Skip to content

Articles by Andrew Robinson

Check out Andrew's LinkedIn profile here.

abstract_blog_circle_lime
 The Imperative of Governance to Achieving Responsible AI

AI brings many opportunities to businesses and we can see the AI boom across different industry verticals. However, it also questions who would be responsible for AI. People are..

Read More

 Information Security Management System (ISMS) SaaS for ISO 27001

Get certified up to 10x faster at 30% of the cost Get certified up to 10x faster at 30% of the cost with 6clicks ISMS software. Effectively manage your organization's security..

Read More

 What can you do to get ahead of the privacy curve?

What is ISO/IEC 27018:2019 ISO/IEC 27018:2019 provides organizations with the internationally accepted code of practice for the protection of personally identifiable information..

Read More

Eliminate cyber GRC reporting nightmares

Andrew Robinson, CISO of 6clicks, and Andy Curtis, founder of Gadget Access, present and demonstrate how GRC reporting nightmares can be eliminated. Cyber security governance,..

Read More

 6clicks Releases New Materials to Support DISP Members

6clicks has long supported Defence Industry Security Program (DISP) members and our advisory partners working to achieve and maintain DISP membership and compliance with the..

Read More

The complete guide to your ISMS audit

What is an ISMS audit? An ISMS audit, or Information Security Management System audit, is a systematic review of an organization's information security practices and controls. It..

Read More

 What is ISO 31000 and is it still relevant?

What is ISO 31000? ISO 31000 is a set of guidance developed by the International Organization for Standardization (ISO) that provides for the management of risk in projects. The..

Read More

 Using 6clicks to align with ISO 31001 best practices

What is ISO 31001? ISO/IEC 31001 is a standard that provides guidance on how to establish, implement, maintain, and improve risk management in an organization. It is based on the..

Read More

 What is NIST CSF 2.0?

What is NIST CSF? The NIST CSF (cybersecurity framework) is a set of guidelines for organizing and improving the cybersecurity program of an organization. It was created with the..

Read More

 An introduction to ISO/IEC 27017:2015 and information security for cloud services

What is ISO/IEC 27017:2015 ISO/IEC 27017:2015 provides organizations with the internationally accepted code of practice for infromation security controls based on ISO/IEC 27002..

Read More

 An overview of Third-Party Risk Management (TPRM) frameworks

A third-party risk management framework is a set of policies, procedures, and tools that an organization uses to identify, assess, and manage the risks associated with its..

Read More

 What is third party risk assessment?

What is third party risk assessment? Third party risk assessment is a process that organizations use to identify and evaluate the potential risks associated with working with..

Read More