Skip to content

Resources

Curated content for the risk and compliance professional: We cover the latest on cybersecurity, frameworks, risks, and compliance trends.

On-Demand Webinar

Delivering Hub & Spoke GRC in Distr...

On-demand Webinar

Delivering Hub & Spoke GRC in Distributed & Autonomous Business

Internationally renowned GRC analyst Michael Rasmussen has performed a deep dive on our Hub and Spoke architecture and i...
date-icon

Jan 1, 2023

location

Virtual

Using Zero Trust Architecture to Ba...

On-demand Webinar

Using Zero Trust Architecture to Balance Cyber Security Risks

While the concept of "Zero Trust" is not new among enterprises, however, the modern workplace has changed radically in r...
date-icon

Jan 3, 2023

location

Virtual

How Can a vCISO Help Protect Your N...

On-demand Webinar

How Can a vCISO Help Protect Your Network?

With the threat landscape growing by the hour, the role of CISO has never been more important. Yet high demand and massi...
date-icon

Jan 5, 2023

location

Virtual

See all webinars
{tableName=glossary, name=Business Continuity Plan (BCP), description= A Business Continuity Plan (BCP) is a comprehensive plan that outlines how an organization will respond to, and recover from, a disruption in its operations. This plan identifies potential threats to the organization and the steps that will be taken to minimize the impact of those threats. The plan outlines the procedures that will be implemented in the event of an emergency, including the roles and responsibilities of staff, the resources that will be needed to manage the situation, and the timeline for restoring operations. Additionally, a BCP may also include strategies for communicating with customers, vendors, and other stakeholders during the disruption. The goal of a BCP is to ensure that the organization can quickly and effectively respond to any disruption and continue to provide the services and products that customers expect., topic=null, hs_path=business-continuity-plan-bcp}--
{tableName=glossary, name=Patch Management, description= Patch management is the process of identifying, downloading, testing, and applying patches to software applications and operating systems. It is an essential part of IT security and maintenance, as patches are released to fix security vulnerabilities, improve performance, and address other issues. Patch management involves a cycle of activities, including identifying applicable patches, obtaining and testing the patches, approving or rejecting the patches, and deploying the approved patches. This process is important for keeping systems current, secure, and functioning properly., topic=[{id=97620570512, createdAt=1673040885353, updatedAt=1683947931775, path='vulnerability-management', name=' Vuln Mgmt Guide: Learn to Protect Your Business', 1='{type=string, value=Vulnerability Management}', 2='{type=string, value= Learn how to identify, assess, and manage security vulnerabilities in your organization with this comprehensive guide to Vulnerability Management. Get started now!}', 5='{type=string, value=This Vulnerability Management Guide provides an authoritative overview of the processes, strategies, and best practices for effectively managing vulnerabilities in an organization's IT systems. It explains the importance of vulnerability management and outlines the steps needed to build an effective vulnerability management program. It also covers the various tools and techniques used to identify, assess, and remediate vulnerabilities, as well as the importance of monitoring and reporting on the program's progress. Finally, the guide provides guidance on how to select the appropriate security solutions for an organization's needs. By following the advice in this guide, organizations can ensure that their systems are secure and their data is protected.}'}], hs_path=patch-management}--
{tableName=glossary, name=Security Incident, description= A security incident is any event that compromises the confidentiality, integrity, or availability of an information system or the data it contains. This includes malicious attacks, accidental data breaches, system failures, or any other event that could lead to a data breach or system malfunction. Security incidents can range from minor to major, depending on the severity of the attack or breach. Common security incidents include phishing attacks, malware infections, ransomware attacks, denial of service attacks, and unauthorized access to systems or data. Security incidents can have serious consequences, such as financial losses, reputational damage, and legal liability. Therefore, it is important for businesses to have a comprehensive security strategy in place to protect their systems and data from these threats., topic=[{id=97620570528, createdAt=1673040885452, updatedAt=1683947994134, path='cybersecurity-risk-management', name=' Cybersecurity Risk Management: A Guide for Businesses', 1='{type=string, value=Cybersecurity Risk Management}', 2='{type=string, value= This guide provides essential information on cyber security risk management, including how to identify, assess, and mitigate risks to your organization's data and systems. Learn how to create a cyber security strategy that}', 5='{type=string, value=This Cybersecurity Risk Management Guide is designed to provide an authoritative overview of the key concepts and processes associated with effective cybersecurity risk management. It provides an introduction to the principles of risk management and the key steps involved in developing a successful risk management plan. It outlines the importance of understanding the threats and vulnerabilities that exist in the digital environment, as well as the steps that can be taken to mitigate these risks. It also discusses the need to develop a culture of security within an organization and the role of leadership in setting the tone for a secure environment. Finally, the guide provides guidance on the selection and implementation of security technologies, as well as the monitoring and review of risk management processes. This guide is an essential resource for anyone looking to understand and manage risks associated with cyber threats.}'}], hs_path=security-incident}--
{tableName=glossary, name=SOC Reports, description= SOC Reports, or Service Organization Control Reports, are independent third-party audit reports that provide assurance about the security, availability, and processing integrity of a service organization's system and the confidentiality and privacy of the information that is processed by the service organization. These reports are typically used by organizations that outsource their IT services or process customer data. SOC Reports are conducted by auditors who assess the service organization's internal controls, policies, procedures, and processes. They evaluate the effectiveness of the service organization's information security, privacy, and data protection programs, as well as the service organization's compliance with applicable laws and regulations. The reports are typically issued in three forms: SOC 1, SOC 2, and SOC 3. SOC 1 reports focus on the service organization's internal controls related to financial reporting, while SOC 2 and SOC 3 reports focus on the service organization's security, availability, and processing integrity., topic=null, hs_path=soc-reports}--
{tableName=comparison, name=PCI-DSS vs ASD Essential 8, description= PCI-DSS and ASD Essential 8 are two frameworks designed to help organizations protect sensitive data. Learn the differences between the two, topic=[{id=97620570502, createdAt=1673040885290, updatedAt=1683947890075, path='pci-dss', name=' PCI-DSS: A Guide to Meeting Security Requirements', 1='{type=string, value=PCI-DSS}', 2='{type=string, value=This guide provides an overview of the Payment Card Industry Data Security Standard (PCI-DSS) and the steps to take to ensure compliance with}', 5='{type=string, value=

This comprehensive guide provides a comprehensive overview of the Payment Card Industry Data Security Standard (PCI-DSS), a set of security standards designed to protect cardholder data and reduce the risk of data breaches. It covers the key components of the PCI-DSS, including the 12 requirements, the 6 goals, and the 6 core principles. It also provides a detailed description of the processes, technologies, and tools required to comply with the standard. Furthermore, the guide includes best practices for implementing the standard and provides resources to help organizations stay on top of the latest developments in the industry.

This guide provides a roadmap for achieving PCI-DSS compliance and maintaining a secure environment.

}'}], hs_path=pci-dss-vs-asd-essential-8}--
{tableName=glossary, name=Asset Security, description= Asset security is the protection of physical and digital assets from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves the application of security controls to ensure the confidentiality, integrity, and availability of assets. Asset security is a critical component of an organization's overall security strategy, as it helps protect its data, systems, and networks from malicious actors. This includes protecting against malicious actors who may attempt to gain access to sensitive information, disrupt operations, or damage the organization's reputation. Asset security also helps organizations protect their investments in hardware, software, and intellectual property. It involves the implementation of technical controls such as firewalls, authentication, encryption, and access control systems, as well as the development of policies and procedures for asset management, such as asset tracking, inventory control, and asset disposal. Asset security also includes the monitoring of assets to detect any unauthorized access or suspicious activity., topic=[{id=97620570528, createdAt=1673040885452, updatedAt=1683947994134, path='cybersecurity-risk-management', name=' Cybersecurity Risk Management: A Guide for Businesses', 1='{type=string, value=Cybersecurity Risk Management}', 2='{type=string, value= This guide provides essential information on cyber security risk management, including how to identify, assess, and mitigate risks to your organization's data and systems. Learn how to create a cyber security strategy that}', 5='{type=string, value=This Cybersecurity Risk Management Guide is designed to provide an authoritative overview of the key concepts and processes associated with effective cybersecurity risk management. It provides an introduction to the principles of risk management and the key steps involved in developing a successful risk management plan. It outlines the importance of understanding the threats and vulnerabilities that exist in the digital environment, as well as the steps that can be taken to mitigate these risks. It also discusses the need to develop a culture of security within an organization and the role of leadership in setting the tone for a secure environment. Finally, the guide provides guidance on the selection and implementation of security technologies, as well as the monitoring and review of risk management processes. This guide is an essential resource for anyone looking to understand and manage risks associated with cyber threats.}'}], hs_path=asset-security}--

eBooks

GRC Buying Guide

eBook

GRC Buying Guide

In this eBook, we have covered the GRC buying basics including: knowing when to employ a new GRC capability, baseline ex...
Artificial Intelligence and Robust ...

eBook

Artificial Intelligence and Robust Content

Written by 6clicks CISO, Andrew Robinson, this eBook covers the interconnection of Artificial Intelligence and Machine L...
Everything You Need to Know About 6...

eBook

Everything You Need to Know About 6clicks

Learn more about 6clicks as an organization and GRC SaaS provider including a platform overview, our solutions, a deeper...