Skip to content

Resources

Curated content for the cyber, risk and compliance professional: We cover the latest on cybersecurity, frameworks, risks, and compliance trends.

On-Demand Webinars

Delivering Hub & Spoke GRC in Distr...

On-demand Webinar

Delivering Hub & Spoke GRC in Distributed & Autonomous Business

Internationally renowned GRC analyst Michael Rasmussen has performed a deep dive on our Hub and Spoke architecture and i...
date-icon

Jan 1, 2023

location

Virtual

Using Zero Trust Architecture to Ba...

On-demand Webinar

Using Zero Trust Architecture to Balance Cyber Security Risks

While the concept of "Zero Trust" is not new among enterprises, however, the modern workplace has changed radically in r...
date-icon

Jan 3, 2023

location

Virtual

How Can a vCISO Help Protect Your N...

On-demand Webinar

How Can a vCISO Help Protect Your Network?

With the threat landscape growing by the hour, the role of CISO has never been more important. Yet high demand and massi...
date-icon

Jan 5, 2023

location

Virtual

See all webinars
{tableName=glossary, name=ISO/IEC Internal Audit, description= ISO/IEC Internal Audit is a systematic and independent assessment of an organization's quality management system, processes, and activities, to determine whether the organization is meeting its objectives and conforming to applicable standards and regulations. It includes a review of the organization's policies, procedures, and processes, and an assessment of the effectiveness of the organization's quality management system. It also includes an evaluation of the organization's internal control systems, risk management processes, and the accuracy and completeness of the organization's records. The internal audit process is designed to identify areas of non-conformance, areas of improvement, and to provide recommendations for corrective action. The objective of ISO/IEC Internal Audit is to ensure that the organization has effective quality management systems in place that meet its objectives and comply with applicable standards and regulations., topic=null, hs_path=iso-iec-internal-audit}--
{tableName=glossary, name=Risk Control Self Assessment (RCSA), description= Risk Control Self Assessment (RCSA) is a systematic process used to identify, assess, monitor, and control risks within an organization. It is a tool used to ensure that risks are managed effectively, efficiently, and in accordance with organizational objectives. The RCSA process typically involves the identification of risk areas, the assessment of the risks, the application of control measures, the monitoring of risk levels, and the review of the risk management program. The RCSA process is designed to be an ongoing cycle, with continual feedback and improvement of the risk management program. The goal of the RCSA process is to ensure that risks are identified, assessed, and managed in a timely and effective manner. The RCSA process also helps to ensure that risks are managed in a way that is consistent with the organization's objectives., topic=null, hs_path=risk-control-self-assessment-rcsa}--
{tableName=glossary, name=SOC 2 Compliance, description= SOC 2 Compliance is a set of standards and requirements designed to ensure that organizations providing services to customers maintain the security, availability, processing integrity, confidentiality, and privacy of customer data. It requires organizations to implement a comprehensive set of security controls and processes to protect customer data and ensure its availability, integrity, and confidentiality. The SOC 2 standard is based on the Trust Services Criteria, which consists of five categories: Security, Availability, Processing Integrity, Confidentiality, and Privacy. Security includes measures to protect customer data from unauthorized access, use, or disclosure. Availability involves ensuring that customer data is available when needed. Processing Integrity requires that customer data is processed accurately and completely. Confidentiality ensures that customer data is not disclosed to unauthorized individuals or entities. Lastly, Privacy requires that organizations protect customer data in accordance with applicable laws and regulations. Organizations that achieve SOC 2 compliance demonstrate that they have taken the necessary steps to protect customer data and are committed to providing a secure environment., topic=null, hs_path=soc-2-compliance}--
{tableName=glossary, name=Information Asset Definition, description= An information asset is any data, document, or other information-based resource that is owned, managed, or maintained by an organization. This includes physical and digital information, such as documents, images, videos, audio files, databases, and websites. Information assets are valuable to an organization as they can provide insight into customer behavior, market trends, and internal processes. They can also be used to inform decision-making, improve customer service, and enable innovation. Information assets are typically managed through an information asset management system, which is responsible for the secure storage, retrieval, and analysis of information assets. Information assets must be appropriately safeguarded to protect the organization from unauthorized access, malicious attacks, and data loss., topic=null, hs_path=information-asset-definition}--
{tableName=guides, name=Defence Industry Security Program (DISP), description= This guide provides an overview of the Defence Industry Security Program (DISP), outlining the requirements for security clearance and how to apply for a DISP security clearance., topic=[{id=97620570508, createdAt=1673040885327, updatedAt=1715624286284, path='defence-industry-security-program-disp', name=' DISP Guide: Security for Defence Industry', 1='{type=string, value=Defence Industry Security Program (DISP)}', 2='{type=string, value= This guide provides an overview of the Defence Industry Security Program (DISP), outlining the requirements for security clearance and how to apply for a DISP security clearance.}', 5='{type=string, value=This comprehensive guide provides a comprehensive overview of the Defence Industry Security Program (DISP), which is the security program for the defence industry in Australia. It covers the DISP’s purpose, scope, and requirements, as well as how to apply for and manage security clearances. It also provides guidance on how to protect sensitive information, how to manage security incidents, and how to comply with the DISP. This guide is an invaluable resource for anyone involved in the defence industry in Australia.}', 15='{type=list, value=[{id=97620570508, name='Defence Industry Security Program (DISP)'}]}'}], hs_path=defence-industry-security-program-disp}--
{tableName=glossary, name=Risk Mitigation, description= Risk mitigation is the process of identifying, assessing, and reducing the potential for negative impacts of risks to an organization's objectives. It involves developing strategies to manage the risks and implementing those strategies to reduce the likelihood of their occurrence and/or the severity of their impact. Risk mitigation strategies can include risk avoidance, risk transfer, risk sharing, risk reduction, risk acceptance, and risk control. Risk avoidance involves eliminating or avoiding activities or situations that could result in the risk. Risk transfer involves transferring the risk to another party, such as an insurance company, who will assume the risk in exchange for a fee. Risk sharing involves sharing the risk between parties, such as when two companies form a joint venture. Risk reduction involves reducing the likelihood of the risk occurring or the severity of its impact. Risk acceptance involves accepting the risk and taking no action to reduce it. Risk control involves implementing measures to reduce the risk, such as implementing safety protocols or installing security systems., topic=[{id=97620570509, createdAt=1673040885334, updatedAt=1715624292575, path='enterprise-risk-management', name=' Enterprise Risk Management Guide: A Comprehensive Guide', 1='{type=string, value=Enterprise Risk Management}', 2='{type=string, value= This guide provides an overview of Enterprise Risk Management and its processes, enabling you to develop a risk management strategy and plan for your organization. Learn how to identify, assess, and mitigate risks.}', 5='{type=string, value=This authoritative guide provides an overview of enterprise risk management (ERM) and its essential components. It is designed to help business leaders understand the fundamentals of ERM and develop the skills and knowledge needed to effectively manage risk in their organizations. The guide begins by defining ERM and outlining its main objectives. It then examines the key elements of ERM, including risk identification, assessment, and management. It also covers the importance of risk culture and the role of technology in ERM. Finally, the guide provides best practices for implementing and maintaining an effective ERM program. With this guide, business leaders will gain the knowledge and tools needed to effectively manage risk in their organizations.}', 15='{type=list, value=[{id=97620570509, name='Enterprise Risk Management'}]}'}], hs_path=risk-mitigation}--

eBooks

GRC Buying Guide

eBook

GRC Buying Guide

In this eBook, we have covered the GRC buying basics including: knowing when to employ a new GRC capability, baseline ex...
Artificial Intelligence and Robust ...

eBook

Artificial Intelligence and Robust Content

Written by 6clicks CISO, Andrew Robinson, this eBook covers the interconnection of Artificial Intelligence and Machine L...
Everything You Need to Know About 6...

eBook

Everything You Need to Know About 6clicks

Learn more about 6clicks as an organization and GRC SaaS provider including a platform overview, our solutions, a deeper...