This is our second part of a two-part series regarding APRA’s new prudential standard of CPS 234 and how this can potentially impact an organisation.
Part 1 focused primarily on the background of the CPS 234 and the beginning of the controls necessary to put in place to begin getting ready. Today we are going to talk about the additional steps necessary around risk management and some of the best practices to assist with that risk management in regards to data within an organisation.
H…
If you are located in Australia or do business in Australia,
you may be an Australian Prudential Regulation Authority (APRA) regulated
entity. If you are unsure, take a trip to APRA’s website and see whether it’s
applicable to you or not.
For the sake of this blog let’s say you are regulated or are just interested in what it means if you are. In that case, you may be subject to the new prudential standard of CPS 234.
So, What Actually is CPS 234?
CPS 234 is a prudential standard tha…
Data loss is defined as data that gets misplaced, removed without authorization, leaked outside of the organization or otherwise corrupted perhaps due to malware. Failure to prevent data from being ‘lost’ can result in hefty fines, especially for organizations that have to comply with the General Data Protection Regulations (GDPR) where they can be fined up to 20 million Euros, or 4% of annual, worldwide turnover.
In this guide, I will show you how you can leverage Microsoft Office 365 Sec…
Data Centric Audit and Protection (DCAP) is a term defined by Gartner back in 2017 in response to the weaknesses of the Data Security Governance practices at the time. At that time, data protection strategies focused on the security of the application, or storage system that contained the data. This focus led to a variety of technology-specific security tools which tended to be owned and managed by different teams within IT. This siloed approach to data security worked well as long as the dat…
Continuous Diagnostic and Mitigation (CDM) Guidelines, Programs, and More
Continuous Diagnostics and Mitigation (CDM) Program is a
dynamic approach to fortifying the cybersecurity of government networks and
systems. The CDM Program provides DHS, along with Federal Agencies with
capabilities and tools and identify cybersecurity risks on an ongoing basis,
prioritize these risks based on potential impacts, and enable cybersecurity
personnel to mitigate the most significant problems first. Con…
What is ITAR Compliance?
The International Traffic in Arms Regulations (ITAR) is a United States regulatory compliance standard that restricts and controls the export of defense and military-related technologies to safeguard U.S. national security. The U.S. Government requires all manufacturers, exporters, and brokers of defense articles, defense services or related technical data to be ITAR compliant.
What are ITAR Requirements?
For a company involved in the manufacture, sal…