According to a Ponemon report, 51% of organisations have experienced a data breach due to the involvement of a third-party entity. Vendor risk assessment is a key step in..
Most in-demand frameworks
Other topics
Third-party management updates
Today the 6clicks team are excited to announce a series of new updates to the third-party module, with more to come! This initial release lays the foundations for next-level..
Third party risk management for cyber risks in 2022
Many people view risk in business as something that should be avoided at all costs. However, we believe that with the appropriate third-party risk management processes, these..
Supply chain cyber security: A guide for CEOs
Our world continues to become more interconnected. Global enterprises and organizations rely on trusted relationships, with their third-party suppliers providing services from..
Fighting modern slavery: Three steps to change the world
Fighting Modern Slavery Three steps to change the world… Modern Slavery is one of the hottest topics in boardrooms around the world currently. And it makes the news far too often...
Revealed: How to develop effective cyber vendor governance
Introduction There’s no doubt that working with third-party vendors and/or suppliers carries a very real risk, particularly in the context of regulatory requirements. In 2018..
Streamlining sales for your startup: Cybersecurity and...
In Critical to the success of any startup is figuring out the most effective sales process. This is typically very iterative, with lots of learnings along the way. However, one..
Subscribe to receive all the latest updates
Subject to 6clicks Privacy Policy, you agree to allow 6clicks to contact you via the email provided for scheduling and marketing purposes.