Skip to content

Resources

Curated content for the cyber, risk and compliance professional: We cover the latest on cybersecurity, frameworks, risks, and compliance trends.

On-Demand Webinars

Delivering Hub & Spoke GRC in Distr...

On-demand Webinar

Delivering Hub & Spoke GRC in Distributed & Autonomous Business

Internationally renowned GRC analyst Michael Rasmussen has performed a deep dive on our Hub and Spoke architecture and i...
date-icon

Jan 1, 2023

location

Virtual

Using Zero Trust Architecture to Ba...

On-demand Webinar

Using Zero Trust Architecture to Balance Cyber Security Risks

While the concept of "Zero Trust" is not new among enterprises, however, the modern workplace has changed radically in r...
date-icon

Jan 3, 2023

location

Virtual

How Can a vCISO Help Protect Your N...

On-demand Webinar

How Can a vCISO Help Protect Your Network?

With the threat landscape growing by the hour, the role of CISO has never been more important. Yet high demand and massi...
date-icon

Jan 5, 2023

location

Virtual

See all webinars
{tableName=glossary, name=Policy management, description= Policy management is the process of developing, implementing, and maintaining organizational policies, procedures, and guidelines. It is a comprehensive system of setting and enforcing standards and guidelines to ensure that all employees and stakeholders are aware of and comply with the organization’s policies. Policy management includes creating and maintaining a policy document, making sure it is up-to-date, communicating it to stakeholders, and monitoring compliance. It also includes developing an enforcement system to ensure that the policy is followed and that any violations are addressed and corrected. Policy management is an important part of any organization’s risk management strategy, as it helps to ensure that the organization is complying with relevant laws and regulations, and that it is taking steps to protect its employees, customers, and assets., topic=[{id=97620570510, createdAt=1673040885340, updatedAt=1715624381441, path='regulatory-compliance', name='Streamlining Compliance Management: The 6clicks Advantage', 1='{type=string, value=Regulatory Compliance}', 2='{type=string, value=This guide provides an overview of the regulations and compliance requirements for businesses in the US, UK, AU and EU. Learn how to stay compliant and protect your business from potential legal issues.}', 5='{type=string, value=This guide provides an overview of the key principles and strategies for successful compliance management. Learn how to navigate regulatory requirements, mitigate risks, and streamline processes with the help of advanced compliance management solutions. Gain valuable insights to ensure your organization's adherence to laws, regulations, and industry standards while promoting a culture of compliance and achieving operational excellence.}'}], hs_path=policy-management}--
{tableName=guides, name=Critical Infrastructure, description=null, topic=null, hs_path=critical-infrastructure}--
{tableName=comparison, name=APRA CPS 234 vs ASD Essential 8, description=Understand the differences between the two cybersecurity frameworks, APRA CPS 234 and ASD Essential 8. Learn how to implement these frameworks., topic=[{id=97620570527, createdAt=1673040885446, updatedAt=1715624228283, path='apra-cps-234', name=' APRA CPS 234 Guide: Cyber Security Requirements', 1='{type=string, value=APRA CPS 234}', 2='{type=string, value= This guide provides a comprehensive overview of APRA CPS 234, the Australian Prudential Regulation Authority's (APRA) requirements for information security management. Learn how to protect your organisation's data}', 5='{type=string, value=The APRA CPS 234 Guide provides authoritative guidance to help organizations implement effective cybersecurity strategies. Written by the Australian Prudential Regulation Authority (APRA), this guide outlines the essential elements of a cyber security framework and outlines best practices for protecting data and systems from cyber threats. It provides detailed guidance on how to assess risk, implement safeguards, and respond to cyber incidents. The guide also includes information on how to develop policies and procedures, educate staff, and monitor cyber security performance. With this guide, organizations can ensure that their systems are secure and their data is protected.}', 15='{type=list, value=[{id=97620570527, name='APRA CPS 234'}]}'}], hs_path=apra-cps-234-vs-asd-essential-8}--
{tableName=glossary, name=Business Continuity Plan (BCP), description= A Business Continuity Plan (BCP) is a comprehensive plan that outlines how an organization will respond to, and recover from, a disruption in its operations. This plan identifies potential threats to the organization and the steps that will be taken to minimize the impact of those threats. The plan outlines the procedures that will be implemented in the event of an emergency, including the roles and responsibilities of staff, the resources that will be needed to manage the situation, and the timeline for restoring operations. Additionally, a BCP may also include strategies for communicating with customers, vendors, and other stakeholders during the disruption. The goal of a BCP is to ensure that the organization can quickly and effectively respond to any disruption and continue to provide the services and products that customers expect., topic=null, hs_path=business-continuity-plan-bcp}--
{tableName=guides, name=MITRE ATT&CK, description= This guide provides an in-depth look at the MITRE ATT&CK framework, including how to use it to identify, detect, and respond to cyber threats. Learn how to create, topic=[{id=97620570520, createdAt=1673040885404, updatedAt=1715624526005, path='mitre-attck', name=' MITRE ATT&CK: A Comprehensive Guide', 1='{type=string, value=MITRE ATT&CK}', 2='{type=string, value= This guide provides an in-depth look at the MITRE ATT&CK framework, including how to use it to identify, detect, and respond to cyber threats. Learn how to create}', 5='{type=string, value=This comprehensive guide provides an in-depth exploration of the MITRE ATT&CK framework. It covers the fundamentals of the framework, its components, and how it can be used to identify, assess, and defend against cyber threats. It provides detailed descriptions of the techniques and tactics used by attackers and how to detect them. Additionally, this guide provides practical advice on how to create a defense-in-depth strategy, how to use the framework to prioritize security investments, and how to develop effective mitigation strategies. This guide is an essential resource for security professionals and organizations looking to understand and protect their networks and systems against malicious actors.}', 15='{type=list, value=[{id=97620570520, name='MITRE ATT&CK'}]}'}], hs_path=mitre-attck}--
{tableName=glossary, name=Inherent Risk, description= Inherent risk is the risk that is naturally present in a situation or activity, and is not necessarily caused by external factors. It is the risk that is always present and cannot be completely eliminated. It is the risk that is associated with a particular activity or process and is not necessarily caused by external factors. Inherent risk is the risk that is associated with the normal course of business, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent, topic=null, hs_path=inherent-risk}--

eBooks

GRC Buying Guide

eBook

GRC Buying Guide

In this eBook, we have covered the GRC buying basics including: knowing when to employ a new GRC capability, baseline ex...
Artificial Intelligence and Robust ...

eBook

Artificial Intelligence and Robust Content

Written by 6clicks CISO, Andrew Robinson, this eBook covers the interconnection of Artificial Intelligence and Machine L...
Everything You Need to Know About 6...

eBook

Everything You Need to Know About 6clicks

Learn more about 6clicks as an organization and GRC SaaS provider including a platform overview, our solutions, a deeper...