Skip to content

Resources

Curated content for the risk and compliance professional: We cover the latest on cybersecurity, frameworks, risks, and compliance trends.

On-Demand Webinars

Delivering Hub & Spoke GRC in Distr...

On-demand Webinar

Delivering Hub & Spoke GRC in Distributed & Autonomous Business

Internationally renowned GRC analyst Michael Rasmussen has performed a deep dive on our Hub and Spoke architecture and i...
date-icon

Jan 1, 2023

location

Virtual

Using Zero Trust Architecture to Ba...

On-demand Webinar

Using Zero Trust Architecture to Balance Cyber Security Risks

While the concept of "Zero Trust" is not new among enterprises, however, the modern workplace has changed radically in r...
date-icon

Jan 3, 2023

location

Virtual

How Can a vCISO Help Protect Your N...

On-demand Webinar

How Can a vCISO Help Protect Your Network?

With the threat landscape growing by the hour, the role of CISO has never been more important. Yet high demand and massi...
date-icon

Jan 5, 2023

location

Virtual

See all webinars
{tableName=glossary, name=ISO/IEC Standards List, description= ISO/IEC Standards List is an international standard-setting body composed of representatives from various national standards organizations. It develops and publishes international standards for information technology and communications technologies, including software, computer hardware, and telecommunications. These standards are intended to ensure interoperability and compatibility between different systems, products, and services, and to ensure that information can be exchanged securely and reliably. The standards are developed through a consensus-based process involving experts from around the world. The standards are updated regularly to keep pace with technological advancements and changing needs., topic=null, hs_path=iso-iec-standards-list}--
{tableName=glossary, name=NIST 800-171 Compliance Checklist, description= NIST 800-171 Compliance Checklist is a comprehensive list of requirements for organizations to meet the security standards of the National Institute of Standards and Technology (NIST). These standards are designed to protect Controlled Unclassified Information (CUI) stored on non-federal information systems and provide a framework for organizations to ensure their systems are secure and compliant. The checklist provides a comprehensive list of security requirements that must be met in order to remain compliant with NIST 800-171. These requirements include items such as encryption of data in transit and at rest, secure authentication and authorization, and the use of strong passwords. The checklist also covers topics such as physical security, asset management, incident response, and system monitoring. By following the checklist, organizations can ensure that their systems are compliant with the NIST 800-171 security standards, thus protecting their CUI., topic=[{id=97620570517, createdAt=1673040885385, updatedAt=1683947953092, path='nist-sp-800-171', name=' NIST SP 800-171 Guide: A Comprehensive Overview', 1='{type=string, value=NIST SP 800-171}', 2='{type=string, value= This guide provides an overview of NIST SP 800-171, a cybersecurity standard for protecting Controlled Unclassified Information (CUI) in nonfederal systems and organizations. Learn about the security}', 5='{type=string, value=The NIST SP 800-171 Guide is an authoritative source of information for organizations looking to ensure the security of their Controlled Unclassified Information (CUI) in Nonfederal Information Systems and Organizations. This guide provides an overview of the security requirements and best practices for protecting CUI, as well as detailed guidance on how to implement these requirements. It covers topics such as user access control, system and network security, incident response, and logging and monitoring. The guide also provides an overview of the NIST Risk Management Framework and the NIST Cybersecurity Framework, and provides detailed guidance on how to use these frameworks to assess and mitigate risk. This guide is an essential resource for organizations looking to ensure the security of their CUI.}'}], hs_path=nist-800-171-compliance-checklist}--
{tableName=glossary, name=Inherent Risk, description= Inherent risk is the risk that is naturally present in a situation or activity, and is not necessarily caused by external factors. It is the risk that is always present and cannot be completely eliminated. It is the risk that is associated with a particular activity or process and is not necessarily caused by external factors. Inherent risk is the risk that is associated with the normal course of business, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent, topic=null, hs_path=inherent-risk}--
{tableName=glossary, name=Vendor Risk Management (VRM), description= Vendor Risk Management (VRM) is an enterprise-wide approach to managing risks associated with third-party vendors. It involves an organization’s proactive identification, assessment, and mitigation of risks posed by vendors. VRM involves a comprehensive review of the vendor’s security and privacy policies, documentation, and processes. It also requires an organization to monitor vendors’ performance on an ongoing basis. This includes evaluating the vendor’s ability to meet requirements, maintain compliance, and adhere to industry standards. VRM also requires organizations to have a clear understanding of the potential risks associated with vendors, including financial, reputational, legal, and operational risks. Finally, VRM requires organizations to develop and maintain a comprehensive vendor risk management program that includes policies and procedures for vendor selection, contract negotiation, and ongoing monitoring., topic=[{id=97620570526, createdAt=1673040885440, updatedAt=1683947987018, path='vendor-risk-management', name=' Vendor Risk Management: A Guide to Best Practices', 1='{type=string, value=Vendor Risk Management}', 2='{type=string, value= Vendor Risk Management Guide: Learn the fundamentals of vendor risk management and how to identify, assess, and mitigate risks associated with third-party vendors.}', 5='{type=string, value=This Vendor Risk Management Guide provides a comprehensive overview of the key components of vendor risk management. It covers the fundamentals of vendor risk management, including risk identification, assessment, and mitigation strategies. It also provides guidance on the development of a vendor risk management program, including the process for selecting, onboarding, and monitoring vendors. Additionally, this guide provides guidance on the use of technology to automate and streamline the vendor risk management process. Finally, this guide provides a number of best practices for managing vendor risk and ensuring compliance with applicable regulations. With this guide, organizations can create a comprehensive and effective vendor risk management program that ensures the safety of their data and systems.}'}], hs_path=vendor-risk-management-vrm}--
{tableName=glossary, name=Database Audit And Protection (DAP), description= Database Audit and Protection (DAP) is a set of processes and procedures used to monitor, audit, and protect data stored in a database. DAP involves the use of software tools to detect, analyze, and report on any unauthorized access, modification, or deletion of data stored in a database. DAP also involves the use of encryption to protect the data from being accessed by unauthorized users. DAP processes are designed to ensure that data is secure from unauthorized access, modification, or deletion, and that all changes made to the data are tracked and logged. DAP also helps organizations comply with applicable laws and regulations, such as the General Data Protection Regulation (GDPR). DAP is an important part of an organization's overall security strategy and helps to ensure that data is secure, accessible, and compliant with applicable laws and regulations., topic=null, hs_path=database-audit-and-protection-dap}--
{tableName=glossary, name=Cybersecurity Risk Appetite, description= Cybersecurity Risk Appetite is the level of risk an organization is willing to accept in order to achieve its objectives. It is determined by the organization’s overall risk management strategy and helps define the scope of acceptable risk to the organization’s assets and reputation. It is a critical component of an organization’s overall risk management program and should be tailored to the organization’s specific needs and objectives. The risk appetite should be regularly reviewed and updated to ensure it remains relevant and appropriate. It is important to note that the risk appetite should not be a static number, but should be based on an organization’s ability to identify, monitor, and respond to cyber threats and risks. Additionally, the risk appetite should be regularly monitored to ensure it is aligned with the organization’s objectives and risk management strategy., topic=[{id=97620570528, createdAt=1673040885452, updatedAt=1683947994134, path='cybersecurity-risk-management', name=' Cybersecurity Risk Management: A Guide for Businesses', 1='{type=string, value=Cybersecurity Risk Management}', 2='{type=string, value= This guide provides essential information on cyber security risk management, including how to identify, assess, and mitigate risks to your organization's data and systems. Learn how to create a cyber security strategy that}', 5='{type=string, value=This Cybersecurity Risk Management Guide is designed to provide an authoritative overview of the key concepts and processes associated with effective cybersecurity risk management. It provides an introduction to the principles of risk management and the key steps involved in developing a successful risk management plan. It outlines the importance of understanding the threats and vulnerabilities that exist in the digital environment, as well as the steps that can be taken to mitigate these risks. It also discusses the need to develop a culture of security within an organization and the role of leadership in setting the tone for a secure environment. Finally, the guide provides guidance on the selection and implementation of security technologies, as well as the monitoring and review of risk management processes. This guide is an essential resource for anyone looking to understand and manage risks associated with cyber threats.}'}], hs_path=cybersecurity-risk-appetite}--

eBooks

GRC Buying Guide

eBook

GRC Buying Guide

In this eBook, we have covered the GRC buying basics including: knowing when to employ a new GRC capability, baseline ex...
Artificial Intelligence and Robust ...

eBook

Artificial Intelligence and Robust Content

Written by 6clicks CISO, Andrew Robinson, this eBook covers the interconnection of Artificial Intelligence and Machine L...
Everything You Need to Know About 6...

eBook

Everything You Need to Know About 6clicks

Learn more about 6clicks as an organization and GRC SaaS provider including a platform overview, our solutions, a deeper...