Regulations & Legislation

Be on top of the latest regulations and legislation organisations must comply with to protect their environment from cyber criminals.

Gramm-Leach-Bliley Act (GLBA)

The Gramm-Leach-Bliley Act requires financial institutions – companies that offer consumers financial products or services like loans, financial or investment advice, or insurance – to explain their information-sharing practices to their customers and to safeguard sensitive data.

Federal Trade Commission, FTC

MORE >>

Federal Information Security Management Act (FISMA)

FISMA 2014 codifies the Department of Homeland Security’s role in administering the implementation of information security policies for federal Executive Branch civilian agencies, overseeing agencies’ compliance with those policies, and assisting OMB in developing those policies.

Cybersecurity & Infrastructure Security Agency, CISA

MORE >>

Health Insurance Portability and Accountability Act (HIPPA)

The Health Insurance Portability and Accountability Act of 1996 (HIPAA), Public Law 104-191, was enacted on August 21, 1996. Sections 261 through 264 of HIPAA require the Secretary of HHS to publicize standards for the electronic exchange, privacy and security of health information

U.S. Department of Health & Human Services, HHS

MORE >>

The Privacy Act 1988 (Privacy Act)

The Privacy Act 1988 (Privacy Act) was introduced to promote and protect the privacy of individuals and to regulate how Australian Government agencies and organisations with an annual turnover of more than $3 million, and some other organisations, handle personal information.

Office of the Australian Information Commissioner, OAIC

MORE >>

General Data Protection Regulation (GDPR)

It is a European regulation implemented in 2018 to enhance EU citizens’ control over the personal data that companies can legally hold.

General Data Protection Regulation, GDPR

MORE >>

General Law on the Protection of Personal Data (LGPD)

LGPD is a Brazilian data protection law that governs the way people and organizations handle personal information in Brazil.
This Law provides for the processing of personal data, including in digital media, by a natural person or legal entity governed by public or private law, in order to protect the fundamental rights of liberty and privacy and the free development of personality of the natural person.

Ministry of Defense, MD

MORE >>

Cross-Industry Prudential Standard 234 (CPS 234)
CPS 234 is an Australian regulation issued by the Australian Prudential Regulatory Authority (APRA) that aims to ensure that an APRA-regulated entity takes actions to be resilient against information security incidents by maintaining an information security capability commensurate with information security vulnerabilities and threats.

One of the key objectives of the regulation is to minimise the likelihood and impact of information security incidents in connection with confidentiality, integrity or availability of information assets, including those managed by related parties or third parties.

The Board of an APRA-regulated entity is ultimately responsible for ensuring that the entity maintains its information security.

Australian Prudential Regulatory Authority, APRA

MORE >>

Educational videos available for our WeCyberYou! community

Articles & Tips…

Learn more about this amazing field and how to become a recognised professional in this growing industry.

Ultimate Career Guide Part 2

Ultimate Career Guide Part 2

Cyber Security is in high demand, and there are plenty of job opportunities to choose from in this exciting industry. With salaries often several times higher than most average IT professionals, being a cyber security professional could be a great career of your choice.

read more
Ultimate Career Guide Part 1

Ultimate Career Guide Part 1

Cyber Security is in high demand, and there are plenty of job opportunities to choose from in this exciting industry. With salaries often several times higher than most average IT professionals, being a cyber security professional could be a great career of your choice.

read more
Understanding Cyber Security Part 1

Understanding Cyber Security Part 1

The purpose of this article is to provide to you a comprehensive overview about cyber security and its importance for organisations and society nowadays. We will be also talking about its security domains, current cyber threats risking corporations’ environments, challenges faced by organisations to protect themselves from cyber attacks and cyber security defences and best practices that can be implemented to mitigate their risks.

Further details about how those cyber security defences and best practices are being implemented in the workplace will be discussed at a later time in the portal.

I hope you enjoy the reading and please kindly send your thoughts (either in English or Portuguese) about this article and suggestions of new topics to info@wecyberyou.com if you like.

read more
Understanding Cyber Security Part 2

Understanding Cyber Security Part 2

The purpose of this article is to provide to you a comprehensive overview about cyber security and its importance for organisations and society nowadays. We will be also talking about its security domains, current cyber threats risking corporations’ environments, challenges faced by organisations to protect themselves from cyber attacks and cyber security defences and best practices that can be implemented to mitigate their risks.

Further details about how those cyber security defences and best practices are being implemented in the workplace will be discussed at a later time in the portal.

I hope you enjoy the reading and please kindly send your thoughts (either in English or Portuguese) about this article and suggestions of new topics to info@wecyberyou.com if you like.

read more
Understanding Cyber Security Part 3

Understanding Cyber Security Part 3

The purpose of this article is to provide to you a comprehensive overview about cyber security and its importance for organisations and society nowadays. We will be also talking about its security domains, current cyber threats risking corporations’ environments, challenges faced by organisations to protect themselves from cyber attacks and cyber security defences and best practices that can be implemented to mitigate their risks.

Further details about how those cyber security defences and best practices are being implemented in the workplace will be discussed at a later time in the portal.

I hope you enjoy the reading and please kindly send your thoughts (either in English or Portuguese) about this article and suggestions of new topics to info@wecyberyou.com if you like.

read more

Did you know 55,000 devices are compromised by ransomware each month globally?

With over 20 years’ experience specialising in cyber security, we have developed courses to educate and help you safeguard your privacy and stay safe from cybercrime. Get the latest in cyber security news, educational videos, and updates.