacy Updates

Regulation Comparison: The California Consumer Privacy Act and the GDPR

How to Use Vendor Profiles to Address Third-Party Risk

Privacy Updates

How to Use Vendor Profiles to Address Third-Party Risk

A Look at the New California Consumer Privacy Act of 2018

Privacy Updates

A Look at the New California Consumer Privacy Act of 2018

What You Need to Know about Colorado’s New Data Protection Law

Privacy Updates

What You Need to Know about Colorado’s New Data Protection Law

Quick FAQ: Responding to Data Subject Requests under the GDPR

Privacy Updates

Quick FAQ: Responding to Data Subject Requests under the GDPR

4 Hurdles Standing between You and Effective Vendor Risk Management

Privacy Updates

4 Hurdles Standing between You and Effective Vendor Risk Management

How Leveraging ISO 27000 and NIST Frameworks Can Help You Align with the GDPR

Privacy Updates

How Leveraging ISO 27000 and NIST Frameworks Can Help You Align with the GDPR

A Roundup of Our Most Popular GDPR Resources and Guides

Privacy Updates

A Roundup of Our Most Popular GDPR Resources and Guides

What is Integrated Risk Management?

Enterprise Risk

What is Integrated Risk Management?

Data Privacy in Paradise: A Look at the Privacy Regulations of Bermuda and the British Virgin Islands

Privacy Updates

Data Privacy in Paradise: A Look at the Privacy Regulations of Bermuda and the British Virgin Islands

Understanding the DPO and EU Representative Roles under the GDPR

Privacy Updates

Understanding the DPO and EU Representative Roles under the GDPR

A PCI DSS Update Is Coming: What You Need to Know about PCI DSS v3.2.1

Cyber News

A PCI DSS Update Is Coming: What You Need to Know about PCI DSS v3.2.1

Beyond the GDPR: What You Should Know about Japan’s Act on the Protection of Personal Information

Privacy Updates

Beyond the GDPR: What You Should Know about Japan’s Act on the Protection of Personal Information

Understanding the 4 Phases of the NYDFS Cybersecurity Regulation (23 NYCRR 500)

Cybersecurity

Understanding the 4 Phases of the NYDFS Cybersecurity Regulation (23 NYCRR 500)

What’s Inside South Dakota and Alabama’s New Data Breach Notification Laws?

Privacy Updates

What’s Inside South Dakota and Alabama’s New Data Breach Notification Laws?

The ePrivacy Regulation and the GDPR: What You Need to Know Now

Privacy Updates

The ePrivacy Regulation and the GDPR: What You Need to Know Now

Beyond the GDPR: What You Should Know about the Philippines’ Data Privacy Act of 2012

Privacy Updates

Beyond the GDPR: What You Should Know about the Philippines’ Data Privacy Act of 2012

The Keys to a Seamless FASB ASC 842 Implementation

Audit Insights

The Keys to a Seamless FASB ASC 842 Implementation

What Are the Reasons Behind the Cyber Security Talent Shortage?

Cyber Workforce

What Are the Reasons Behind the Cyber Security Talent Shortage?

Does Your Marketing Strategy Align with the GDPR?

Privacy Updates

Does Your Marketing Strategy Align with the GDPR?

A Step-by-Step Checklist for Meeting GDPR Consent Requirements

Privacy Updates

A Step-by-Step Checklist for Meeting GDPR Consent Requirements

One RSA Session You Should Definitely Reserve a Seat For

Trends & Research

One RSA Session You Should Definitely Reserve a Seat For

A Quick Guide to the Biggest Updates in the SEC's Guidance on Cyber Security Disclosures

Cyber News

A Quick Guide to the Biggest Updates in the SEC's Guidance on Cyber Security Disclosures

How Big Is the Cyber Security Talent Shortage?

Cyber Workforce

How Big Is the Cyber Security Talent Shortage?

9 Examples of Lawful Basis for Processing under the GDPR

Privacy Updates

9 Examples of Lawful Basis for Processing under the GDPR

Christie Verscharen, Cyber Security Expert and Business Leader

The Women Closing the Cyber Security Gender Gap

Christie Verscharen, Cyber Security Expert and Business Leader

A Straightforward, Easy-to-Navigate Guide to GDPR Member State Derogations

Privacy Updates

A Straightforward, Easy-to-Navigate Guide to GDPR Member State Derogations

Free Remote Access Policy Template

Cybersecurity

Free Remote Access Policy Template

Be a Part of the 2018 Cyber Balance Sheet Report and Summit

Trends & Research

Be a Part of the 2018 Cyber Balance Sheet Report and Summit

Predicting 2018's Biggest Stories in Cyber Security

Cybersecurity

Predicting 2018's Biggest Stories in Cyber Security

4 Common Mistakes Companies Make When Hiring Cyber Security Professionals

Cyber Workforce

4 Common Mistakes Companies Make When Hiring Cyber Security Professionals

Our Most-Read Blog Posts of 2017

Media Roundup

Our Most-Read Blog Posts of 2017

LaTonya Hall, Cyber Entrepreneur and Security Consultant

The Women Closing the Cyber Security Gender Gap

LaTonya Hall, Cyber Entrepreneur and Security Consultant

Travel Agencies Get New PCI Compliance Deadline from IATA

Cyber News

Travel Agencies Get New PCI Compliance Deadline from IATA

The 5 Most In-Demand Cyber Security Jobs for 2018

Cyber Workforce

The 5 Most In-Demand Cyber Security Jobs for 2018

Free Cyber Security Email Template: Physical Security of Laptops and Mobile Devices

Templates

Free Cyber Security Email Template: Physical Security of Laptops and Mobile Devices

A Free Password Policy Template for 2018

Cybersecurity

A Free Password Policy Template for 2018

Franchesca Sanabria, Privacy Guru and Business Leader

The Women Closing the Cyber Security Gender Gap

Franchesca Sanabria, Privacy Guru and Business Leader

Postmodern ERM: Stakeholder-Centric Metrics and COSO's Vision

Enterprise Risk

Postmodern ERM: Stakeholder-Centric Metrics and COSO's Vision

The Eightfold Path for Enterprise Risk Management

Enterprise Risk

The Eightfold Path for Enterprise Risk Management

Kelly Schmitz, Cyber Security Instructor

The Women Closing the Cyber Security Gender Gap

Kelly Schmitz, Cyber Security Instructor

The 11%: A Look at the Women Closing the Cyber Security Gender Gap

Cybersecurity

The 11%: A Look at the Women Closing the Cyber Security Gender Gap

Free Template: Clean Desk Policy

Cybersecurity

Free Template: Clean Desk Policy

Why Aren't Passwords Dead Yet?

Cybersecurity

Why Aren't Passwords Dead Yet?

Phishing Case Studies: How Attackers are Taking their Time, and Taking your Money 

Cybersecurity

Phishing Case Studies: How Attackers are Taking their Time, and Taking your Money 

Free Template: Social Media Security Policy

Cybersecurity

Free Template: Social Media Security Policy

Continuous Auditing: Changing the Way You Think About Risk

Audit Insights

Continuous Auditing: Changing the Way You Think About Risk

How to Find Success at your Next Career Fair

Inside Focal Point

How to Find Success at your Next Career Fair

Chaos is a Ladder: How Hackers are Attempting to Get Rich by Creating Chaos at HBO

Cyber News

Chaos is a Ladder: How Hackers are Attempting to Get Rich by Creating Chaos at HBO

10 Months to Go: The Biggest GDPR Questions

Privacy Updates

10 Months to Go: The Biggest GDPR Questions

Focal Point Named a TBBJ Fast 50 Company

Inside Focal Point

Focal Point Named a TBBJ Fast 50 Company

11 Things Your Company Should Be Doing Now to Protect against Attacks like NotPetya

Cyber News

11 Things Your Company Should Be Doing Now to Protect against Attacks like NotPetya

Crown Jewels: The Most Important Assessment You're Not Conducting

Cybersecurity

Crown Jewels: The Most Important Assessment You're Not Conducting

4 Free Cyber Security Awareness Email Templates To Use at Your Company

Templates

4 Free Cyber Security Awareness Email Templates To Use at Your Company

Measuring Security and the Financial Impact of Data Breaches

Cybersecurity

Measuring Security and the Financial Impact of Data Breaches

Will Trump's Executive Order Reshape Cyber Training?

Cyber News

Will Trump's Executive Order Reshape Cyber Training?

Trump's Cybersecurity Executive Order Adds Urgency

Cyber News

Trump's Cybersecurity Executive Order Adds Urgency

OWASP Suggests Updates to Top 10 for 2017

Cyber News

OWASP Suggests Updates to Top 10 for 2017

Three Things We Learned at Cyber Shield 2017

Cyber Workforce

Three Things We Learned at Cyber Shield 2017

Focal Point Releases Malware Analysis of Android X-Agent Implant

Cyber News

Focal Point Releases Malware Analysis of Android X-Agent Implant

What They're Saying About the Cyber Balance Sheet Report

Trends & Research

What They're Saying About the Cyber Balance Sheet Report

What The Board Wants CISOs to Know

Trends & Research

What The Board Wants CISOs to Know

5 Tips for Communicating Cyber Risk to the Board

Cybersecurity

5 Tips for Communicating Cyber Risk to the Board

HIPAA Risk Analysis - More Effective Before A Breach

Privacy Updates

HIPAA Risk Analysis - More Effective Before A Breach

The Cyber Balance Sheet Report is Here!

Cybersecurity

The Cyber Balance Sheet Report is Here!

10 Strategies for Remediating SoDs

Audit Insights

10 Strategies for Remediating SoDs

Simplifying HIPAA Compliance for Business Associates

Privacy Updates

Simplifying HIPAA Compliance for Business Associates

Who is Focal Point?

Inside Focal Point

Who is Focal Point?

NIST Issues Guidelines on Systems Security Engineering

Cyber News

NIST Issues Guidelines on Systems Security Engineering

Federal Regulators Propose Heightened Cyber Security Standards for Banks

Cyber News

Federal Regulators Propose Heightened Cyber Security Standards for Banks

Are You Ready for Model Audit Rule in 2017?

Audit Insights

Are You Ready for Model Audit Rule in 2017?

Is the IoT Putting You at Risk?

Cybersecurity

Is the IoT Putting You at Risk?

5 Tips for a Great Internal Audit Analytics Program

Audit Insights

5 Tips for a Great Internal Audit Analytics Program

Infographic: When Fraud Goes Unchecked

Audit Insights

Infographic: When Fraud Goes Unchecked

AICPA Proposes New Criteria for Cybersecurity Risk Management

Cybersecurity

AICPA Proposes New Criteria for Cybersecurity Risk Management

Focal Point Media Roundup - August 2016

Media Roundup

Focal Point Media Roundup - August 2016

Focal Point Media Roundup - July 2016

Media Roundup

Focal Point Media Roundup - July 2016

The Evolution of IDaaS

Identity Governance

The Evolution of IDaaS

Infographic: The Magnitude of Third-Party Risk

Cybersecurity

Infographic: The Magnitude of Third-Party Risk

Cyber Strategies for Modern Adversaries

Cybersecurity

Cyber Strategies for Modern Adversaries

Insights From The PCAOB's 2015 Inspection Reports

Audit Insights

Insights From The PCAOB's 2015 Inspection Reports

2016 Data Breach Notification Trends

Trends & Research

2016 Data Breach Notification Trends

Ask The Experts: Password Security

Cybersecurity

Ask The Experts: Password Security

Infographic: 2016 Data Privacy Trends

Trends & Research

Infographic: 2016 Data Privacy Trends