Skip to content

Resources

Curated content for the risk and compliance professional: We cover the latest on cybersecurity, frameworks, risks, and compliance trends.

On-Demand Webinar

Delivering Hub & Spoke GRC in Distr...

On-demand Webinar

Delivering Hub & Spoke GRC in Distributed & Autonomous Business

Internationally renowned GRC analyst Michael Rasmussen has performed a deep dive on our Hub and Spoke architecture and i...
date-icon

Jan 1, 2023

location

Virtual

Using Zero Trust Architecture to Ba...

On-demand Webinar

Using Zero Trust Architecture to Balance Cyber Security Risks

While the concept of "Zero Trust" is not new among enterprises, however, the modern workplace has changed radically in r...
date-icon

Jan 3, 2023

location

Virtual

How Can a vCISO Help Protect Your N...

On-demand Webinar

How Can a vCISO Help Protect Your Network?

With the threat landscape growing by the hour, the role of CISO has never been more important. Yet high demand and massi...
date-icon

Jan 5, 2023

location

Virtual

See all webinars
{tableName=glossary, name=Compliance Issue, description= Compliance Issue: A compliance issue is a situation in which a company or individual fails to comply with laws, regulations, industry standards, or internal policies. Compliance issues can range from minor infractions to serious violations of the law. They can involve financial regulations, environmental regulations, health and safety regulations, and more. Compliance issues can lead to costly fines, legal action, and reputational damage for the company or individual involved. In some cases, compliance issues can even lead to criminal prosecution. To avoid compliance issues, companies and individuals should always be aware of the applicable laws, regulations, and policies and make sure they are following them., topic=null, hs_path=compliance-issue}--
{tableName=glossary, name=Triage, description= Triage is the process of quickly assessing and categorizing patients based on the severity of their medical condition and the resources available for treatment. It is typically used in emergency situations, such as natural disasters or mass casualty incidents, when there are a limited number of medical personnel and resources available. During triage, medical professionals will examine and assess the patient's condition, taking into account factors such as vital signs, the severity of their injuries or illness, and the availability of medical resources. They will then prioritize the patients according to their needs and the resources available, ensuring that those with the most serious conditions are treated first. This process allows medical personnel to provide the best care possible in a timely manner, and can be the difference between life and death in a crisis situation., topic=null, hs_path=triage}--
{tableName=guides, name=Right Fit For Risk (RFFR), description= Right Fit for Risk (RFFR) is the ultimate guide for understanding risk management and how it can help you make the best decisions for your business. Learn how to identify and manage risks, topic=[{id=97620570502, createdAt=1673040885290, updatedAt=1683947890075, path='pci-dss', name=' PCI-DSS: A Guide to Meeting Security Requirements', 1='{type=string, value=PCI-DSS}', 2='{type=string, value=This guide provides an overview of the Payment Card Industry Data Security Standard (PCI-DSS) and the steps to take to ensure compliance with}', 5='{type=string, value=

This comprehensive guide provides a comprehensive overview of the Payment Card Industry Data Security Standard (PCI-DSS), a set of security standards designed to protect cardholder data and reduce the risk of data breaches. It covers the key components of the PCI-DSS, including the 12 requirements, the 6 goals, and the 6 core principles. It also provides a detailed description of the processes, technologies, and tools required to comply with the standard. Furthermore, the guide includes best practices for implementing the standard and provides resources to help organizations stay on top of the latest developments in the industry.

This guide provides a roadmap for achieving PCI-DSS compliance and maintaining a secure environment.

}'}], hs_path=right-fit-for-risk-rffr}--
{tableName=guides, name=Cybersecurity Risk Management, description= This guide provides essential information on cyber security risk management, including how to identify, assess, and mitigate risks to your organization's data and systems. Learn how to create a cyber security strategy that, topic=null, hs_path=cybersecurity-risk-management}--
{tableName=glossary, name=Logic Bomb, description= A logic bomb is a malicious piece of code that is designed to cause damage to a computer system or disrupt its normal operations. It is usually triggered by a specific event or set of conditions, such as a specific date, a particular user action, or the passing of a certain amount of time. Once triggered, the logic bomb can delete data, corrupt files, or cause the system to crash. In some cases, logic bombs can even be used to spread malicious software to other systems. Logic bombs are usually created by skilled hackers or malicious software developers, and are usually difficult to detect and defend against., topic=null, hs_path=logic-bomb}--
{tableName=glossary, name=Intrusion Detection Systems (IDS), description= An Intrusion Detection System (IDS) is a type of security software that monitors a network or system for malicious activity or policy violations. It gathers and analyzes information from various areas within a network or system to identify possible security breaches, which include both intrusions (attempts to compromise security) and misuse (violations of policy). The ultimate goal of an IDS is to detect, alert, and respond to any suspicious activity or policy violations. IDSs can be either signature-based or anomaly-based. Signature-based IDSs detect known malicious activities, such as a specific type of attack, by comparing the information gathered to a database of known attack signatures. Anomaly-based IDSs, on the other hand, detect suspicious activities by comparing the information gathered to a baseline of normal behavior. IDSs are typically deployed on networks, servers, and endpoints to monitor for malicious activity. They can also be used to detect and respond to insider threats and data exfiltration. IDSs can be used in conjunction with other security tools, such as firewalls, to provide a comprehensive security solution., topic=[{id=97620570528, createdAt=1673040885452, updatedAt=1683947994134, path='cybersecurity-risk-management', name=' Cybersecurity Risk Management: A Guide for Businesses', 1='{type=string, value=Cybersecurity Risk Management}', 2='{type=string, value= This guide provides essential information on cyber security risk management, including how to identify, assess, and mitigate risks to your organization's data and systems. Learn how to create a cyber security strategy that}', 5='{type=string, value=This Cybersecurity Risk Management Guide is designed to provide an authoritative overview of the key concepts and processes associated with effective cybersecurity risk management. It provides an introduction to the principles of risk management and the key steps involved in developing a successful risk management plan. It outlines the importance of understanding the threats and vulnerabilities that exist in the digital environment, as well as the steps that can be taken to mitigate these risks. It also discusses the need to develop a culture of security within an organization and the role of leadership in setting the tone for a secure environment. Finally, the guide provides guidance on the selection and implementation of security technologies, as well as the monitoring and review of risk management processes. This guide is an essential resource for anyone looking to understand and manage risks associated with cyber threats.}'}], hs_path=intrusion-detection-systems-ids}--

eBooks

GRC Buying Guide

eBook

GRC Buying Guide

In this eBook, we have covered the GRC buying basics including: knowing when to employ a new GRC capability, baseline ex...
Artificial Intelligence and Robust ...

eBook

Artificial Intelligence and Robust Content

Written by 6clicks CISO, Andrew Robinson, this eBook covers the interconnection of Artificial Intelligence and Machine L...
Everything You Need to Know About 6...

eBook

Everything You Need to Know About 6clicks

Learn more about 6clicks as an organization and GRC SaaS provider including a platform overview, our solutions, a deeper...