Skip to content

Resources

Curated content for the risk and compliance professional: We cover the latest on cybersecurity, frameworks, risks, and compliance trends.

On-Demand Webinars

Delivering Hub & Spoke GRC in Distr...

On-demand Webinar

Delivering Hub & Spoke GRC in Distributed & Autonomous Business

Internationally renowned GRC analyst Michael Rasmussen has performed a deep dive on our Hub and Spoke architecture and i...
date-icon

Jan 1, 2023

location

Virtual

Using Zero Trust Architecture to Ba...

On-demand Webinar

Using Zero Trust Architecture to Balance Cyber Security Risks

While the concept of "Zero Trust" is not new among enterprises, however, the modern workplace has changed radically in r...
date-icon

Jan 3, 2023

location

Virtual

How Can a vCISO Help Protect Your N...

On-demand Webinar

How Can a vCISO Help Protect Your Network?

With the threat landscape growing by the hour, the role of CISO has never been more important. Yet high demand and massi...
date-icon

Jan 5, 2023

location

Virtual

See all webinars
{tableName=glossary, name=Risk Management System And Process, description= A Risk Management System and Process is a system of structured procedures and processes used to identify, assess, monitor, manage, and mitigate risks associated with any activity, event, or project. This system is designed to help organizations identify, analyze, and respond to potential risks and threats, both internal and external. It is also used to help organizations create an effective strategy to reduce the likelihood of risks occurring and to minimize any potential damage if they do occur. Risk Management Systems and Processes involve assessing the probability of risks occurring, the severity of the consequences if they do occur, and the likelihood of success in mitigating the risks. It also involves creating policies and procedures to address the risks, as well as implementing systems to monitor and control risks. Risk Management Systems and Processes are designed to help organizations proactively identify, assess, and manage potential risks, as well as develop strategies to minimize potential losses., topic=null, hs_path=risk-management-system-and-process}--
{tableName=glossary, name=Prioritisation, description= Prioritisation is the process of determining the order of importance or urgency of activities, tasks, and decisions. It involves assessing the relative worth of competing demands for attention and allocating resources accordingly. It is a key skill for effective time management, as it helps to ensure that the most important tasks are completed first, and that resources are allocated in the most efficient way. Prioritisation can also be used to help make decisions about which projects or initiatives should take precedence over others, and which tasks should be completed first., topic=null, hs_path=prioritisation}--
{tableName=comparison, name=SOC 2 vs PCI-DSS, description= SOC 2 and PCI-DSS are two important security standards for organizations. Learn the differences between them and how they can help you protect your data., topic=[{id=97620570514, createdAt=1673040885366, updatedAt=1683947939686, path='soc-2', name=' SOC 2 Compliance: A Comprehensive Guide', 1='{type=string, value=SOC 2}', 2='{type=string, value= Compliance SOC 2 Compliance Guide: Learn the basics of SOC 2 compliance and how to ensure your organization meets the necessary standards. Get expert advice and resources to help you understand and implement the necessary}', 5='{type=string, value=This comprehensive guide provides an in-depth look at SOC 2, a set of standards used to assess the security, availability, processing integrity, confidentiality, and privacy of a service organization. It is designed to help service organizations understand the requirements of the SOC 2 framework, as well as how to implement and maintain the necessary controls to achieve compliance. This guide provides a detailed overview of the SOC 2 framework, including the five trust principles, the criteria used to evaluate those principles, and the process organizations must go through to become compliant. Additionally, this guide provides best practices for organizations to ensure they remain compliant, as well as advice on how to handle any non-compliance issues that may arise. With this guide, service organizations can gain a better understanding of the SOC 2 framework and how to use it to maintain the security and privacy of their customers' data.}'}], hs_path=soc-2-vs-pci-dss}--
{tableName=glossary, name=Information Security Governance, description= Information Security Governance is the overall management of an organization's information security policies, processes, and procedures. It is the responsibility of the organization's senior management to ensure that these policies, processes, and procedures are in place, are properly implemented, and are adhered to by all personnel. Information Security Governance includes the development, implementation, and maintenance of an organization's information security strategy, which should be based on the organization's risk management and compliance objectives. This strategy should be regularly reviewed and updated to reflect changes in the organization's risk profile and compliance requirements. Information Security Governance also involves the selection, implementation, and maintenance of appropriate security controls and technologies to protect the organization's information assets. Additionally, Information Security Governance includes the establishment of appropriate monitoring, reporting, and audit processes to ensure that the organization's information security policies and procedures are being followed. Finally, it involves the creation of appropriate communication and education plans to ensure that personnel are aware of their information security responsibilities and understand how to comply with them., topic=[{id=97620570504, createdAt=1673040885302, updatedAt=1684825196602, path='information-security-management-system-isms', name=' ISMS Guide: Info Security Mgmt System Overview', 1='{type=string, value=Information Security Management System (ISMS)}', 2='{type=string, value= This authoritative guide provides a comprehensive overview of Information Security Management Systems (ISMS). It covers the fundamentals of ISMS, as well as best practices for implementing an effective ISMS. It also}', 5='{type=string, value=This guide provides a comprehensive overview of Information Security Management Systems (ISMS), which are designed to protect organizations from the risks for which information security, cybersecurity and privacy protection are required. It covers the fundamentals of ISMS, including the components of an ISMS, the process of implementing an ISMS, and the various requirements and standards associated with ISMS. It also covers the different types of security threats, the best practices for mitigating them, and the importance of having a robust ISMS in place. Finally, this guide provides practical advice on how to design and implement an effective ISMS, as well as how to maintain it over time. With this guide, readers will gain a deeper understanding of how to protect their organizations from cyber threats and ensure their data is secure.}'}], hs_path=information-security-governance}--
{tableName=glossary, name=Vendor Assessment, description= Vendor Assessment is the process of evaluating potential suppliers and vendors to determine their ability to meet the needs of an organization. This process typically involves analyzing a vendor's performance history, customer service, product quality, pricing, and other factors to determine if they are a suitable partner. Vendor assessments are used to ensure that the vendor provides the best value for the organization, and that the vendor is reliable, dependable, and offers the highest quality products and services. Vendor assessments can also help organizations identify potential risks associated with working with certain vendors and help them select the most suitable vendor for their needs., topic=[{id=97620570526, createdAt=1673040885440, updatedAt=1683947987018, path='vendor-risk-management', name=' Vendor Risk Management: A Guide to Best Practices', 1='{type=string, value=Vendor Risk Management}', 2='{type=string, value= Vendor Risk Management Guide: Learn the fundamentals of vendor risk management and how to identify, assess, and mitigate risks associated with third-party vendors.}', 5='{type=string, value=This Vendor Risk Management Guide provides a comprehensive overview of the key components of vendor risk management. It covers the fundamentals of vendor risk management, including risk identification, assessment, and mitigation strategies. It also provides guidance on the development of a vendor risk management program, including the process for selecting, onboarding, and monitoring vendors. Additionally, this guide provides guidance on the use of technology to automate and streamline the vendor risk management process. Finally, this guide provides a number of best practices for managing vendor risk and ensuring compliance with applicable regulations. With this guide, organizations can create a comprehensive and effective vendor risk management program that ensures the safety of their data and systems.}'}], hs_path=vendor-assessment}--
{tableName=glossary, name=Security Incident, description= A security incident is any event that compromises the confidentiality, integrity, or availability of an information system or the data it contains. This includes malicious attacks, accidental data breaches, system failures, or any other event that could lead to a data breach or system malfunction. Security incidents can range from minor to major, depending on the severity of the attack or breach. Common security incidents include phishing attacks, malware infections, ransomware attacks, denial of service attacks, and unauthorized access to systems or data. Security incidents can have serious consequences, such as financial losses, reputational damage, and legal liability. Therefore, it is important for businesses to have a comprehensive security strategy in place to protect their systems and data from these threats., topic=[{id=97620570528, createdAt=1673040885452, updatedAt=1683947994134, path='cybersecurity-risk-management', name=' Cybersecurity Risk Management: A Guide for Businesses', 1='{type=string, value=Cybersecurity Risk Management}', 2='{type=string, value= This guide provides essential information on cyber security risk management, including how to identify, assess, and mitigate risks to your organization's data and systems. Learn how to create a cyber security strategy that}', 5='{type=string, value=This Cybersecurity Risk Management Guide is designed to provide an authoritative overview of the key concepts and processes associated with effective cybersecurity risk management. It provides an introduction to the principles of risk management and the key steps involved in developing a successful risk management plan. It outlines the importance of understanding the threats and vulnerabilities that exist in the digital environment, as well as the steps that can be taken to mitigate these risks. It also discusses the need to develop a culture of security within an organization and the role of leadership in setting the tone for a secure environment. Finally, the guide provides guidance on the selection and implementation of security technologies, as well as the monitoring and review of risk management processes. This guide is an essential resource for anyone looking to understand and manage risks associated with cyber threats.}'}], hs_path=security-incident}--

eBooks

GRC Buying Guide

eBook

GRC Buying Guide

In this eBook, we have covered the GRC buying basics including: knowing when to employ a new GRC capability, baseline ex...
Artificial Intelligence and Robust ...

eBook

Artificial Intelligence and Robust Content

Written by 6clicks CISO, Andrew Robinson, this eBook covers the interconnection of Artificial Intelligence and Machine L...
Everything You Need to Know About 6...

eBook

Everything You Need to Know About 6clicks

Learn more about 6clicks as an organization and GRC SaaS provider including a platform overview, our solutions, a deeper...