I’ve recently heard the phrase, “identity is the new perimeter” as it relates to information security. That said, I’ve also heard the same about endpoints, artificial intelligence, email, you name it. If I didn’t have experience in identity management and understand the importance it has in an environment, I may have just blown off that [...]
Whether you have worked with the Board previously or you are just now establishing a regular cadence, you want to ensure realistic expectations are set. Watch this webinar to see how other companies do this successfully!
Whether you have worked with the Board previously or you are just now establishing a regular cadence, the key is to show progress against your privacy/security program. Watch this webinar to see how other companies do this successfully!
When it comes to mitigating risk in your organization, cyber security is one of the most important issues. Most of us have sat through painful sales pitches, where things are said like "100% secure." If you are like me, it is hard to contain the inherent eye-roll. We all know that security program maturity [...]
Many struggle when presenting privacy and security topics to the Board. Use this InfoGraphic to understand the top three things NOT to do. Download InfoGraphic
You've been asked to present to the Board for the first time on your Privacy/Security Program. Watch this webinar to learn the basics on how to prepare and the best ways to establish a regular cadence.
It has taken a while, but the President did sign the Small Business Cybersecurity Act into law on August 18, 2018. This Act “requires the Commerce Department’s National Institute of Standards and Technology to develop and disseminate resources for small businesses to help reduce their cybersecurity risks.” Small businesses often have smaller budgets and [...]
The third in our "Security Maturity" webinar series designed to provide practical ways to improve your information security program. This webinar will focus on proven methods to ensure you build the right program governance.
There are thousands of products in the industry today all vying for your attention. FocusPoint's proprietary vetting process helps companies find the best fit solution for their complex environment!
One area security leaders struggle with on a regular basis is how to fund the much-needed security initiatives within the organization. Here are five different ways to work with the business and IT to accomplish both the funding as well as showing progress on your maturity roadmap. How many times have you had to [...]