Preparing for 2023: A United States Consumer Privacy Legislation Update

Data Protection Laws

Preparing for 2023: A United States Consumer Privacy Legislation Update

What You Need to Know About the Connecticut Data Privacy Act (CTDPA)

Data Protection Laws

What You Need to Know About the Connecticut Data Privacy Act (CTDPA)

A Closer Look at the Utah Consumer Privacy Act (UCPA)

Data Protection Laws

A Closer Look at the Utah Consumer Privacy Act (UCPA)

Understanding China's New Draft Measures on Cross-Border Data Transfers

Data Protection Laws

Understanding China's New Draft Measures on Cross-Border Data Transfers

Three Cloud Security Challenges and How to Overcome Them

Cyber Risk

Three Cloud Security Challenges and How to Overcome Them

The 8 Cyber Defense Trends to Watch in 2022

Cyber Risk

The 8 Cyber Defense Trends to Watch in 2022

Six Identity and Access Management Trends to Watch in 2022

Identity

Six Identity and Access Management Trends to Watch in 2022

9 Data Privacy Trends to Watch in 2022

Privacy Risk

9 Data Privacy Trends to Watch in 2022

Three Lessons Learned from 2021 Cybersecurity Events

Three Lessons Learned from 2021 Cybersecurity Events

The 5 Most In-Demand Cybersecurity Jobs for 2022

Cyber Workforce

The 5 Most In-Demand Cybersecurity Jobs for 2022

What You Need to Know About the Newly Released CMMC 2.0

Cyber Risk

What You Need to Know About the Newly Released CMMC 2.0

Log4Shell Explained: What it is and How to Fix it

Cyber Risk

Log4Shell Explained: What it is and How to Fix it

Understanding How China's PIPL Compares to the EU's GDPR

Data Protection Laws

Understanding How China's PIPL Compares to the EU's GDPR

Your Guide to China's New Privacy Law: The Personal Information Protection Law (PIPL)

Data Protection Laws

Your Guide to China's New Privacy Law: The Personal Information Protection Law (PIPL)

Preparing for the CPRA Look-Back Provision

Data Protection Laws

Preparing for the CPRA Look-Back Provision

Getting Started with DevSecOps: The First 90 Days

Cyber Risk

Getting Started with DevSecOps: The First 90 Days

China's New Data Security Law (DSL): What You Need To Know

Privacy Risk

China's New Data Security Law (DSL): What You Need To Know

Navigating Cross-Border Data Transfers after the Invalidation of Privacy Shield

Privacy Risk

Navigating Cross-Border Data Transfers after the Invalidation of Privacy Shield

Six Ways DevSecOps Will Transform Your Organization

Cyber Risk

Six Ways DevSecOps Will Transform Your Organization

Keeping Up With California: A Look at Virginia's Consumer Data Protection Act (CDPA)

Privacy Risk

Keeping Up With California: A Look at Virginia's Consumer Data Protection Act (CDPA)

What You Need to Know about the New Colorado Privacy Act

Privacy Risk

What You Need to Know about the New Colorado Privacy Act

Geolocation and Covid-19: Tracking the Response to the Global Pandemic

Privacy Risk

Geolocation and Covid-19: Tracking the Response to the Global Pandemic

Value by Design: Tips for Integrating Privacy and Security into your DevOps Processes

Privacy Risk

Value by Design: Tips for Integrating Privacy and Security into your DevOps Processes

These 8 Identity and Access Management Trends Should Be on Your Radar

Identity

These 8 Identity and Access Management Trends Should Be on Your Radar

A Geolocation and Data Privacy FAQ

Privacy Risk

A Geolocation and Data Privacy FAQ

How to Navigate Geolocation and Data Protection Laws

Data Protection Laws

How to Navigate Geolocation and Data Protection Laws

Six Questions to Ask Your PCI QSA before Your Next Assessment

Cyber Risk

Six Questions to Ask Your PCI QSA before Your Next Assessment

How to Achieve the CMMC Level 5 Certification

Cyber Risk

How to Achieve the CMMC Level 5 Certification

The 5 Most In-Demand Cybersecurity Jobs for 2021

Cyber Workforce

The 5 Most In-Demand Cybersecurity Jobs for 2021

Even More Changes Coming to the CCPA

Data Protection Laws

Even More Changes Coming to the CCPA

A Closer Look at the Proposed Changes Issued to the HIPAA Privacy Rule

Compliance

A Closer Look at the Proposed Changes Issued to the HIPAA Privacy Rule

The 7 Audit Trends to Prepare for in 2021

Audit Insights

The 7 Audit Trends to Prepare for in 2021

Know Your Landscape: Performing Cloud Security Assessments Engineered to Last

Cyber Risk

Know Your Landscape: Performing Cloud Security Assessments Engineered to Last

The Future of Security Operations after the SolarWinds Orion Attack

Cyber Risk

The Future of Security Operations after the SolarWinds Orion Attack

Five DevSecOps Lessons from the SolarWinds Orion Attack

Cyber Risk

Five DevSecOps Lessons from the SolarWinds Orion Attack

Nine Data Privacy Trends to Watch in 2021

Privacy Risk

Nine Data Privacy Trends to Watch in 2021

How to Achieve the CMMC Level 4 Certification

Cyber Risk

How to Achieve the CMMC Level 4 Certification

How to Achieve the CMMC Level 3 Certification

Cyber Risk

How to Achieve the CMMC Level 3 Certification

How to Achieve the CMMC Level 2 Certification

Cyber Risk

How to Achieve the CMMC Level 2 Certification

How to Achieve the CMMC Level 1 Certification

Cyber Risk

How to Achieve the CMMC Level 1 Certification

The Final Countdown: The CCPA’S Employee Information Exemption Ends in January

Data Protection Laws

The Final Countdown: The CCPA’S Employee Information Exemption Ends in January

The California Privacy Rights Act (CPRA): Is it the CCPA 2.0?

Data Protection Laws

The California Privacy Rights Act (CPRA): Is it the CCPA 2.0?

Choosing the Right Approach for Upgrading to SAP S/4 HANA

Audit Insights

Choosing the Right Approach for Upgrading to SAP S/4 HANA

Privacy Shield Is Gone: Now What?

Data Protection Laws

Privacy Shield Is Gone: Now What?

Debunking Common Myths Around the DoD's CMMC Certification

Cyber Risk

Debunking Common Myths Around the DoD's CMMC Certification

How to Get Started on the DoD's CMMC Certification

Cyber Risk

How to Get Started on the DoD's CMMC Certification

Building Operational Agility in Healthcare: Focus on your Non-Employees

Identity

Building Operational Agility in Healthcare: Focus on your Non-Employees

The Name of Your SOC Matters: Tips for Picking a Name that Fits

Cyber Workforce

The Name of Your SOC Matters: Tips for Picking a Name that Fits

The Countdown to CCPA Enforcement

Data Protection Laws

The Countdown to CCPA Enforcement

A Free Covid-19 Cyber Awareness Email Template

Cyber Risk

A Free Covid-19 Cyber Awareness Email Template

3 Key Risks Threatening Cloud Security

Cyber Risk

3 Key Risks Threatening Cloud Security

7 Tips for Securing Your Privacy on Video Conferencing Platforms

Privacy Risk

7 Tips for Securing Your Privacy on Video Conferencing Platforms

What You Need to Know about Brazil’s New Personal Data Protection Regulation Now

Data Protection Laws

What You Need to Know about Brazil’s New Personal Data Protection Regulation Now

Cookies and Compliance: How Key Data Privacy Regulations Impact Cookie Management

Privacy Risk

Cookies and Compliance: How Key Data Privacy Regulations Impact Cookie Management

Privileged Account Onboarding: Are You Asking the Right Questions?

Identity

Privileged Account Onboarding: Are You Asking the Right Questions?

4 Free Cybersecurity Awareness Email Templates To Use at Your Company

Cyber Risk

4 Free Cybersecurity Awareness Email Templates To Use at Your Company

Recent Data Breaches and Increasing Standards of Care Requirements

IT Risk

Recent Data Breaches and Increasing Standards of Care Requirements

What You Should Know about NIST's New Privacy Framework

Privacy Risk

What You Should Know about NIST's New Privacy Framework

Choosing the Right Privacy Governance Tool for your Organization

Privacy Risk

Choosing the Right Privacy Governance Tool for your Organization

4 Ways Your Current Cybersecurity Training Strategy Sabotages Success

Cyber Workforce

4 Ways Your Current Cybersecurity Training Strategy Sabotages Success

The Future of Internal Audit: 10 Audit Trends to Prepare for in 2020

Audit Insights

The Future of Internal Audit: 10 Audit Trends to Prepare for in 2020

The Top 8 Cyber Workforce Development Trends for 2020

Cyber Workforce

The Top 8 Cyber Workforce Development Trends for 2020

9 Data Privacy Trends to Watch in 2020

Privacy Risk

9 Data Privacy Trends to Watch in 2020

5 Reasons Private Companies Should Start on ASC 842 Compliance Now

Audit Insights

5 Reasons Private Companies Should Start on ASC 842 Compliance Now

The 5 Most In-Demand Cybersecurity Jobs for 2020

Cyber Workforce

The 5 Most In-Demand Cybersecurity Jobs for 2020

The Impact of the CCPA's Do Not Sell Rule on Digital Advertising

Data Protection Laws

The Impact of the CCPA's Do Not Sell Rule on Digital Advertising

The Equifax Settlement and Increasing Standards of Care Requirements

Cyber Risk

The Equifax Settlement and Increasing Standards of Care Requirements

Data Protection in Thailand: A Summary of the PDPA

Data Protection Laws

Data Protection in Thailand: A Summary of the PDPA

HPE's Deputy CISO Discusses Cyber Workforce Development

Cyber Workforce

HPE's Deputy CISO Discusses Cyber Workforce Development

Tips for Improving Data Privacy Conversations in the Boardroom

Privacy Risk

Tips for Improving Data Privacy Conversations in the Boardroom

How to Build Obfuscated Macros for your Next Social Engineering Campaign

Threat and Vulnerability

How to Build Obfuscated Macros for your Next Social Engineering Campaign

How to Build a Cheap Active Directory Pen Test Lab in AWS Without Any Effort

Threat and Vulnerability

How to Build a Cheap Active Directory Pen Test Lab in AWS Without Any Effort

What Makes a Good Penetration Test?

Threat and Vulnerability

What Makes a Good Penetration Test?

A Closer Look at the AICPA’S SOC for Cybersecurity

Audit Insights

A Closer Look at the AICPA’S SOC for Cybersecurity

6 Tips for Getting Started with CCPA Compliance

Data Protection Laws

6 Tips for Getting Started with CCPA Compliance

SOC 1, SOC 2, or SOC 2+ - Which SOC Report Is Right for Your Organization?

Audit Insights

SOC 1, SOC 2, or SOC 2+ - Which SOC Report Is Right for Your Organization?

The MFA Vulnerability You May Be Missing

Threat and Vulnerability

The MFA Vulnerability You May Be Missing

Beyond the CCPA: Nevada's New Internet Privacy Law, SB 220

Data Protection Laws

Beyond the CCPA: Nevada's New Internet Privacy Law, SB 220

Beyond the GDPR: A Look at China's National Data Protection Standard

Data Protection Laws

Beyond the GDPR: A Look at China's National Data Protection Standard

How the CCPA Is Impacting State Data Protection Legislation in the U.S.

Data Protection Laws

How the CCPA Is Impacting State Data Protection Legislation in the U.S.

What Does the Brexit Extension Mean for Data Protection?

Data Protection Laws

What Does the Brexit Extension Mean for Data Protection?

The GDPR in 2019: Enforcement and Penalties around the Globe

Data Protection Laws

The GDPR in 2019: Enforcement and Penalties around the Globe

Upgrading Your Internal Controls for a Hybrid Environment

Audit Insights

Upgrading Your Internal Controls for a Hybrid Environment

How to Use Privacy KRIs to Predict Future Risks

Privacy Risk

How to Use Privacy KRIs to Predict Future Risks

A New Tool for Finding Malicious JavaScript and Securely Using External Libraries

Threat and Vulnerability

A New Tool for Finding Malicious JavaScript and Securely Using External Libraries

8 Areas to Include in SAP Access Control Testing

Audit Insights

8 Areas to Include in SAP Access Control Testing

Let's Get Cracking: A Beginner's Guide to Password Analysis

Threat and Vulnerability

Let's Get Cracking: A Beginner's Guide to Password Analysis

5 Things to Consider before Upgrading from SAP GRC 10.x to GRC 12.0

Audit Insights

5 Things to Consider before Upgrading from SAP GRC 10.x to GRC 12.0

Top Trends in Third-Party Risk Management

Enterprise Risk

Top Trends in Third-Party Risk Management

A CCPA Update: Understanding the CCPA's Look-Back Requirement

Data Protection Laws

A CCPA Update: Understanding the CCPA's Look-Back Requirement

Data Privacy Day 2019: Privacy Trends to Watch in 2019

Privacy Risk

Data Privacy Day 2019: Privacy Trends to Watch in 2019

2018 in Review: A Year of Internal Penetration Testing

Cyber Risk

2018 in Review: A Year of Internal Penetration Testing

Prevention Is the Best Medicine: A Guide to SAP Security Health Checks

Audit Insights

Prevention Is the Best Medicine: A Guide to SAP Security Health Checks

Understanding the Differences between PIAs and the GDPR's DPIAs

Compliance

Understanding the Differences between PIAs and the GDPR's DPIAs

Adequacy Decisions, BCRs, and Whitelists: Understanding Cross-Border Data Transfers in the GDPR Era

Compliance

Adequacy Decisions, BCRs, and Whitelists: Understanding Cross-Border Data Transfers in the GDPR Era

Louisiana, Ohio, and Vermont Update Cyber Security and Privacy Laws

Data Protection Laws

Louisiana, Ohio, and Vermont Update Cyber Security and Privacy Laws

Three Ways Brexit Could Impact Data Protection in the UK

Compliance

Three Ways Brexit Could Impact Data Protection in the UK

New Guidance: Protecting Data in the Age of Artificial Intelligence

Data Protection Laws

New Guidance: Protecting Data in the Age of Artificial Intelligence

What Is the Future of the EU-U.S. Privacy Shield?

Data Protection Laws

What Is the Future of the EU-U.S. Privacy Shield?

New Data Shows Cyber Security Talent Shortage Growing

Cyber Workforce

New Data Shows Cyber Security Talent Shortage Growing

Canada Updates PIPEDA Breach Notification Requirements

Data Protection Laws

Canada Updates PIPEDA Breach Notification Requirements

Record-Setting Fines Push HIPAA Into the Spotlight

Data Protection Laws

Record-Setting Fines Push HIPAA Into the Spotlight

Get Ready: Germany’s DPAs Are Starting Their GDPR Audits

Compliance

Get Ready: Germany’s DPAs Are Starting Their GDPR Audits

When Does HIPAA Apply to Health Apps?

Data Protection Laws

When Does HIPAA Apply to Health Apps?

The Hidden Benefits of Vendor Risk Management

Enterprise Risk

The Hidden Benefits of Vendor Risk Management

Understanding PHI Disclosures under the 21st Century Cures Act

Compliance

Understanding PHI Disclosures under the 21st Century Cures Act

Dr. Lori DeLooze, Cyber Security Pioneer and Defensive Security Expert

Cyber Workforce

Dr. Lori DeLooze, Cyber Security Pioneer and Defensive Security Expert

6 Key Changes in the New California Consumer Privacy Act Amendments

Data Protection Laws

6 Key Changes in the New California Consumer Privacy Act Amendments

Are Your Vendors GDPR Compliant?

Compliance

Are Your Vendors GDPR Compliant?

How to Spot Hidden Cyber Security Talent at your Company

Cyber Workforce

How to Spot Hidden Cyber Security Talent at your Company

Why the EU-Japan Data Transfer Agreement Is So Significant

Data Protection Laws

Why the EU-Japan Data Transfer Agreement Is So Significant

When is a DPIA Required under the GDPR?

Data Protection Laws

When is a DPIA Required under the GDPR?

Regulation Comparison: The California Consumer Privacy Act and the GDPR

Data Protection Laws

Regulation Comparison: The California Consumer Privacy Act and the GDPR

How to Use Vendor Profiles to Address Third-Party Risk

Privacy Risk

How to Use Vendor Profiles to Address Third-Party Risk

A Look at the New California Consumer Privacy Act of 2018

Data Protection Laws

A Look at the New California Consumer Privacy Act of 2018

What You Need to Know about Colorado’s New Data Protection Law

Data Protection Laws

What You Need to Know about Colorado’s New Data Protection Law

Quick FAQ: Responding to Data Subject Requests under the GDPR

Compliance

Quick FAQ: Responding to Data Subject Requests under the GDPR

4 Hurdles Standing between You and Effective Vendor Risk Management

Privacy Risk

4 Hurdles Standing between You and Effective Vendor Risk Management

How Leveraging ISO 27000 and NIST Frameworks Can Help You Align with the GDPR

Compliance

How Leveraging ISO 27000 and NIST Frameworks Can Help You Align with the GDPR

A Roundup of Our Most Popular GDPR Resources and Guides

Data Protection Laws

A Roundup of Our Most Popular GDPR Resources and Guides

What is Integrated Risk Management?

Enterprise Risk

What is Integrated Risk Management?

Data Privacy in Paradise: A Look at the Privacy Regulations of Bermuda and the British Virgin Islands

Data Protection Laws

Data Privacy in Paradise: A Look at the Privacy Regulations of Bermuda and the British Virgin Islands

Understanding the DPO and EU Representative Roles under the GDPR

Compliance

Understanding the DPO and EU Representative Roles under the GDPR

A PCI DSS Update Is Coming: What You Need to Know about PCI DSS v3.2.1

Cyber Risk

A PCI DSS Update Is Coming: What You Need to Know about PCI DSS v3.2.1

Beyond the GDPR: What You Should Know about Japan’s Act on the Protection of Personal Information

Data Protection Laws

Beyond the GDPR: What You Should Know about Japan’s Act on the Protection of Personal Information

Understanding the 4 Phases of the NYDFS Cybersecurity Regulation (23 NYCRR 500)

Cyber Risk

Understanding the 4 Phases of the NYDFS Cybersecurity Regulation (23 NYCRR 500)

What’s Inside South Dakota and Alabama’s New Data Breach Notification Laws?

Data Protection Laws

What’s Inside South Dakota and Alabama’s New Data Breach Notification Laws?

The ePrivacy Regulation and the GDPR: What You Need to Know Now

Data Protection Laws

The ePrivacy Regulation and the GDPR: What You Need to Know Now

Beyond the GDPR: What You Should Know about the Philippines’ Data Privacy Act of 2012

Data Protection Laws

Beyond the GDPR: What You Should Know about the Philippines’ Data Privacy Act of 2012

The Keys to a Seamless FASB ASC 842 Implementation

Audit Insights

The Keys to a Seamless FASB ASC 842 Implementation

What Are the Reasons Behind the Cyber Security Talent Shortage?

Cyber Workforce

What Are the Reasons Behind the Cyber Security Talent Shortage?

Does Your Marketing Strategy Align with the GDPR?

Compliance

Does Your Marketing Strategy Align with the GDPR?

A Step-by-Step Checklist for Meeting GDPR Consent Requirements

Compliance

A Step-by-Step Checklist for Meeting GDPR Consent Requirements

One RSA Session You Should Definitely Reserve a Seat For

Cyber Risk

One RSA Session You Should Definitely Reserve a Seat For

A Quick Guide to the Biggest Updates in the SEC's Guidance on Cyber Security Disclosures

Cyber Risk

A Quick Guide to the Biggest Updates in the SEC's Guidance on Cyber Security Disclosures

How Big Is the Cyber Security Talent Shortage?

Cyber Workforce

How Big Is the Cyber Security Talent Shortage?

9 Examples of Lawful Basis for Processing under the GDPR

Compliance

9 Examples of Lawful Basis for Processing under the GDPR

Christie Verscharen, Cyber Security Expert and Business Leader

Cyber Workforce

Christie Verscharen, Cyber Security Expert and Business Leader

A Straightforward, Easy-to-Navigate Guide to GDPR Member State Derogations

Data Protection Laws

A Straightforward, Easy-to-Navigate Guide to GDPR Member State Derogations

Free Remote Access Policy Template

Cyber Risk

Free Remote Access Policy Template

Be a Part of the 2018 Cyber Balance Sheet Report and Summit

Cyber Risk

Be a Part of the 2018 Cyber Balance Sheet Report and Summit

Predicting 2018's Biggest Stories in Cyber Security

Cyber Risk

Predicting 2018's Biggest Stories in Cyber Security

4 Common Mistakes Companies Make When Hiring Cyber Security Professionals

Cyber Workforce

4 Common Mistakes Companies Make When Hiring Cyber Security Professionals

Our Most-Read Blog Posts of 2017

Product and Service Updates

Our Most-Read Blog Posts of 2017

LaTonya Hall, Cyber Entrepreneur and Security Consultant

Cyber Workforce

LaTonya Hall, Cyber Entrepreneur and Security Consultant

Travel Agencies Get New PCI Compliance Deadline from IATA

Cyber Risk

Travel Agencies Get New PCI Compliance Deadline from IATA

Free Cyber Security Email Template: Physical Security of Laptops and Mobile Devices

Cyber Risk

Free Cyber Security Email Template: Physical Security of Laptops and Mobile Devices

A Free Password Policy Template

Cyber Risk

A Free Password Policy Template

Franchesca Sanabria, Privacy Guru and Business Leader

Cyber Workforce

Franchesca Sanabria, Privacy Guru and Business Leader

Postmodern ERM: Stakeholder-Centric Metrics and COSO's Vision

Enterprise Risk

Postmodern ERM: Stakeholder-Centric Metrics and COSO's Vision

The Eightfold Path for Enterprise Risk Management

Enterprise Risk

The Eightfold Path for Enterprise Risk Management

Kelly Schmitz, Cyber Security Instructor

Cyber Workforce

Kelly Schmitz, Cyber Security Instructor

The 11%: A Look at the Women Closing the Cyber Security Gender Gap

Cyber Workforce

The 11%: A Look at the Women Closing the Cyber Security Gender Gap

Free Template: Clean Desk Policy

Cyber Risk

Free Template: Clean Desk Policy

Why Aren't Passwords Dead Yet?

Cyber Risk

Why Aren't Passwords Dead Yet?

Phishing Case Studies: How Attackers are Taking their Time, and Taking your Money 

Cyber Risk

Phishing Case Studies: How Attackers are Taking their Time, and Taking your Money 

Free Template: Social Media Security Policy

Cyber Risk

Free Template: Social Media Security Policy

Continuous Auditing: Changing the Way You Think About Risk

Audit Insights

Continuous Auditing: Changing the Way You Think About Risk

How to Find Success at your Next Career Fair

Product and Service Updates

How to Find Success at your Next Career Fair

Chaos is a Ladder: How Hackers are Attempting to Get Rich by Creating Chaos at HBO

Cyber Risk

Chaos is a Ladder: How Hackers are Attempting to Get Rich by Creating Chaos at HBO

10 Months to Go: The Biggest GDPR Questions

Data Protection Laws

10 Months to Go: The Biggest GDPR Questions

Focal Point Named a TBBJ Fast 50 Company

Product and Service Updates

Focal Point Named a TBBJ Fast 50 Company

11 Things Your Company Should Be Doing Now to Protect against Attacks like NotPetya

Cyber Risk

11 Things Your Company Should Be Doing Now to Protect against Attacks like NotPetya

Crown Jewels: The Most Important Assessment You're Not Conducting

Cyber Risk

Crown Jewels: The Most Important Assessment You're Not Conducting

Measuring Security and the Financial Impact of Data Breaches

Cyber Risk

Measuring Security and the Financial Impact of Data Breaches

Will Trump's Executive Order Reshape Cyber Training?

Cyber Workforce

Will Trump's Executive Order Reshape Cyber Training?

Trump's Cybersecurity Executive Order Adds Urgency

Cyber Risk

Trump's Cybersecurity Executive Order Adds Urgency

OWASP Suggests Updates to Top 10 for 2017

Cyber Risk

OWASP Suggests Updates to Top 10 for 2017

Three Things We Learned at Cyber Shield 2017

Cyber Workforce

Three Things We Learned at Cyber Shield 2017

Focal Point Releases Malware Analysis of Android X-Agent Implant

Cyber Risk

Focal Point Releases Malware Analysis of Android X-Agent Implant

What They're Saying About the Cyber Balance Sheet Report

Cyber Risk

What They're Saying About the Cyber Balance Sheet Report

What The Board Wants CISOs to Know

Cyber Risk

What The Board Wants CISOs to Know

5 Tips for Communicating Cyber Risk to the Board

Cyber Risk

5 Tips for Communicating Cyber Risk to the Board

HIPAA Risk Analysis - More Effective Before A Breach

Data Protection Laws

HIPAA Risk Analysis - More Effective Before A Breach

The Cyber Balance Sheet Report is Here!

Cyber Risk

The Cyber Balance Sheet Report is Here!

10 Strategies for Remediating SoDs

Audit Insights

10 Strategies for Remediating SoDs

Simplifying HIPAA Compliance for Business Associates

Data Protection Laws

Simplifying HIPAA Compliance for Business Associates

Who is Focal Point?

Product and Service Updates

Who is Focal Point?

NIST Issues Guidelines on Systems Security Engineering

Cyber Risk

NIST Issues Guidelines on Systems Security Engineering

Federal Regulators Propose Heightened Cyber Security Standards for Banks

Cyber Risk

Federal Regulators Propose Heightened Cyber Security Standards for Banks

Are You Ready for Model Audit Rule in 2017?

Audit Insights

Are You Ready for Model Audit Rule in 2017?

Is the IoT Putting You at Risk?

Cyber Risk

Is the IoT Putting You at Risk?

5 Tips for a Great Internal Audit Analytics Program

Audit Insights

5 Tips for a Great Internal Audit Analytics Program

Infographic: When Fraud Goes Unchecked

Audit Insights

Infographic: When Fraud Goes Unchecked

AICPA Proposes New Criteria for Cybersecurity Risk Management

Audit Insights

AICPA Proposes New Criteria for Cybersecurity Risk Management

Focal Point Media Roundup - August 2016

Product and Service Updates

Focal Point Media Roundup - August 2016

Focal Point Media Roundup - July 2016

Product and Service Updates

Focal Point Media Roundup - July 2016

The Evolution of IDaaS

Identity

The Evolution of IDaaS

Infographic: The Magnitude of Third-Party Risk

Cyber Risk

Infographic: The Magnitude of Third-Party Risk

Cyber Strategies for Modern Adversaries

Cyber Risk

Cyber Strategies for Modern Adversaries

Insights From The PCAOB's 2015 Inspection Reports

Audit Insights

Insights From The PCAOB's 2015 Inspection Reports

2016 Data Breach Notification Trends

Privacy Risk

2016 Data Breach Notification Trends

Ask The Experts: Password Security

Cyber Risk

Ask The Experts: Password Security

Infographic: 2016 Data Privacy Trends

Privacy Risk

Infographic: 2016 Data Privacy Trends

Preparing for 2023: A United States Consumer Privacy Legislation Update

What You Need to Know About the Connecticut Data Privacy Act (CTDPA)

A Closer Look at the Utah Consumer Privacy Act (UCPA)

Understanding China's New Draft Measures on Cross-Border Data Transfers

Three Cloud Security Challenges and How to Overcome Them

The 8 Cyber Defense Trends to Watch in 2022

Six Identity and Access Management Trends to Watch in 2022

9 Data Privacy Trends to Watch in 2022

Three Lessons Learned from 2021 Cybersecurity Events

The 5 Most In-Demand Cybersecurity Jobs for 2022

What You Need to Know About the Newly Released CMMC 2.0

Log4Shell Explained: What it is and How to Fix it

Understanding How China's PIPL Compares to the EU's GDPR

Your Guide to China's New Privacy Law: The Personal Information Protection Law (PIPL)

Preparing for the CPRA Look-Back Provision

Getting Started with DevSecOps: The First 90 Days

China's New Data Security Law (DSL): What You Need To Know

Navigating Cross-Border Data Transfers after the Invalidation of Privacy Shield

Six Ways DevSecOps Will Transform Your Organization

Keeping Up With California: A Look at Virginia's Consumer Data Protection Act (CDPA)

What You Need to Know about the New Colorado Privacy Act

Geolocation and Covid-19: Tracking the Response to the Global Pandemic

Value by Design: Tips for Integrating Privacy and Security into your DevOps Processes

These 8 Identity and Access Management Trends Should Be on Your Radar

A Geolocation and Data Privacy FAQ

How to Navigate Geolocation and Data Protection Laws

Six Questions to Ask Your PCI QSA before Your Next Assessment

How to Achieve the CMMC Level 5 Certification

The 5 Most In-Demand Cybersecurity Jobs for 2021

Even More Changes Coming to the CCPA

A Closer Look at the Proposed Changes Issued to the HIPAA Privacy Rule

The 7 Audit Trends to Prepare for in 2021

Know Your Landscape: Performing Cloud Security Assessments Engineered to Last

The Future of Security Operations after the SolarWinds Orion Attack

Five DevSecOps Lessons from the SolarWinds Orion Attack

Nine Data Privacy Trends to Watch in 2021

How to Achieve the CMMC Level 4 Certification

How to Achieve the CMMC Level 3 Certification

How to Achieve the CMMC Level 2 Certification

How to Achieve the CMMC Level 1 Certification

The Final Countdown: The CCPA’S Employee Information Exemption Ends in January

The California Privacy Rights Act (CPRA): Is it the CCPA 2.0?

Choosing the Right Approach for Upgrading to SAP S/4 HANA

Privacy Shield Is Gone: Now What?

Debunking Common Myths Around the DoD's CMMC Certification

How to Get Started on the DoD's CMMC Certification

Building Operational Agility in Healthcare: Focus on your Non-Employees

The Name of Your SOC Matters: Tips for Picking a Name that Fits

The Countdown to CCPA Enforcement

A Free Covid-19 Cyber Awareness Email Template

3 Key Risks Threatening Cloud Security

7 Tips for Securing Your Privacy on Video Conferencing Platforms

What You Need to Know about Brazil’s New Personal Data Protection Regulation Now

Cookies and Compliance: How Key Data Privacy Regulations Impact Cookie Management

Privileged Account Onboarding: Are You Asking the Right Questions?

4 Free Cybersecurity Awareness Email Templates To Use at Your Company

Recent Data Breaches and Increasing Standards of Care Requirements

What You Should Know about NIST's New Privacy Framework

Choosing the Right Privacy Governance Tool for your Organization

4 Ways Your Current Cybersecurity Training Strategy Sabotages Success

The Future of Internal Audit: 10 Audit Trends to Prepare for in 2020

The Top 8 Cyber Workforce Development Trends for 2020

9 Data Privacy Trends to Watch in 2020

5 Reasons Private Companies Should Start on ASC 842 Compliance Now

The 5 Most In-Demand Cybersecurity Jobs for 2020

The Impact of the CCPA's Do Not Sell Rule on Digital Advertising

The Equifax Settlement and Increasing Standards of Care Requirements

Data Protection in Thailand: A Summary of the PDPA

HPE's Deputy CISO Discusses Cyber Workforce Development

Tips for Improving Data Privacy Conversations in the Boardroom

How to Build Obfuscated Macros for your Next Social Engineering Campaign

How to Build a Cheap Active Directory Pen Test Lab in AWS Without Any Effort

What Makes a Good Penetration Test?

A Closer Look at the AICPA’S SOC for Cybersecurity

6 Tips for Getting Started with CCPA Compliance

SOC 1, SOC 2, or SOC 2+ - Which SOC Report Is Right for Your Organization?

The MFA Vulnerability You May Be Missing

Beyond the CCPA: Nevada's New Internet Privacy Law, SB 220

Beyond the GDPR: A Look at China's National Data Protection Standard

How the CCPA Is Impacting State Data Protection Legislation in the U.S.

What Does the Brexit Extension Mean for Data Protection?

The GDPR in 2019: Enforcement and Penalties around the Globe

Upgrading Your Internal Controls for a Hybrid Environment

How to Use Privacy KRIs to Predict Future Risks

A New Tool for Finding Malicious JavaScript and Securely Using External Libraries

8 Areas to Include in SAP Access Control Testing

Let's Get Cracking: A Beginner's Guide to Password Analysis

5 Things to Consider before Upgrading from SAP GRC 10.x to GRC 12.0

Top Trends in Third-Party Risk Management

A CCPA Update: Understanding the CCPA's Look-Back Requirement

Data Privacy Day 2019: Privacy Trends to Watch in 2019

2018 in Review: A Year of Internal Penetration Testing

Prevention Is the Best Medicine: A Guide to SAP Security Health Checks

Understanding the Differences between PIAs and the GDPR's DPIAs

Adequacy Decisions, BCRs, and Whitelists: Understanding Cross-Border Data Transfers in the GDPR Era

Louisiana, Ohio, and Vermont Update Cyber Security and Privacy Laws

Three Ways Brexit Could Impact Data Protection in the UK

New Guidance: Protecting Data in the Age of Artificial Intelligence

What Is the Future of the EU-U.S. Privacy Shield?

New Data Shows Cyber Security Talent Shortage Growing

Canada Updates PIPEDA Breach Notification Requirements

Record-Setting Fines Push HIPAA Into the Spotlight

Get Ready: Germany’s DPAs Are Starting Their GDPR Audits

When Does HIPAA Apply to Health Apps?

The Hidden Benefits of Vendor Risk Management

Understanding PHI Disclosures under the 21st Century Cures Act

Dr. Lori DeLooze, Cyber Security Pioneer and Defensive Security Expert

6 Key Changes in the New California Consumer Privacy Act Amendments

Are Your Vendors GDPR Compliant?

How to Spot Hidden Cyber Security Talent at your Company

Why the EU-Japan Data Transfer Agreement Is So Significant

When is a DPIA Required under the GDPR?

Regulation Comparison: The California Consumer Privacy Act and the GDPR

How to Use Vendor Profiles to Address Third-Party Risk

A Look at the New California Consumer Privacy Act of 2018

What You Need to Know about Colorado’s New Data Protection Law

Quick FAQ: Responding to Data Subject Requests under the GDPR

4 Hurdles Standing between You and Effective Vendor Risk Management

How Leveraging ISO 27000 and NIST Frameworks Can Help You Align with the GDPR

A Roundup of Our Most Popular GDPR Resources and Guides

What is Integrated Risk Management?

Data Privacy in Paradise: A Look at the Privacy Regulations of Bermuda and the British Virgin Islands

Understanding the DPO and EU Representative Roles under the GDPR

A PCI DSS Update Is Coming: What You Need to Know about PCI DSS v3.2.1

Beyond the GDPR: What You Should Know about Japan’s Act on the Protection of Personal Information

Understanding the 4 Phases of the NYDFS Cybersecurity Regulation (23 NYCRR 500)

What’s Inside South Dakota and Alabama’s New Data Breach Notification Laws?

The ePrivacy Regulation and the GDPR: What You Need to Know Now

Beyond the GDPR: What You Should Know about the Philippines’ Data Privacy Act of 2012

The Keys to a Seamless FASB ASC 842 Implementation

What Are the Reasons Behind the Cyber Security Talent Shortage?

Does Your Marketing Strategy Align with the GDPR?

A Step-by-Step Checklist for Meeting GDPR Consent Requirements

One RSA Session You Should Definitely Reserve a Seat For

A Quick Guide to the Biggest Updates in the SEC's Guidance on Cyber Security Disclosures

How Big Is the Cyber Security Talent Shortage?

9 Examples of Lawful Basis for Processing under the GDPR

Christie Verscharen, Cyber Security Expert and Business Leader

A Straightforward, Easy-to-Navigate Guide to GDPR Member State Derogations

Free Remote Access Policy Template

Be a Part of the 2018 Cyber Balance Sheet Report and Summit

Predicting 2018's Biggest Stories in Cyber Security

4 Common Mistakes Companies Make When Hiring Cyber Security Professionals

Our Most-Read Blog Posts of 2017

LaTonya Hall, Cyber Entrepreneur and Security Consultant

Travel Agencies Get New PCI Compliance Deadline from IATA

Free Cyber Security Email Template: Physical Security of Laptops and Mobile Devices

A Free Password Policy Template

Franchesca Sanabria, Privacy Guru and Business Leader

Postmodern ERM: Stakeholder-Centric Metrics and COSO's Vision

The Eightfold Path for Enterprise Risk Management

Kelly Schmitz, Cyber Security Instructor

The 11%: A Look at the Women Closing the Cyber Security Gender Gap

Free Template: Clean Desk Policy

Why Aren't Passwords Dead Yet?

Phishing Case Studies: How Attackers are Taking their Time, and Taking your Money 

Free Template: Social Media Security Policy

Continuous Auditing: Changing the Way You Think About Risk

How to Find Success at your Next Career Fair

Chaos is a Ladder: How Hackers are Attempting to Get Rich by Creating Chaos at HBO

10 Months to Go: The Biggest GDPR Questions

Focal Point Named a TBBJ Fast 50 Company

11 Things Your Company Should Be Doing Now to Protect against Attacks like NotPetya

Crown Jewels: The Most Important Assessment You're Not Conducting

Measuring Security and the Financial Impact of Data Breaches

Will Trump's Executive Order Reshape Cyber Training?

Trump's Cybersecurity Executive Order Adds Urgency

OWASP Suggests Updates to Top 10 for 2017

Three Things We Learned at Cyber Shield 2017

Focal Point Releases Malware Analysis of Android X-Agent Implant

What They're Saying About the Cyber Balance Sheet Report

What The Board Wants CISOs to Know

5 Tips for Communicating Cyber Risk to the Board

HIPAA Risk Analysis - More Effective Before A Breach

The Cyber Balance Sheet Report is Here!

10 Strategies for Remediating SoDs

Simplifying HIPAA Compliance for Business Associates

Who is Focal Point?

NIST Issues Guidelines on Systems Security Engineering

Federal Regulators Propose Heightened Cyber Security Standards for Banks

Are You Ready for Model Audit Rule in 2017?

Is the IoT Putting You at Risk?

5 Tips for a Great Internal Audit Analytics Program

Infographic: When Fraud Goes Unchecked

AICPA Proposes New Criteria for Cybersecurity Risk Management

Focal Point Media Roundup - August 2016

Focal Point Media Roundup - July 2016

The Evolution of IDaaS

Infographic: The Magnitude of Third-Party Risk

Cyber Strategies for Modern Adversaries

Insights From The PCAOB's 2015 Inspection Reports

2016 Data Breach Notification Trends

Ask The Experts: Password Security

Infographic: 2016 Data Privacy Trends