Skip to content

Resources

Curated content for the cyber, risk and compliance professional: We cover the latest on cybersecurity, frameworks, risks, and compliance trends.

Webinars

Building intelligent vendor risk pr...

On-demand Webinar

Building intelligent vendor risk programs

Discover how to revolutionize your vendor risk management (VRM) processes with 6clicks' comprehensive solution in our on...
date-icon

May 29, 2024

location

Virtual

Q2 product showcase: Discover the n...

On-demand Webinar

Q2 product showcase: Discover the next wave of innovation

Join us for an exclusive webinar where our product managers unveil the latest advancements in our platform and provide i...
date-icon

Apr 17, 2024

location

Virtual

Introducing Hailey Assist: Your con...

On-demand Webinar

Introducing Hailey Assist: Your conversational AI assistant for GRC

Discover the power of Hailey Assist in our on-demand webinar. Learn how this conversational AI assistant revolutionizes ...
date-icon

Mar 28, 2024

location

Virtual

See all webinars
{tableName=guides, name=CMMC, description= This authoritative guide provides an in-depth look at the Cybersecurity Maturity Model Certification (CMMC) certification process. It covers the different levels of certification, the requirements for each level,, topic=[{id=101262800501, createdAt=1673586997136, updatedAt=1715624211458, path='cmmc', name=' Cybersecurity: CMMC Certification Guide', 1='{type=string, value=CMMC}', 2='{type=string, value= This authoritative guide provides an in-depth look at the Cybersecurity Maturity Model Certification (CMMC) certification process. It covers the different levels of certification, the requirements for each level,}', 5='{type=string, value=This guide provides an authoritative overview of the Cybersecurity Maturity Model Certification (CMMC) program. It explains the five levels of CMMC, the requirements for each level, and the steps organizations can take to become certified. It also provides a detailed overview of the certification process, the benefits of certification, and the resources available to organizations seeking certification. Finally, the guide provides best practices for implementing and maintaining cybersecurity standards, as well as guidance on how to prepare for a CMMC audit. This guide is an essential resource for organizations looking to protect their data and systems from cyber threats.}', 15='{type=list, value=[{id=101262800501, name='CMMC'}]}'}], hs_path=cmmc}--
{tableName=glossary, name=Incident Response Plan, description= An Incident Response Plan is a set of written instructions that outlines the steps an organization should take when responding to a security incident. It is a comprehensive document that covers all aspects of incident response, from initial detection and analysis to containment, eradication, and recovery. The plan should also include post-incident activities such as reporting, analysis, and follow-up. The plan should be tailored to the organization’s specific needs, and should include policies and procedures for responding to incidents, such as a communications plan, a notification plan, and a process for gathering evidence. The plan should also include roles and responsibilities for staff and resources, both internal and external, that will be involved in the incident response process., topic=null, hs_path=incident-response-plan}--
{tableName=glossary, name=Asset Inventory, description= An asset inventory is a comprehensive list of all the physical and intangible assets owned by a business or individual. It includes all tangible assets such as cash, buildings, machinery, equipment, inventory, furniture, motor vehicles, and land. It also includes intangible assets such as intellectual property, copyrights, patents, trademarks, and other non-physical assets. An asset inventory also includes information on the location, condition, and estimated value of each asset. The purpose of an asset inventory is to provide a detailed record of the assets owned by a business or individual, as well as to provide a clear picture of the business’s financial status. This information can be used to make strategic decisions, plan for the future, and provide evidence of ownership in the event of a dispute or lawsuit., topic=null, hs_path=asset-inventory}--
{tableName=glossary, name=Logic Bomb, description= A logic bomb is a malicious piece of code that is designed to cause damage to a computer system or disrupt its normal operations. It is usually triggered by a specific event or set of conditions, such as a specific date, a particular user action, or the passing of a certain amount of time. Once triggered, the logic bomb can delete data, corrupt files, or cause the system to crash. In some cases, logic bombs can even be used to spread malicious software to other systems. Logic bombs are usually created by skilled hackers or malicious software developers, and are usually difficult to detect and defend against., topic=null, hs_path=logic-bomb}--
{tableName=glossary, name=Incident Management Framework, description= Incident Management Framework is a set of processes, procedures, and systems that organizations use to manage and respond to incidents. It is an organized approach to addressing and resolving incidents quickly and efficiently. The framework typically includes the following components: incident identification, incident classification, incident response, incident resolution, and incident reporting. The goal of an incident management framework is to ensure that incidents are handled in a timely, consistent, and effective manner. It also helps to ensure that the organization is prepared to handle any potential incidents that may arise. This framework can help organizations to reduce the amount of time and resources required to respond to incidents, as well as to improve the organization's overall security posture., topic=[{id=97620570528, createdAt=1673040885452, updatedAt=1715624222504, path='cybersecurity-risk-management', name=' Cybersecurity Risk Management: A Guide for Businesses', 1='{type=string, value=Cybersecurity Risk Management}', 2='{type=string, value= This guide provides essential information on cyber security risk management, including how to identify, assess, and mitigate risks to your organization's data and systems. Learn how to create a cyber security strategy that}', 5='{type=string, value=This Cybersecurity Risk Management Guide is designed to provide an authoritative overview of the key concepts and processes associated with effective cybersecurity risk management. It provides an introduction to the principles of risk management and the key steps involved in developing a successful risk management plan. It outlines the importance of understanding the threats and vulnerabilities that exist in the digital environment, as well as the steps that can be taken to mitigate these risks. It also discusses the need to develop a culture of security within an organization and the role of leadership in setting the tone for a secure environment. Finally, the guide provides guidance on the selection and implementation of security technologies, as well as the monitoring and review of risk management processes. This guide is an essential resource for anyone looking to understand and manage risks associated with cyber threats.}', 15='{type=list, value=[{id=97620570528, name='Cybersecurity Risk Management'}]}'}], hs_path=incident-management-framework}--
{tableName=guides, name=MITRE ATT&CK, description= This guide provides an in-depth look at the MITRE ATT&CK framework, including how to use it to identify, detect, and respond to cyber threats. Learn how to create, topic=[{id=97620570520, createdAt=1673040885404, updatedAt=1715624526005, path='mitre-attck', name=' MITRE ATT&CK: A Comprehensive Guide', 1='{type=string, value=MITRE ATT&CK}', 2='{type=string, value= This guide provides an in-depth look at the MITRE ATT&CK framework, including how to use it to identify, detect, and respond to cyber threats. Learn how to create}', 5='{type=string, value=This comprehensive guide provides an in-depth exploration of the MITRE ATT&CK framework. It covers the fundamentals of the framework, its components, and how it can be used to identify, assess, and defend against cyber threats. It provides detailed descriptions of the techniques and tactics used by attackers and how to detect them. Additionally, this guide provides practical advice on how to create a defense-in-depth strategy, how to use the framework to prioritize security investments, and how to develop effective mitigation strategies. This guide is an essential resource for security professionals and organizations looking to understand and protect their networks and systems against malicious actors.}', 15='{type=list, value=[{id=97620570520, name='MITRE ATT&CK'}]}'}], hs_path=mitre-attck}--

eBooks

GRC 5.0: Explaining the Paradigm Sh...

eBook

GRC 5.0: Explaining the Paradigm Shift in GRC

In this eBook, 6clicks CEO, Anthony Stevens, covers the major paradigm shift in GRC, integrating your risk approach, ma...
GRC Buying Guide

eBook

GRC Buying Guide

In this eBook, we have covered the GRC buying basics including: knowing when to employ a new GRC capability, baseline ex...
Artificial Intelligence and Robust ...

eBook

Artificial Intelligence and Robust Content

Written by 6clicks CISO, Andrew Robinson, this eBook covers the interconnection of Artificial Intelligence and Machine L...