Compliance and Regulations
Ultimate List of Cybersecurity Regulations by Industry
Cybersecurity regulations protect sensitive information from cyber threats. Explore the most well-known regulations, categorized by industry, in this blog.
Read more
Exploring the Monetary Authority of Singapore's TPRM Guidelines
Take a deep dive into the MAS guidelines for third-party risk management and the wide range of benefits for your financial organization.
Read more
ISA/IEC 62443-3-3 Questionnaire (Free Template)
Utilize this free questionnaire template for the ISA/IEC 62443-3-3, a commonly used security framework for industrial sector organizations.
Read more
COBIT 5 Framework Questionnaire (Free Template)
Use this free template for the COBIT 5 framework security questionnaire.
Read more
NIST 800-53 Security Standard Questionnaire (Free Template)
Track your compliance against NIST 800-53 with this free template. This questionnaire can also be used to see how vendors impact compliance efforts.
Read more
Free GDPR Vendor Security Questionnaire Template (2024 Edition)
Expand your organization's vendor risk management toolbox by utilizing this FREE GDPR vendor questionnaire template.
Read more
Essential Eight Compliance Questionnaire (Free Template)
Working to become Essential Eight compliant? Use this free questionnaire template to track progress and evaluate your cybersecurity posture.
Read more
Higher Education Community Vendor Assessment Toolkit (Free Template)
Utilize this free questionnaire template to evaluate third-party vendors against the Higher Education Community Vendor Assessment Toolkit.
Read more
HIPAA Questionnaire (Free Template)
Download this free HIPAA questionnaire template to help get started on getting your vendors properly assessed.
Read more
Essential Eight Compliance: Key Metrics To Track
Explore how tracking key metrics can help your organization work towards compliance with the Essential Eight cybersecurity framework.
Read more
What is the InfoSec Registered Assessors Program (IRAP)?
Learn more about Australia's Information Security Registered Assessors Program (IRAP) and key cybersecurity documents such as the ISM and PSPF.
Read more
Choosing an ISO 27001 Compliance Product
Looking for an all-in-one ISO 27001 compliance product? Check out the top features to look for, and how ISO 27001 compliance can benefit your organization.
Read more
What is FIPS 140-2? Cryptographic Module Validation Program
Learn more about FIPS 140-2 and the regulations and requirements the publication carries for cryptographic computer modules.
Read more
Effective Risk Management: The COSO ERM Framework
Explore the COSO ERM Framework, including fundamental standards, recent updates, and benefits for different organizations.
Read more
Using ISO 27002: 2022 to Improve Information Security Practices
Learn about ISO 27002: 2022 and how the framework supports better information security practices. An important resource if you're ISO 27001 certified.
Read more
Unpacking ISO 31010: Effective Risk Assessment Techniques
Learn about the different risk assessment techniques in ISO 31010 and how the standard can be used to support alignment with ISO 31000.
Read more
Sign up for our newsletter
Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Book a free demo
Book a free, personalized onboarding call with one of our cybersecurity experts.