Skip to content

Resources

Curated content for the risk and compliance professional: We cover the latest on cybersecurity, frameworks, risks, and compliance trends.

On-Demand Webinars

Delivering Hub & Spoke GRC in Distr...

On-demand Webinar

Delivering Hub & Spoke GRC in Distributed & Autonomous Business

Internationally renowned GRC analyst Michael Rasmussen has performed a deep dive on our Hub and Spoke architecture and i...
date-icon

Jan 1, 2023

location

Virtual

Using Zero Trust Architecture to Ba...

On-demand Webinar

Using Zero Trust Architecture to Balance Cyber Security Risks

While the concept of "Zero Trust" is not new among enterprises, however, the modern workplace has changed radically in r...
date-icon

Jan 3, 2023

location

Virtual

How Can a vCISO Help Protect Your N...

On-demand Webinar

How Can a vCISO Help Protect Your Network?

With the threat landscape growing by the hour, the role of CISO has never been more important. Yet high demand and massi...
date-icon

Jan 5, 2023

location

Virtual

See all webinars
{tableName=glossary, name=Cybersecurity Report, description= A Cybersecurity Report is a document that outlines the security measures taken to protect a company's digital assets. It typically includes an assessment of the current security posture, risk assessment, vulnerability management, and incident response capabilities. It also provides recommendations for improving security and mitigating risks. The report is often used as a tool to help companies understand the current state of their security, identify areas of improvement, and plan for future security enhancements. The report should be tailored to the specific needs of the organization and may include technical details, best practices, and security policies that should be implemented., topic=[{id=97620570528, createdAt=1673040885452, updatedAt=1683947994134, path='cybersecurity-risk-management', name=' Cybersecurity Risk Management: A Guide for Businesses', 1='{type=string, value=Cybersecurity Risk Management}', 2='{type=string, value= This guide provides essential information on cyber security risk management, including how to identify, assess, and mitigate risks to your organization's data and systems. Learn how to create a cyber security strategy that}', 5='{type=string, value=This Cybersecurity Risk Management Guide is designed to provide an authoritative overview of the key concepts and processes associated with effective cybersecurity risk management. It provides an introduction to the principles of risk management and the key steps involved in developing a successful risk management plan. It outlines the importance of understanding the threats and vulnerabilities that exist in the digital environment, as well as the steps that can be taken to mitigate these risks. It also discusses the need to develop a culture of security within an organization and the role of leadership in setting the tone for a secure environment. Finally, the guide provides guidance on the selection and implementation of security technologies, as well as the monitoring and review of risk management processes. This guide is an essential resource for anyone looking to understand and manage risks associated with cyber threats.}'}], hs_path=cybersecurity-report}--
{tableName=glossary, name=Information Asset Definition, description= An information asset is any data, document, or other information-based resource that is owned, managed, or maintained by an organization. This includes physical and digital information, such as documents, images, videos, audio files, databases, and websites. Information assets are valuable to an organization as they can provide insight into customer behavior, market trends, and internal processes. They can also be used to inform decision-making, improve customer service, and enable innovation. Information assets are typically managed through an information asset management system, which is responsible for the secure storage, retrieval, and analysis of information assets. Information assets must be appropriately safeguarded to protect the organization from unauthorized access, malicious attacks, and data loss., topic=null, hs_path=information-asset-definition}--
{tableName=glossary, name=Risk, description= Risk is the potential for loss or harm that can be caused by making a decision or taking an action. It is the uncertainty of an outcome or the potential of suffering harm or loss. Risk can be both positive and negative; it can include financial, physical, psychological, and legal risks. Risk can be managed through an assessment of the potential outcomes, the likelihood of each outcome, and the consequences of each outcome. Risk management involves identifying, assessing, and managing risks, as well as developing strategies to minimize or prevent potential losses. Risk management is a critical part of any business, organization, or individual's decision-making process., topic=[{id=97620570509, createdAt=1673040885334, updatedAt=1683947919413, path='enterprise-risk-management', name=' Enterprise Risk Management Guide: A Comprehensive Guide', 1='{type=string, value=Enterprise Risk Management}', 2='{type=string, value= This guide provides an overview of Enterprise Risk Management and its processes, enabling you to develop a risk management strategy and plan for your organization. Learn how to identify, assess, and mitigate risks.}', 5='{type=string, value=This authoritative guide provides an overview of enterprise risk management (ERM) and its essential components. It is designed to help business leaders understand the fundamentals of ERM and develop the skills and knowledge needed to effectively manage risk in their organizations. The guide begins by defining ERM and outlining its main objectives. It then examines the key elements of ERM, including risk identification, assessment, and management. It also covers the importance of risk culture and the role of technology in ERM. Finally, the guide provides best practices for implementing and maintaining an effective ERM program. With this guide, business leaders will gain the knowledge and tools needed to effectively manage risk in their organizations.}'}], hs_path=risk}--
{tableName=glossary, name=Security Testing Requirements, description= Security Testing Requirements refer to the specific criteria that must be met in order to ensure that a system is secure. This includes both technical and non-technical aspects of the system, such as the security of the system's architecture, the security of user data, the security of the system's components, and the security of the system's communications. Security Testing Requirements must be met in order for a system to be considered secure and to protect the system from malicious attacks. Security Testing Requirements can include a variety of tests, such as penetration testing, vulnerability scanning, and security audits. Additionally, Security Testing Requirements may also include the implementation of security policies and procedures, such as access control, authentication, and encryption. Furthermore, Security Testing Requirements must be regularly reviewed and updated in order to ensure that the system remains secure and compliant with regulations., topic=[{id=97620570512, createdAt=1673040885353, updatedAt=1683947931775, path='vulnerability-management', name=' Vuln Mgmt Guide: Learn to Protect Your Business', 1='{type=string, value=Vulnerability Management}', 2='{type=string, value= Learn how to identify, assess, and manage security vulnerabilities in your organization with this comprehensive guide to Vulnerability Management. Get started now!}', 5='{type=string, value=This Vulnerability Management Guide provides an authoritative overview of the processes, strategies, and best practices for effectively managing vulnerabilities in an organization's IT systems. It explains the importance of vulnerability management and outlines the steps needed to build an effective vulnerability management program. It also covers the various tools and techniques used to identify, assess, and remediate vulnerabilities, as well as the importance of monitoring and reporting on the program's progress. Finally, the guide provides guidance on how to select the appropriate security solutions for an organization's needs. By following the advice in this guide, organizations can ensure that their systems are secure and their data is protected.}'}], hs_path=security-testing-requirements}--
{tableName=glossary, name=GRC Software Features, description= GRC Software Features are a set of tools and capabilities that enable organizations to better manage their governance, risk, and compliance (GRC) activities. These features allow organizations to identify, assess, monitor, and report on their GRC activities in order to ensure that they are meeting their legal, regulatory, and internal requirements. GRC Software Features can include automated reporting, audit management, risk assessment, policy management, incident management, and compliance monitoring. These features can help organizations to ensure that their GRC activities are properly managed, monitored, and reported upon, so that they can remain compliant with applicable laws and regulations. Additionally, GRC Software Features can provide organizations with the ability to identify, assess, and mitigate risks associated with their operations, as well as to identify and address any gaps in their GRC activities., topic=null, hs_path=grc-software-features}--
{tableName=guides, name=NIST SP 800-171, description= This guide provides an overview of NIST SP 800-171, a cybersecurity standard for protecting Controlled Unclassified Information (CUI) in nonfederal systems and organizations. Learn about the security, topic=null, hs_path=nist-sp-800-171}--

eBooks

GRC Buying Guide

eBook

GRC Buying Guide

In this eBook, we have covered the GRC buying basics including: knowing when to employ a new GRC capability, baseline ex...
Artificial Intelligence and Robust ...

eBook

Artificial Intelligence and Robust Content

Written by 6clicks CISO, Andrew Robinson, this eBook covers the interconnection of Artificial Intelligence and Machine L...
Everything You Need to Know About 6...

eBook

Everything You Need to Know About 6clicks

Learn more about 6clicks as an organization and GRC SaaS provider including a platform overview, our solutions, a deeper...