About Kathy Washenberger

Kathy is an experienced executive that offers over 20 years of history building and implementing successful Information Security Programs. She brings a mix of business and technology experience in both the private and public sectors. In this role, she is responsible for heading the company’s information technology vision, strategy and execution of enterprise-wide initiatives. Her FOCUS is both on internal and external priorities to optimize business results. Kathy can be reached at 612-499-9730. Kathy.Washenberger@FocusPointTechnologies.com

IoT Evolution, Revolution or Confusion?

The IoT (Internet of Things) evolution is occurring in business and personal lives, the revolution is amazing as it transforms the way we think and act, and the confusion around how to secure IoT is real. While IoT is one of the newest buzz-words, it’s also something we in the privacy and security field [...]

By |2018-11-21T13:48:55+00:00November 21, 2018|Cloud Security, Internet of Things|0 Comments

Is Identity the New Perimeter in Security?

I’ve recently heard the phrase, “identity is the new perimeter” as it relates to information security. That said, I’ve also heard the same about endpoints, artificial intelligence, email, you name it. If I didn’t have experience in identity management and understand the importance it has in an environment, I may have just blown off that [...]

Managed Security Services – The Reality……

We all know the security industry is exploding with new products and services that are being marketed as “the only way to secure your environment.” Similarly, we are seeing all sorts of providers that claim to provide SOC (Security Operations Center) services. With all of the terminology and acronyms being thrown around, i.e., MSSP, [...]

STOP the Madness…..

FocusPoint is introducing a new program called STOP – Security Technology Optimization Program. This offering will focus on helping companies get the most out of their security technology investments, without adding more tools to the mix. We think the acronym STOP is perfect – not only does it name the program, but it also [...]

SMB Cybersecurity Act – Hopefully Optimistic

It has taken a while, but the President did sign the Small Business Cybersecurity Act into law on August 18, 2018. This Act “requires the Commerce Department’s National Institute of Standards and Technology to develop and disseminate resources for small businesses to help reduce their cybersecurity risks.” Small businesses often have smaller budgets and [...]

Are You Maximizing Your Security Investment?

One of the reasons companies struggle with maturing their information security and/or data privacy programs is the investment in technology has not been fully realized. This comes up over and over and relates to the implementation and maintenance of technical tools that have been purchased. For a number of reasons, companies find themselves unprotected. [...]

[Infographic] 5 Ways to Fund Your Privacy/Security Program

One area security leaders struggle with on a regular basis is how to fund the much-needed security initiatives within the organization. Here are five different ways to work with the business and IT to accomplish both the funding as well as showing progress on your maturity roadmap. How many times have you had to [...]

[Infographic] 3 Ways to Accelerate Your Security Program

Whether you are looking to jump start a privacy/security initiative or accelerate the maturity and success of an existing program, these steps are foundational.  Here are three areas to FOCUS on specific POINTS when you are unsure of where to start. For additional information on how to do this, watch the webinar series related [...]

Hey before you leave. Subscribe to The Cyber Chronicle – Most popular news each week on cyber security.

Opt out at anytime.   No SPAM just great weekly content.

Click here to receive information about our free cyber security assessment.