Skip to content

Articles by Heather Buker

Check out Heather's LinkedIn profile here or full biography here.

abstract_blog_circle_lime
 Hub & Spoke: Enabling multi-tenant GRC programs and GRCaaS

Effective GRC is an essential part of running a business. Yet, running an enterprise-level GRC program is a complex and challenging task that many organisations struggle with...

Read More

 GRC for MSPs: How to leverage the 6clicks platform?

Security and compliance go hand in hand in today’s world. You can no longer focus on one and hope that the other automatically aligns. This is why the number of companies looking..

Read More

 Powerful automation for scalable and future-ready MSPs

Managing GRC is complex, which is why many organisations outsource GRC management to Managed Service Providers (MSPs). But even for MSPs, managing GRCs for multiple clients is no..

Read More

 Setting the information security policy for ISO 27001

The Information Security policy is an important and mandatory document for ISO 27001 implementation. Several organisations struggle with creating a useful information security..

Read More

 Creating data stories to foster a data culture

Numbers alone are not enough to drive a data culture. For an effective data culture, you need to build stories around the data to keep everyone involved and aligned.

Read More

 Integrating your ISMS with Nessus & Qualys

Integrating your ISMS with Nessus & Qualys As many as 84% of software professionals believe that threats to the software supply chain will be the biggest concern in the next three..

Read More

 What is the common vulnerability scoring system and how does it work?

What is a Common Vulnerability Scoring System? The Common Vulnerability Scoring System (CVSS) is a standardized method used to assess and rate the severity of security..

Read More

 Integrating vulnerability management into your ISMS

Integrating Vulnerability Management into your ISMS Despite the increasing threat and a rapidly increasing number of cyber attacks, many companies seem to be struggling with..

Read More

 The Role of Penetration Testing in Cybersecurity and GRC Programs

Cybersecurity has become the top concern for businesses globally with attacks increasing in numbers and becoming more damaging than ever. Cybersecurity and GRC are often looked at..

Read More

 PCI SAQ assessing and reporting

PCI compliance got you down? Struggling to get started? Maintain? Still working out of spreadsheets? 6clicks is here to help.

Read More