Skip to content

Resources

Curated content for the risk and compliance professional: We cover the latest on cybersecurity, frameworks, risks, and compliance trends.

On-Demand Webinar

Delivering Hub & Spoke GRC in Distr...

On-demand Webinar

Delivering Hub & Spoke GRC in Distributed & Autonomous Business

Internationally renowned GRC analyst Michael Rasmussen has performed a deep dive on our Hub and Spoke architecture and i...
date-icon

Jan 1, 2023

location

Virtual

Using Zero Trust Architecture to Ba...

On-demand Webinar

Using Zero Trust Architecture to Balance Cyber Security Risks

While the concept of "Zero Trust" is not new among enterprises, however, the modern workplace has changed radically in r...
date-icon

Jan 3, 2023

location

Virtual

How Can a vCISO Help Protect Your N...

On-demand Webinar

How Can a vCISO Help Protect Your Network?

With the threat landscape growing by the hour, the role of CISO has never been more important. Yet high demand and massi...
date-icon

Jan 5, 2023

location

Virtual

See all webinars
{tableName=guides, name=UK Cyber Essentials, description= This authoritative guide provides a comprehensive overview of the UK Cyber Essentials scheme, a government-backed initiative that helps organisations protect themselves against the most common cyber threats. It covers the scheme’, topic=null, hs_path=uk-cyber-essentials}--
{tableName=glossary, name=Incident Response, description= Incident response is a set of procedures and processes for responding to and managing the aftermath of a security breach or cyber attack. It includes identifying the cause of the incident, assessing the damage, and implementing measures to prevent similar incidents from occurring in the future. It also involves communicating with stakeholders and responding to regulatory requirements. Incident response is an important part of an organization's overall security strategy and should be planned and tested in advance., topic=null, hs_path=incident-response}--
{tableName=glossary, name=Security And Integrity, description= Security and Integrity are two important concepts in the field of information technology. Security refers to the measures taken to protect data and systems from unauthorized access, modification, or destruction. This includes the use of encryption, authentication, and access control. Integrity is the assurance that data and systems remain accurate, consistent, and reliable. This includes the use of checksums, hashing, and audit trails. Security and integrity are essential for protecting data and systems from malicious attacks, and ensuring that data remains accurate and reliable., topic=[{id=97620570528, createdAt=1673040885452, updatedAt=1683947994134, path='cybersecurity-risk-management', name=' Cybersecurity Risk Management: A Guide for Businesses', 1='{type=string, value=Cybersecurity Risk Management}', 2='{type=string, value= This guide provides essential information on cyber security risk management, including how to identify, assess, and mitigate risks to your organization's data and systems. Learn how to create a cyber security strategy that}', 5='{type=string, value=This Cybersecurity Risk Management Guide is designed to provide an authoritative overview of the key concepts and processes associated with effective cybersecurity risk management. It provides an introduction to the principles of risk management and the key steps involved in developing a successful risk management plan. It outlines the importance of understanding the threats and vulnerabilities that exist in the digital environment, as well as the steps that can be taken to mitigate these risks. It also discusses the need to develop a culture of security within an organization and the role of leadership in setting the tone for a secure environment. Finally, the guide provides guidance on the selection and implementation of security technologies, as well as the monitoring and review of risk management processes. This guide is an essential resource for anyone looking to understand and manage risks associated with cyber threats.}'}], hs_path=security-and-integrity}--
{tableName=glossary, name=Data Owner, description= Data Owner is a term used to refer to the person or entity responsible for the creation, maintenance, and control of a set of data. This includes the right to decide how the data should be used, who can access it, and who can modify it. Data Owners are responsible for ensuring the security, accuracy, and integrity of the data, as well as for ensuring that any changes to the data are properly documented. Data Owners are also responsible for ensuring compliance with applicable laws and regulations, as well as for ensuring that the data is used in a manner that is consistent with the intended purpose of the data., topic=null, hs_path=data-owner}--
{tableName=guides, name=null, description=null, topic=null, hs_path=null}--
{tableName=glossary, name=Australian Securities and Investments Commission (ASIC), description= The Australian Securities and Investments Commission (ASIC) is an independent Australian government body that acts as Australia's corporate regulator. ASIC's role is to enforce and regulate Australia's corporate and financial services laws to protect consumers, investors and creditors. ASIC works to ensure that Australia's financial markets are fair, transparent and efficient. ASIC also administers the Australian Financial Services Licence (AFSL) system, which provides a framework for companies to offer financial services in Australia. ASIC also works to ensure that companies comply with their obligations under the Corporations Act 2001, including the disclosure of financial information and the regulation of financial products and services. ASIC also provides guidance to companies on their obligations and helps to protect investors and consumers from financial misconduct., topic=null, hs_path=australian-securities-and-investments-commission-asic}--

eBooks

GRC Buying Guide

eBook

GRC Buying Guide

In this eBook, we have covered the GRC buying basics including: knowing when to employ a new GRC capability, baseline ex...
Artificial Intelligence and Robust ...

eBook

Artificial Intelligence and Robust Content

Written by 6clicks CISO, Andrew Robinson, this eBook covers the interconnection of Artificial Intelligence and Machine L...
Everything You Need to Know About 6...

eBook

Everything You Need to Know About 6clicks

Learn more about 6clicks as an organization and GRC SaaS provider including a platform overview, our solutions, a deeper...