Skip to content

Resources

Curated content for the risk and compliance professional: We cover the latest on cybersecurity, frameworks, risks, and compliance trends.

On-Demand Webinars

Delivering Hub & Spoke GRC in Distr...

On-demand Webinar

Delivering Hub & Spoke GRC in Distributed & Autonomous Business

Internationally renowned GRC analyst Michael Rasmussen has performed a deep dive on our Hub and Spoke architecture and i...
date-icon

Jan 1, 2023

location

Virtual

Using Zero Trust Architecture to Ba...

On-demand Webinar

Using Zero Trust Architecture to Balance Cyber Security Risks

While the concept of "Zero Trust" is not new among enterprises, however, the modern workplace has changed radically in r...
date-icon

Jan 3, 2023

location

Virtual

How Can a vCISO Help Protect Your N...

On-demand Webinar

How Can a vCISO Help Protect Your Network?

With the threat landscape growing by the hour, the role of CISO has never been more important. Yet high demand and massi...
date-icon

Jan 5, 2023

location

Virtual

See all webinars
{tableName=glossary, name=Compliance Automation Software, description= Compliance Automation Software is a type of software designed to automate the process of ensuring compliance with regulations and standards. It typically includes features like automated document generation, data collection, monitoring, and reporting to help organizations meet regulatory requirements. Compliance Automation Software can also be used to automate the process of tracking and verifying compliance with internal policies and procedures. This type of software is used by companies in a variety of industries, such as healthcare, finance, and manufacturing, to ensure compliance with government regulations and industry standards. By automating the process of compliance, Compliance Automation Software can help organizations save time, money, and resources., topic=null, hs_path=compliance-automation-software}--
{tableName=glossary, name=Enterprise Architecture, description= Enterprise Architecture (EA) is an integrated framework that defines the structure, processes, and systems of an organization, along with the relationships between them. It is a comprehensive approach to designing, planning, and implementing the technology, processes, and resources of an organization in order to meet its business objectives. EA also helps organizations to align their strategies and objectives with their technology investments in order to create value, reduce costs, and improve efficiency. It is a comprehensive blueprint of an organization's IT infrastructure and its alignment with the business strategy. It is designed to provide a holistic view of the organization's IT systems and their relationships to the organization's goals, objectives, and strategies. EA also helps organizations to identify and address potential risks and opportunities associated with their IT investments. It is an evolving discipline that includes the understanding of the organization's current and future business needs and the development of a comprehensive roadmap to achieve those goals., topic=null, hs_path=enterprise-architecture}--
{tableName=comparison, name=NIST CSF vs APRA CPS 234, description=The NIST Cybersecurity Framework (CSF) and APRA CPS 234 are two leading standards for organisations to protect their data and systems., topic=[{id=97620570503, createdAt=1673040885296, updatedAt=1683947893762, path='nist-cybersecurity-framework-csf', name=' NIST Cybersecurity Framework: A Comprehensive Guide', 1='{type=string, value=NIST Cybersecurity Framework (CSF)}', 2='{type=string, value= A comprehensive guide to the NIST Cybersecurity Framework (CSF) and how to use it to protect your organization's IT infrastructure and data. Learn best practices and tips to help you improve}', 5='{type=string, value=This authoritative guide provides an overview of the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF). The guide will provide an in-depth look at the five core functions of the CSF, which are Identify, Protect, Detect, Respond, and Recover. It will also explain the importance of the CSF and how it can help organizations of all sizes to protect their networks and data from cyber threats. The guide will also provide an overview of the various tools and resources available to help organizations implement the CSF, as well as best practices for using the framework to ensure the security of their systems. Finally, the guide will provide a comprehensive look at the various roles and responsibilities associated with the CSF, including the roles of the organization, its employees, and external partners. This guide is an essential resource for any organization looking to protect its networks and data from the ever-evolving cyber threats.}'}], hs_path=nist-cybersecurity-framework-csf-vs-apra-cps-234}--
{tableName=guides, name=Vendor Risk Management, description= Vendor Risk Management Guide: Learn the fundamentals of vendor risk management and how to identify, assess, and mitigate risks associated with third-party vendors., topic=null, hs_path=vendor-risk-management}--
{tableName=glossary, name=Office of the Australian Information Commissioner (OAIC), description= The Office of the Australian Information Commissioner (OAIC) is an independent statutory agency created under the Australian Privacy Act 1988. It is responsible for administering and enforcing the Privacy Act and the Freedom of Information Act 1982, as well as providing advice and guidance on privacy and freedom of information issues. The OAIC is a one-stop shop for information about privacy, data protection and freedom of information in Australia. It provides a range of services to individuals, organisations and government agencies, including the development and implementation of privacy policies, the provision of advice and guidance on privacy and freedom of information issues, the investigation of privacy complaints and the review of decisions made under the Freedom of Information Act. The OAIC also works with other government agencies to ensure that the privacy of individuals is respected and their data is protected. The OAIC is committed to promoting and protecting the privacy of individuals and organisations, and to ensuring that the public has access to government-held information., topic=null, hs_path=office-of-the-australian-information-commissioner-oaic}--
{tableName=glossary, name=Data Owner, description= Data Owner is a term used to refer to the person or entity responsible for the creation, maintenance, and control of a set of data. This includes the right to decide how the data should be used, who can access it, and who can modify it. Data Owners are responsible for ensuring the security, accuracy, and integrity of the data, as well as for ensuring that any changes to the data are properly documented. Data Owners are also responsible for ensuring compliance with applicable laws and regulations, as well as for ensuring that the data is used in a manner that is consistent with the intended purpose of the data., topic=null, hs_path=data-owner}--

eBooks

GRC Buying Guide

eBook

GRC Buying Guide

In this eBook, we have covered the GRC buying basics including: knowing when to employ a new GRC capability, baseline ex...
Artificial Intelligence and Robust ...

eBook

Artificial Intelligence and Robust Content

Written by 6clicks CISO, Andrew Robinson, this eBook covers the interconnection of Artificial Intelligence and Machine L...
Everything You Need to Know About 6...

eBook

Everything You Need to Know About 6clicks

Learn more about 6clicks as an organization and GRC SaaS provider including a platform overview, our solutions, a deeper...