Skip to content

Cybersecurity, risk, and compliance news and thought leadership

Curated content for the cybersecurity, risk and compliance professional: We cover the latest on frameworks, risks, and security trends.

abstract_blog_circle_lime
The case for using multiple risk registers with 6clicks

In 6clicks, organizations can set up multiple risk registers to track different types of risks and customize the scales/risk scoring for each risk register. Companies might want..

Read More

 Implementing your ISMS risk register

Definition of ISMS risk register A risk register is an integral part of an organization's Information Security Management System (ISMS). It is a valuable tool that helps identify,..

Read More

An overview of ISO/IEC 27001 governance

Definition of ISMS governance ISMS governance, also known as Information Security Management System governance, is the practice of establishing and maintaining a framework that..

Read More

GRC software pricing guide and vendor comparison

Governance, Risk & Compliance (GRC) software pricing guide and vendor comparison When considering the purchase of Governance, Risk & Compliance (GRC) software, it is important to..

Read More

Effectively conducting a risk assessment

What is a risk assessment? A risk assessment is a systematic process that identifies, analyzes, and evaluates potential risks within an organization. Its purpose is to assess the..

Read More

How to choose the right risk management software

How to choose the right risk management software for your business Choosing the right risk management software is crucial for organizations looking to effectively identify,..

Read More

Top 6 risk management challenges in 2023

As we enter 2023, it is a good time for legal and compliance professionals to reflect on the past twelve months and consider how they can improve their risk management practices..

Read More

Using 6clicks for Vendor Risk Management

What is vendor risk management and why is it important? Vendor risk management is the process of identifying, evaluating, and mitigating risks associated with the use of..

Read More

ISO 27001 risk owner versus asset owner

In the context of ISO 27001, the roles and responsibilities of risk owners and asset owners play crucial parts in the risk management process. These two positions have distinct..

Read More

5 practical risk mitigation strategies for your business

5 practical risk mitigation strategies for your business Risk mitigation strategies are essential for any business to minimize the potential impact of various types of risks that..

Read More

Top 6 GRC software implementation challenges and how to solve them

A quick review of GRC Organizations have been dealing with increasingly complex Governance, Risk and Compliance (GRC) requirements for many years now. Not only are businesses..

Read More

ISMS from implementation to certification

ISMS: from implementation to certification Implementing an Information Security Management System (ISMS) is a systematic approach that businesses can take to enhance the security..

Read More