Skip to content

Resources

Curated content for the risk and compliance professional: We cover the latest on cybersecurity, frameworks, risks, and compliance trends.

On-Demand Webinars

Delivering Hub & Spoke GRC in Distr...

On-demand Webinar

Delivering Hub & Spoke GRC in Distributed & Autonomous Business

Internationally renowned GRC analyst Michael Rasmussen has performed a deep dive on our Hub and Spoke architecture and i...
date-icon

Jan 1, 2023

location

Virtual

Using Zero Trust Architecture to Ba...

On-demand Webinar

Using Zero Trust Architecture to Balance Cyber Security Risks

While the concept of "Zero Trust" is not new among enterprises, however, the modern workplace has changed radically in r...
date-icon

Jan 3, 2023

location

Virtual

How Can a vCISO Help Protect Your N...

On-demand Webinar

How Can a vCISO Help Protect Your Network?

With the threat landscape growing by the hour, the role of CISO has never been more important. Yet high demand and massi...
date-icon

Jan 5, 2023

location

Virtual

See all webinars
{tableName=glossary, name=IT Security, description= IT Security is a broad term that encompasses the processes, technologies, and practices designed to protect networks, devices, programs, and data from unauthorized access, malicious attack, and other security risks. It includes measures such as firewalls, antivirus software, encryption, and access control to prevent unauthorized users from accessing or manipulating sensitive information or systems. IT Security also includes policies and procedures to ensure that all users, systems, and data are secure and compliant with applicable laws and regulations. It also includes processes to detect, respond to, and mitigate security incidents such as data breaches, malware, and phishing attacks. Ultimately, IT Security is designed to protect organizations from malicious actors and threats to their networks, systems, data, and users., topic=[{id=97620570528, createdAt=1673040885452, updatedAt=1683947994134, path='cybersecurity-risk-management', name=' Cybersecurity Risk Management: A Guide for Businesses', 1='{type=string, value=Cybersecurity Risk Management}', 2='{type=string, value= This guide provides essential information on cyber security risk management, including how to identify, assess, and mitigate risks to your organization's data and systems. Learn how to create a cyber security strategy that}', 5='{type=string, value=This Cybersecurity Risk Management Guide is designed to provide an authoritative overview of the key concepts and processes associated with effective cybersecurity risk management. It provides an introduction to the principles of risk management and the key steps involved in developing a successful risk management plan. It outlines the importance of understanding the threats and vulnerabilities that exist in the digital environment, as well as the steps that can be taken to mitigate these risks. It also discusses the need to develop a culture of security within an organization and the role of leadership in setting the tone for a secure environment. Finally, the guide provides guidance on the selection and implementation of security technologies, as well as the monitoring and review of risk management processes. This guide is an essential resource for anyone looking to understand and manage risks associated with cyber threats.}'}], hs_path=it-security}--
{tableName=glossary, name=Implementation ISO/IEC 27003, description= Implementation ISO/IEC 27003 is a standard for information security management systems (ISMS) that provides guidelines and best practices for establishing, implementing, and maintaining an effective ISMS. It is based on the ISO/IEC 27001 standard and is intended to help organizations develop, implement, and maintain an ISMS that will protect their information assets and comply with applicable laws and regulations. The standard is divided into five sections: scope, objectives and principles, implementation, management, and assessment and audit. The scope section outlines the scope of the standard and provides an overview of the ISMS. The objectives and principles section describes the objectives of the ISMS and the principles that should be followed in order to achieve these objectives. The implementation section outlines the steps and processes necessary to implement an effective ISMS. The management section provides guidance for the management of the ISMS, including the development of policies and procedures, the implementation of security controls, and the monitoring and review of the ISMS. The assessment and audit section provides guidance on the assessment and audit of the ISMS., topic=null, hs_path=implementation-iso-iec-27003}--
{tableName=comparison, name=GDPR vs ASD Essential 8, description=GDPR and ASD Essential 8 are two sets of cybersecurity standards designed to protect organizations from data breaches. , topic=[{id=97620570523, createdAt=1673040885422, updatedAt=1683947976779, path='gdpr', name=' GDPR: A Comprehensive Guide to Compliance', 1='{type=string, value=GDPR}', 2='{type=string, value= This GDPR Guide provides an authoritative overview of the General Data Protection Regulation (GDPR) and how it affects businesses and organizations. It outlines the key principles of the GDPR and provides an}', 5='{type=string, value=This GDPR Guide provides a comprehensive overview of the European Union's General Data Protection Regulation (GDPR). It covers the full scope of the GDPR, including its purpose, scope, definitions, principles, rights, obligations, enforcement, and more. It also provides practical advice on how to comply with the GDPR, including best practices for data protection, data security, and data management. This guide is an essential resource for any organization that collects, stores, or processes personal data.}'}], hs_path=gdpr-vs-asd-essential-8}--
{tableName=glossary, name=Hybrid Data Center, description= A hybrid data center is a combination of a physical and virtual data center that uses both on-premises and cloud-based computing resources. It combines the best of both worlds, offering the benefits of physical data centers such as control, security, and low latency, while leveraging the scalability and flexibility of cloud computing. Hybrid data centers are designed to support a wide range of applications and workloads, including enterprise applications, big data, analytics, high-performance computing, and artificial intelligence. They offer the ability to deploy and manage applications and services across multiple locations, while providing the ability to scale up or down quickly in response to changing business needs. Hybrid data centers also offer the ability to optimize costs by utilizing a mix of on-premises and cloud-based resources., topic=null, hs_path=hybrid-data-center}--
{tableName=glossary, name=Security Testing Requirements, description= Security Testing Requirements refer to the specific criteria that must be met in order to ensure that a system is secure. This includes both technical and non-technical aspects of the system, such as the security of the system's architecture, the security of user data, the security of the system's components, and the security of the system's communications. Security Testing Requirements must be met in order for a system to be considered secure and to protect the system from malicious attacks. Security Testing Requirements can include a variety of tests, such as penetration testing, vulnerability scanning, and security audits. Additionally, Security Testing Requirements may also include the implementation of security policies and procedures, such as access control, authentication, and encryption. Furthermore, Security Testing Requirements must be regularly reviewed and updated in order to ensure that the system remains secure and compliant with regulations., topic=[{id=97620570512, createdAt=1673040885353, updatedAt=1683947931775, path='vulnerability-management', name=' Vuln Mgmt Guide: Learn to Protect Your Business', 1='{type=string, value=Vulnerability Management}', 2='{type=string, value= Learn how to identify, assess, and manage security vulnerabilities in your organization with this comprehensive guide to Vulnerability Management. Get started now!}', 5='{type=string, value=This Vulnerability Management Guide provides an authoritative overview of the processes, strategies, and best practices for effectively managing vulnerabilities in an organization's IT systems. It explains the importance of vulnerability management and outlines the steps needed to build an effective vulnerability management program. It also covers the various tools and techniques used to identify, assess, and remediate vulnerabilities, as well as the importance of monitoring and reporting on the program's progress. Finally, the guide provides guidance on how to select the appropriate security solutions for an organization's needs. By following the advice in this guide, organizations can ensure that their systems are secure and their data is protected.}'}], hs_path=security-testing-requirements}--
{tableName=glossary, name=Computer Security Threats, description= Computer security threats are malicious attempts by individuals or organizations to gain unauthorized access to a computer system, network, or data. These threats can take many forms, including viruses, malware, phishing, and social engineering. They can be used to steal data, damage systems, or disrupt operations. Computer security threats can have a wide range of impacts, from minor inconveniences to devastating losses of data and financial losses. To protect against these threats, organizations must employ a variety of security measures, including firewalls, antivirus software, patch management, and user education., topic=null, hs_path=computer-security-threats}--

eBooks

GRC Buying Guide

eBook

GRC Buying Guide

In this eBook, we have covered the GRC buying basics including: knowing when to employ a new GRC capability, baseline ex...
Artificial Intelligence and Robust ...

eBook

Artificial Intelligence and Robust Content

Written by 6clicks CISO, Andrew Robinson, this eBook covers the interconnection of Artificial Intelligence and Machine L...
Everything You Need to Know About 6...

eBook

Everything You Need to Know About 6clicks

Learn more about 6clicks as an organization and GRC SaaS provider including a platform overview, our solutions, a deeper...