bwarchitecture.png

Focal Point of View

   

A Free Password Policy Template for 2018

Cybersecurity

A Free Password Policy Template for 2018

Franchesca Sanabria, Privacy Guru and Business Leader

The Women Closing the Cyber Security Gender Gap

Franchesca Sanabria, Privacy Guru and Business Leader

Postmodern ERM: Stakeholder-Centric Metrics and COSO's Vision

Enterprise Risk

Postmodern ERM: Stakeholder-Centric Metrics and COSO's Vision

The Eightfold Path for Enterprise Risk Management

Enterprise Risk

The Eightfold Path for Enterprise Risk Management

Kelly Schmitz, Cyber Security Instructor

The Women Closing the Cyber Security Gender Gap

Kelly Schmitz, Cyber Security Instructor

The 11%: A Look at the Women Closing the Cyber Security Gender Gap

Cybersecurity

The 11%: A Look at the Women Closing the Cyber Security Gender Gap

Free Template: Clean Desk Policy

Cybersecurity

Free Template: Clean Desk Policy

Why Aren't Passwords Dead Yet?

Cybersecurity

Why Aren't Passwords Dead Yet?

Phishing Case Studies: How Attackers are Taking their Time, and Taking your Money 

Cybersecurity

Phishing Case Studies: How Attackers are Taking their Time, and Taking your Money 

Free Template: Social Media Security Policy

Cybersecurity

Free Template: Social Media Security Policy

Continuous Auditing: Changing the Way You Think About Risk

Audit Insights

Continuous Auditing: Changing the Way You Think About Risk

How to Find Success at your Next Career Fair

Inside Focal Point

How to Find Success at your Next Career Fair

Chaos is a Ladder: How Hackers are Attempting to Get Rich by Creating Chaos at HBO

Cyber News

Chaos is a Ladder: How Hackers are Attempting to Get Rich by Creating Chaos at HBO

10 Months to Go: The Biggest GDPR Questions

Privacy Updates

10 Months to Go: The Biggest GDPR Questions

Focal Point Named a TBBJ Fast 50 Company

Inside Focal Point

Focal Point Named a TBBJ Fast 50 Company

11 Things Your Company Should Be Doing Now to Protect against Attacks like NotPetya

Cyber News

11 Things Your Company Should Be Doing Now to Protect against Attacks like NotPetya

Crown Jewels: The Most Important Assessment You're Not Conducting

Cybersecurity

Crown Jewels: The Most Important Assessment You're Not Conducting

4 Free Cyber Security Awareness Email Templates To Use at Your Company

Templates

4 Free Cyber Security Awareness Email Templates To Use at Your Company

Measuring Security and the Financial Impact of Data Breaches

Cybersecurity

Measuring Security and the Financial Impact of Data Breaches

Will Trump's Executive Order Reshape Cyber Training?

Cyber News

Will Trump's Executive Order Reshape Cyber Training?

Trump's Cybersecurity Executive Order Adds Urgency

Cyber News

Trump's Cybersecurity Executive Order Adds Urgency

OWASP Suggests Updates to Top 10 for 2017

Cyber News

OWASP Suggests Updates to Top 10 for 2017

Three Things We Learned at Cyber Shield 2017

Cyber Workforce

Three Things We Learned at Cyber Shield 2017

Focal Point Releases Malware Analysis of Android X-Agent Implant

Cyber News

Focal Point Releases Malware Analysis of Android X-Agent Implant

What They're Saying About the Cyber Balance Sheet Report

Trends & Research

What They're Saying About the Cyber Balance Sheet Report

What The Board Wants CISOs to Know

Trends & Research

What The Board Wants CISOs to Know

5 Tips for Communicating Cyber Risk to the Board

Cybersecurity

5 Tips for Communicating Cyber Risk to the Board

HIPAA Risk Analysis - More Effective Before A Breach

Privacy Updates

HIPAA Risk Analysis - More Effective Before A Breach

The Cyber Balance Sheet Report is Here!

Cybersecurity

The Cyber Balance Sheet Report is Here!

10 Strategies for Remediating SoDs

Audit Insights

10 Strategies for Remediating SoDs

Simplifying HIPAA Compliance for Business Associates

Privacy Updates

Simplifying HIPAA Compliance for Business Associates

Who is Focal Point?

Inside Focal Point

Who is Focal Point?

NIST Issues Guidelines on Systems Security Engineering

Cyber News

NIST Issues Guidelines on Systems Security Engineering

Federal Regulators Propose Heightened Cyber Security Standards for Banks

Cyber News

Federal Regulators Propose Heightened Cyber Security Standards for Banks

Are You Ready for Model Audit Rule in 2017?

Audit Insights

Are You Ready for Model Audit Rule in 2017?

Is the IoT Putting You at Risk?

Cybersecurity

Is the IoT Putting You at Risk?

5 Tips for a Great Internal Audit Analytics Program

Audit Insights

5 Tips for a Great Internal Audit Analytics Program

Infographic: When Fraud Goes Unchecked

Audit Insights

Infographic: When Fraud Goes Unchecked

AICPA Proposes New Criteria for Cybersecurity Risk Management

Cybersecurity

AICPA Proposes New Criteria for Cybersecurity Risk Management

Focal Point Media Roundup - August 2016

Media Roundup

Focal Point Media Roundup - August 2016

Focal Point Media Roundup - July 2016

Media Roundup

Focal Point Media Roundup - July 2016

The Evolution of IDaaS

Identity Governance

The Evolution of IDaaS

Infographic: The Magnitude of Third-Party Risk

Cybersecurity

Infographic: The Magnitude of Third-Party Risk

Cyber Strategies for Modern Adversaries

Cybersecurity

Cyber Strategies for Modern Adversaries

Insights From The PCAOB's 2015 Inspection Reports

Audit Insights

Insights From The PCAOB's 2015 Inspection Reports

2016 Data Breach Notification Trends

Trends & Research

2016 Data Breach Notification Trends

Ask The Experts: Password Security

Cybersecurity

Ask The Experts: Password Security

Infographic: 2016 Data Privacy Trends

Trends & Research

Infographic: 2016 Data Privacy Trends