Skip to content

Articles by Heather Buker

Check out Heather's LinkedIn profile here or full biography here.

abstract_blog_circle_lime
 Curating a Single-Pane-of-Glass GRC Landscape

Building a robust enterprise GRC program is a journey and one that requires a well-thought-out plan followed by pristine execution coordinating across several teams and various..

Read More

 Creating your holistic GRC model with 6clicks Hub & Spoke

Advisors, private equity firms, large enterprises, and franchises have to maintain compliance at the top level and frequently manage GRC programs across multiple entities.

Read More

 All about PCI compliance & reporting

PCI compliance got you down? Struggling to get started? Maintain? Still working out of spreadsheets? 6clicks is here to help.

Read More

 Delivering pixel perfect audit reporting

When organizations are navigating the complexities of achieving and maintaining compliance with numerous authorities and regulators, producing quality reports with differing..

Read More

 Right sizing your GRC program

Because of all the changes we are living through - the velocity of regulatory changes, a global pandemic, and no end in sight of cyber events - there’s a heightened awareness of..

Read More

 Regulatory change management: The good, the bad & the content

Robust and up-to-date content is a crucial first step in any budding GRC program. This is very true when organizations are navigating the complexities of achieving and maintaining..

Read More

Business risk vs financial risk

The operation of a business at any level, in any department, involves risk. Therefore, it is crucial that every person in an organization understands the various risks associated..

Read More

Supply Chain Cyber Security

Our world continues to become more interconnected. Global enterprises and organizations rely on trusted relationships, with their third-party suppliers providing services from..

Read More

 5 ways spreadsheets are sabotaging your cybersecurity

Cybersecurity management is no small task, whether you are an in-house CISO, a vCISO, or a consultant. As the complexity of the many security standards (i.e., NIST, ISO 27001, and..

Read More