Skip to content

Resources

Curated content for the risk and compliance professional: We cover the latest on cybersecurity, frameworks, risks, and compliance trends.

On-Demand Webinars

Delivering Hub & Spoke GRC in Distr...

On-demand Webinar

Delivering Hub & Spoke GRC in Distributed & Autonomous Business

Internationally renowned GRC analyst Michael Rasmussen has performed a deep dive on our Hub and Spoke architecture and i...
date-icon

Jan 1, 2023

location

Virtual

Using Zero Trust Architecture to Ba...

On-demand Webinar

Using Zero Trust Architecture to Balance Cyber Security Risks

While the concept of "Zero Trust" is not new among enterprises, however, the modern workplace has changed radically in r...
date-icon

Jan 3, 2023

location

Virtual

How Can a vCISO Help Protect Your N...

On-demand Webinar

How Can a vCISO Help Protect Your Network?

With the threat landscape growing by the hour, the role of CISO has never been more important. Yet high demand and massi...
date-icon

Jan 5, 2023

location

Virtual

See all webinars
{tableName=glossary, name=Cybersecurity Reports, description= Cybersecurity Reports are documents that provide detailed information about the security status of an organization's digital assets and infrastructure. They typically include an assessment of the organization's current security posture, the potential risks and vulnerabilities it faces, and the recommended steps for mitigating those risks. Cybersecurity Reports can also include information about the organization's compliance with applicable laws and regulations, as well as any other relevant information that could affect its security posture. Cybersecurity Reports are an important tool for organizations to use in order to stay informed and up-to-date on the latest security threats and vulnerabilities, as well as to ensure their security posture is in line with current industry standards., topic=[{id=97620570528, createdAt=1673040885452, updatedAt=1683947994134, path='cybersecurity-risk-management', name=' Cybersecurity Risk Management: A Guide for Businesses', 1='{type=string, value=Cybersecurity Risk Management}', 2='{type=string, value= This guide provides essential information on cyber security risk management, including how to identify, assess, and mitigate risks to your organization's data and systems. Learn how to create a cyber security strategy that}', 5='{type=string, value=This Cybersecurity Risk Management Guide is designed to provide an authoritative overview of the key concepts and processes associated with effective cybersecurity risk management. It provides an introduction to the principles of risk management and the key steps involved in developing a successful risk management plan. It outlines the importance of understanding the threats and vulnerabilities that exist in the digital environment, as well as the steps that can be taken to mitigate these risks. It also discusses the need to develop a culture of security within an organization and the role of leadership in setting the tone for a secure environment. Finally, the guide provides guidance on the selection and implementation of security technologies, as well as the monitoring and review of risk management processes. This guide is an essential resource for anyone looking to understand and manage risks associated with cyber threats.}'}], hs_path=cybersecurity-reports}--
{tableName=glossary, name=Essential 8 Maturity Model, description= The Essential 8 Maturity Model is a framework for organizations to use to assess and measure their cybersecurity maturity. It is based on eight key areas of security that organizations should focus on in order to reduce the risk of a successful cyber attack. The eight areas are: Patch Management, Application Whitelisting, Controlled Use of Administrative Privileges, Secure Configuration, Account Monitoring and Control, Data Protection, Malware Defense, and Application Control. Each of these areas is broken down into specific security controls that organizations should implement in order to improve their cybersecurity posture. The model also provides guidance on how to measure the maturity of each of the areas, allowing organizations to track their progress over time. The Essential 8 Maturity Model enables organizations to develop an effective, comprehensive cybersecurity strategy and to prioritize their security investments., topic=[{id=97620570506, createdAt=1673040885315, updatedAt=1685498674506, path='asd-essential-8', name=' ASD Essential 8 Guide: A Comprehensive Overview', 1='{type=string, value=ASD Essential 8}', 2='{type=string, value= This guide provides an overview of the ASD Essential 8 - 8 evidence-based strategies to help improve the outcomes of children with Autism Spectrum Disorder. Learn how to identify and implement these strategies to help}', 5='{type=string, value=This authoritative guide provides an in-depth look at the ASD Essential 8 (E8), a set of eight measures developed by the Australian Signals Directorate (ASD) to protect organizations from cyber threats. It explores whether the ASD Essential 8 are mandatory or not for your organisations and covers the fundamentals of each of the eight measures, including the maturity levels, how to perform an assessment and implementation guidenace.}'}], hs_path=essential-8-maturity-model}--
{tableName=glossary, name=Activity Monitors, description= Activity Monitors are wearable devices that track and monitor physical activity. They measure and record activities such as steps taken, distance traveled, calories burned, and sleep patterns. Activity Monitors are commonly worn on the wrist, but can also be worn on the waist, ankle, or around the chest. They use sensors to track movement and calculate activity levels. Activity Monitors can be used to set goals and track progress, providing feedback to help users reach their fitness goals. They can also be used to monitor health, such as heart rate, blood pressure, and body temperature. Activity Monitors are becoming increasingly popular among athletes, fitness enthusiasts, and anyone looking to improve their physical health., topic=null, hs_path=activity-monitors}--
{tableName=glossary, name=Keystroke Logging, description= Keystroke logging is a process of tracking and recording the keys that are pressed on a computer keyboard. It is a form of surveillance technology used to monitor and record all keystrokes entered on a computer or device, including usernames, passwords, and other sensitive data. Keystroke logging can be used to gather information about a user's activity and behavior, as well as to gain access to protected or confidential information. Keystroke logging is often used by employers to monitor their employees' activities and to ensure that their computers are being used for work-related activities. It can also be used by hackers to gain access to a user's personal information and to gain access to a user's system. Keystroke logging can be used to track online activity, including websites visited, emails sent, and chats conducted. Additionally, it can be used to track physical activity, such as mouse movements, and to monitor user behavior, such as how long a user is active on a website or how often a user visits a specific website. Keystroke logging can be used to detect fraud and other malicious activities, as well as to detect unauthorized access to sensitive information., topic=null, hs_path=keystroke-logging}--
{tableName=glossary, name=ISO/IEC Certification Meaning, description= ISO/IEC certification is a formal recognition that a product, process or service meets a set of standards and criteria as established by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). This certification is issued by an independent third-party organization that has been accredited by the ISO and IEC to assess and certify products, processes and services. ISO/IEC certification is a way to demonstrate that a product, process or service meets the standards and requirements of ISO and IEC, and that it has been tested and verified by an accredited third-party organization. ISO/IEC certification is a valuable tool for businesses and organizations, as it helps to ensure that the products, processes or services they provide meet the standards and criteria of ISO and IEC. It also helps to ensure that the products, processes or services are safe and reliable, and that they meet the expectations of customers and other stakeholders., topic=null, hs_path=iso-iec-certification-meaning}--
{tableName=glossary, name=Cloud Infrastructure, description= Cloud Infrastructure is a type of computing infrastructure that provides shared computer processing resources and data to computers and other devices on demand over the internet. It is typically composed of a combination of hardware and software components, such as servers, storage, networks, and applications. Cloud Infrastructure allows users to access their data and applications from any device, anywhere in the world, with minimal setup and maintenance. It is designed to be highly scalable and cost-effective, allowing businesses to quickly and easily expand their computing resources as needed. Cloud Infrastructure also provides enhanced security, reliability, and performance, making it a popular choice for businesses of all sizes., topic=null, hs_path=cloud-infrastructure}--

eBooks

GRC Buying Guide

eBook

GRC Buying Guide

In this eBook, we have covered the GRC buying basics including: knowing when to employ a new GRC capability, baseline ex...
Artificial Intelligence and Robust ...

eBook

Artificial Intelligence and Robust Content

Written by 6clicks CISO, Andrew Robinson, this eBook covers the interconnection of Artificial Intelligence and Machine L...
Everything You Need to Know About 6...

eBook

Everything You Need to Know About 6clicks

Learn more about 6clicks as an organization and GRC SaaS provider including a platform overview, our solutions, a deeper...