Skip to content

Resources

Curated content for the risk and compliance professional: We cover the latest on cybersecurity, frameworks, risks, and compliance trends.

On-Demand Webinars

Delivering Hub & Spoke GRC in Distr...

On-demand Webinar

Delivering Hub & Spoke GRC in Distributed & Autonomous Business

Internationally renowned GRC analyst Michael Rasmussen has performed a deep dive on our Hub and Spoke architecture and i...
date-icon

Jan 1, 2023

location

Virtual

Using Zero Trust Architecture to Ba...

On-demand Webinar

Using Zero Trust Architecture to Balance Cyber Security Risks

While the concept of "Zero Trust" is not new among enterprises, however, the modern workplace has changed radically in r...
date-icon

Jan 3, 2023

location

Virtual

How Can a vCISO Help Protect Your N...

On-demand Webinar

How Can a vCISO Help Protect Your Network?

With the threat landscape growing by the hour, the role of CISO has never been more important. Yet high demand and massi...
date-icon

Jan 5, 2023

location

Virtual

See all webinars
{tableName=glossary, name=ISO/IEC 27002 Importance, description= ISO/IEC 27002 is an international standard for information security management, which provides best practice recommendations for organizations to implement security controls in order to protect their information assets. The standard is based on the principles of the ISO/IEC 27000 series of standards and provides guidance on the selection, implementation, and management of information security controls. It is an important tool for organizations to ensure that their information assets are adequately protected from unauthorized access, disclosure, destruction, or other unauthorized activities. It can also be used as a reference for organizations to assess their own security posture and identify areas for improvement. The standard is regularly updated to reflect the changing security landscape and new threats., topic=null, hs_path=iso-iec-27002-importance}--
{tableName=glossary, name=ISO/IEC 27002 Benefits, description= ISO/IEC 27002 Benefits is a set of information security management best practices that provide organizations with a framework for developing, implementing, managing and maintaining an effective security management system. This framework is based on the ISO/IEC 27002 standard, which is an internationally recognized standard for information security management. ISO/IEC 27002 Benefits provides organizations with a comprehensive set of security controls that are tailored to the specific needs and objectives of the organization. These controls are designed to protect the organization’s information assets, such as its networks, systems and data, from unauthorized access, use, modification, disclosure, or destruction. Additionally, ISO/IEC 27002 Benefits helps organizations create a culture of security awareness by providing guidance on how to develop, implement and maintain an effective security management system. This includes guidance on security policies and procedures, security risk management, security training and education, and incident response. Ultimately, ISO/IEC 27002 Benefits enables organizations to protect their information assets and maintain a secure environment for their staff, customers and partners., topic=null, hs_path=iso-iec-27002-benefits}--
{tableName=glossary, name=Passive Scanning, description= Passive scanning is a type of network security scanning technique used to detect potential security threats on a computer network without sending any packets or initiating any direct communication with the target systems. Passive scanning is a non-intrusive way to assess a network's security posture by gathering information passively from the network traffic. This technique allows the scanning system to observe the traffic on the network without being detected or interfering with the normal flow of traffic. Passive scanning is useful for identifying weak points in a network's security as well as detecting malicious activity, such as malware, unauthorized access, or malicious code execution. Passive scanning can also help identify potential vulnerabilities in the network infrastructure, such as unpatched systems or unencrypted communication., topic=[{id=97620570512, createdAt=1673040885353, updatedAt=1683947931775, path='vulnerability-management', name=' Vuln Mgmt Guide: Learn to Protect Your Business', 1='{type=string, value=Vulnerability Management}', 2='{type=string, value= Learn how to identify, assess, and manage security vulnerabilities in your organization with this comprehensive guide to Vulnerability Management. Get started now!}', 5='{type=string, value=This Vulnerability Management Guide provides an authoritative overview of the processes, strategies, and best practices for effectively managing vulnerabilities in an organization's IT systems. It explains the importance of vulnerability management and outlines the steps needed to build an effective vulnerability management program. It also covers the various tools and techniques used to identify, assess, and remediate vulnerabilities, as well as the importance of monitoring and reporting on the program's progress. Finally, the guide provides guidance on how to select the appropriate security solutions for an organization's needs. By following the advice in this guide, organizations can ensure that their systems are secure and their data is protected.}'}], hs_path=passive-scanning}--
{tableName=glossary, name=Vulnerability Management: Securing Your System, description= Vulnerability Management is the process of identifying, assessing, and prioritizing vulnerabilities in an organization’s systems and networks to ensure that risks are minimized and appropriate countermeasures are taken to protect the organization’s assets. It involves detecting, analyzing, and responding to security vulnerabilities in an organization’s IT infrastructure, including hardware, software, and networks. This process also includes the implementation of preventive and corrective measures to ensure that security vulnerabilities are addressed and managed in a timely manner. Vulnerability management requires the use of various tools, processes, and techniques to identify, assess, and mitigate security risks. This includes performing vulnerability scanning and penetration testing, patch management, and configuration management. Additionally, organizations should have policies and procedures in place to ensure that all security vulnerabilities are appropriately identified, assessed, and addressed., topic=[{id=97620570512, createdAt=1673040885353, updatedAt=1683947931775, path='vulnerability-management', name=' Vuln Mgmt Guide: Learn to Protect Your Business', 1='{type=string, value=Vulnerability Management}', 2='{type=string, value= Learn how to identify, assess, and manage security vulnerabilities in your organization with this comprehensive guide to Vulnerability Management. Get started now!}', 5='{type=string, value=This Vulnerability Management Guide provides an authoritative overview of the processes, strategies, and best practices for effectively managing vulnerabilities in an organization's IT systems. It explains the importance of vulnerability management and outlines the steps needed to build an effective vulnerability management program. It also covers the various tools and techniques used to identify, assess, and remediate vulnerabilities, as well as the importance of monitoring and reporting on the program's progress. Finally, the guide provides guidance on how to select the appropriate security solutions for an organization's needs. By following the advice in this guide, organizations can ensure that their systems are secure and their data is protected.}'}], hs_path=vulnerability-management}--
{tableName=glossary, name=ISO/IEC Rules, description= ISO/IEC Rules are a set of international standards for the development, implementation, and maintenance of information technology (IT) products and services. These rules are created by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) and are accepted by governments, organizations, and companies worldwide. The standards are designed to ensure that IT products and services meet certain quality and safety requirements, are interoperable between different systems, and are reliable and secure. They cover areas such as software development, data security, hardware compatibility, and network protocols. ISO/IEC Rules also provide guidance on how to develop and implement IT products and services in a way that is cost-effective and efficient., topic=null, hs_path=iso-iec-rules}--
{tableName=glossary, name=Nis Directive, description= NIS Directive is a directive issued by the European Union (EU) in 2018 which aims to improve the security of network and information systems across the EU. It applies to operators of essential services such as energy, transport, banking, healthcare and digital infrastructure, as well as digital service providers. The Directive requires these operators and service providers to take appropriate security measures, such as implementing risk management processes and incident reporting systems, in order to protect their systems and data from cyber-attacks. It also requires Member States to establish national computer security incident response teams and to cooperate with each other in order to ensure the security of network and information systems across the EU. The Directive is a key part of the EU's efforts to ensure a secure and resilient digital environment., topic=null, hs_path=nis-directive}--

eBooks

GRC Buying Guide

eBook

GRC Buying Guide

In this eBook, we have covered the GRC buying basics including: knowing when to employ a new GRC capability, baseline ex...
Artificial Intelligence and Robust ...

eBook

Artificial Intelligence and Robust Content

Written by 6clicks CISO, Andrew Robinson, this eBook covers the interconnection of Artificial Intelligence and Machine L...
Everything You Need to Know About 6...

eBook

Everything You Need to Know About 6clicks

Learn more about 6clicks as an organization and GRC SaaS provider including a platform overview, our solutions, a deeper...