Insider Threat Assessment
Australia
Privacy guidance to securing personal information
ISACA Guide to Effective IT Governance
ITIL framework
ISO 27001 information security
Standards Australia communications information technology e-commerce
AS/NZS ISO/IEC 27002 Information technology Security techniques
United Kingdom
Information Commissioners Office Regulation-guide to data protection
Isaca Cobit Overview
ISO 27001 information security
UK technology code of practice guidance
UK IT governance standards
UK IT governance cybersecurity standards
GDPR
Germany
German guidance on employee data protection
ISACA Guide to Effective IT Governance
ITIL framework
ISO 27001 information security
German ICT Standard
General data protection regulation
German data protection laws and regulations
Malaysia
Malaysia data protection overview
ISACA Guide to Effective IT Governance
ITIL framework
ISO 27001 information security
Commercial guide for Malaysia ecommerce
Malaysian Informaiton Security Standards
Malaysian Personal Data Protection Act
United States of America
Data Protection Act of 2020
Data protection laws and regulations in the USA
ISACA Guide to Effective IT Governance
ITIL framework
ISO 27001 information security
Issa ICT international guidelines
US data and privacy laws federal
US IT governance standards
United States cyber security laws
Canada
Canada cybersecurity laws and regulations
Privacy laws in Canada
ISACA Guide to Effective IT Governance
ITIL framework
ISO 27001 information security
Canada enterprise IT governance
Security of Information Act
- Access Management
- Data Breach Management
- Disaster Recovery
- Guidance
- ICT Audit
- ICT Data Management
- ICT Governance
- ICT Usage & Security
- ICT Vendor Due Diligence
- Information Management
- Information Secutity Management
- IT General Controls
- PCI DSS
- Privacy and Information Security
- Security Awareness Training
- Technology Licensing