Is Identity the New Perimeter in Security?

I’ve recently heard the phrase, “identity is the new perimeter” as it relates to information security. That said, I’ve also heard the same about endpoints, artificial intelligence, email, you name it. If I didn’t have experience in identity management and understand the importance it has in an environment, I may have just blown off that [...]

Webinar: Working with the Board – Setting Expectations

Whether you have worked with the Board previously or you are just now establishing a regular cadence, you want to ensure realistic expectations are set. Watch this webinar to see how other companies do this successfully!

By |2018-08-05T01:03:46+00:00November 8, 2018|Comments Off on Webinar: Working with the Board – Setting Expectations

Webinar: Working with the Board – Showing Progress

Whether you have worked with the Board previously or you are just now establishing a regular cadence, the key is to show progress against your privacy/security program. Watch this webinar to see how other companies do this successfully!

By |2018-08-05T00:51:21+00:00October 11, 2018|Comments Off on Webinar: Working with the Board – Showing Progress

Saving Money AND Maturing Security? Tell Me How!

When it comes to mitigating risk in your organization, cyber security is one of the most important issues. Most of us have sat through painful sales pitches, where things are said like "100% secure." If you are like me, it is hard to contain the inherent eye-roll. We all know that security program maturity [...]

SMB Cybersecurity Act – Hopefully Optimistic

It has taken a while, but the President did sign the Small Business Cybersecurity Act into law on August 18, 2018. This Act “requires the Commerce Department’s National Institute of Standards and Technology to develop and disseminate resources for small businesses to help reduce their cybersecurity risks.” Small businesses often have smaller budgets and [...]

FocusPoint Proprietary Vetting Process

There are thousands of products in the industry today all vying for your attention. FocusPoint's proprietary vetting process helps companies find the best fit solution for their complex environment!

By |2018-08-08T20:55:58+00:00August 6, 2018|Comments Off on FocusPoint Proprietary Vetting Process

[Infographic] 5 Ways to Fund Your Privacy/Security Program

One area security leaders struggle with on a regular basis is how to fund the much-needed security initiatives within the organization. Here are five different ways to work with the business and IT to accomplish both the funding as well as showing progress on your maturity roadmap. How many times have you had to [...]

Hey before you leave. Subscribe to The Cyber Chronicle – Most popular news each week on cyber security.

Opt out at anytime.   No SPAM just great weekly content.

Click here to receive information about our free cyber security assessment.