Navigating the Requirements of Cybersecurity Compliance