Skip to content

Resources

Curated content for the risk and compliance professional: We cover the latest on cybersecurity, frameworks, risks, and compliance trends.

On-Demand Webinar

Delivering Hub & Spoke GRC in Distr...

On-demand Webinar

Delivering Hub & Spoke GRC in Distributed & Autonomous Business

Internationally renowned GRC analyst Michael Rasmussen has performed a deep dive on our Hub and Spoke architecture and i...
date-icon

Jan 1, 2023

location

Virtual

Using Zero Trust Architecture to Ba...

On-demand Webinar

Using Zero Trust Architecture to Balance Cyber Security Risks

While the concept of "Zero Trust" is not new among enterprises, however, the modern workplace has changed radically in r...
date-icon

Jan 3, 2023

location

Virtual

How Can a vCISO Help Protect Your N...

On-demand Webinar

How Can a vCISO Help Protect Your Network?

With the threat landscape growing by the hour, the role of CISO has never been more important. Yet high demand and massi...
date-icon

Jan 5, 2023

location

Virtual

See all webinars
{tableName=glossary, name=Spyware Threat, description= Spyware threat is a type of malicious computer software that is installed on a user's computer without their knowledge or permission. Spyware is designed to collect information about the user and their activities, such as browsing history, keystrokes, and other data, and transmit it to a third-party without the user's knowledge. Spyware threats can also be used to track a user's location, steal passwords, or even control the user's computer remotely. Spyware can be difficult to detect and remove, and can be used to monitor a user's online activities, collect personal information, and even hijack the user's computer., topic=null, hs_path=spyware-threat}--
{tableName=comparison, name=GDPR vs PCI-DSS, description=GDPR and PCI-DSS are two data privacy and security standards. Learn about their differences and how to comply with both. , topic=[{id=97620570523, createdAt=1673040885422, updatedAt=1683947976779, path='gdpr', name=' GDPR: A Comprehensive Guide to Compliance', 1='{type=string, value=GDPR}', 2='{type=string, value= This GDPR Guide provides an authoritative overview of the General Data Protection Regulation (GDPR) and how it affects businesses and organizations. It outlines the key principles of the GDPR and provides an}', 5='{type=string, value=This GDPR Guide provides a comprehensive overview of the European Union's General Data Protection Regulation (GDPR). It covers the full scope of the GDPR, including its purpose, scope, definitions, principles, rights, obligations, enforcement, and more. It also provides practical advice on how to comply with the GDPR, including best practices for data protection, data security, and data management. This guide is an essential resource for any organization that collects, stores, or processes personal data.}'}], hs_path=gdpr-vs-pci-dss}--
{tableName=glossary, name=Data Leak, description= Data leak is the intentional or unintentional release of sensitive data to an unauthorized recipient. It can occur through a variety of methods, including hacking, malware, poor security practices, physical theft, or accidental disclosure. Data leaks can have serious consequences, including financial losses, reputational damage, and legal liabilities. In some cases, data leaks can even lead to the loss of life. Data leaks can be particularly damaging to organizations that handle sensitive information, such as healthcare providers, financial institutions, and government agencies. Organizations should take steps to ensure the security of their data, such as encrypting sensitive data, implementing access controls, and regularly monitoring for potential data leaks., topic=null, hs_path=data-leak}--
{tableName=guides, name=GRC Software, description= This guide provides an overview of GRC software, including its benefits, features, and how it can help organizations create a comprehensive GRC strategy. Learn how to choose the right GRC software, topic=null, hs_path=grc-software}--
{tableName=comparison, name=NIST SP 800-53 vs GDPR, description=NIST SP 800-53 and GDPR are two important frameworks for information security and privacy. Learn their similarities and differences., topic=[{id=97620570515, createdAt=1673040885373, updatedAt=1683947942816, path='nist-sp-800-53', name=' NIST SP 800-53 Security Guide: Protect Your Data', 1='{type=string, value=NIST SP 800-53}', 2='{type=string, value= This guide provides a comprehensive overview of NIST SP 800-53, a security and privacy control framework for federal information systems and organizations. Learn how to protect your data and comply with NIST}', 5='{type=string, value=This authoritative guide is based on the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53, which provides guidance for federal agencies on selecting, implementing, and managing information security controls. The guide covers a wide range of topics, including risk assessment, security control selection, security control implementation, and security control monitoring. It also provides detailed information on the security controls that should be implemented in the organization, as well as guidance on how to assess and monitor the effectiveness of those controls. Additionally, the guide provides detailed information on the Federal Information Security Management Act (FISMA) and its requirements for information security. The guide is intended to help organizations ensure that their information systems are secure and compliant with applicable laws and regulations.}'}], hs_path=nist-sp-800-53-vs-gdpr}--
{tableName=glossary, name=National Institute of Standards and Technology (NIST), description= The National Institute of Standards and Technology (NIST) is a non-regulatory federal agency within the U.S. Department of Commerce. Established in 1901, NIST is responsible for advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life. NIST works closely with industry, universities, and other government agencies to develop measurement methods and standards that are used in a wide variety of areas including advanced manufacturing, information technology, life sciences, and nanotechnology. NIST also provides technical assistance and research to industry and state and local governments. NIST is a leader in the development and use of standards and technology to improve the quality, safety, and reliability of products and services used by Americans. NIST also plays a key role in the development of national and international standards and in the promotion of the use of these standards., topic=null, hs_path=national-institute-of-standards-and-technology-nist}--

eBooks

GRC Buying Guide

eBook

GRC Buying Guide

In this eBook, we have covered the GRC buying basics including: knowing when to employ a new GRC capability, baseline ex...
Artificial Intelligence and Robust ...

eBook

Artificial Intelligence and Robust Content

Written by 6clicks CISO, Andrew Robinson, this eBook covers the interconnection of Artificial Intelligence and Machine L...
Everything You Need to Know About 6...

eBook

Everything You Need to Know About 6clicks

Learn more about 6clicks as an organization and GRC SaaS provider including a platform overview, our solutions, a deeper...