Skip to content

Articles by Louis Strauss

Check out Louis's LinkedIn profile here.

abstract_blog_circle_lime
TISAX vs ISO 27001

Information security is paramount in today's digital landscape, particularly for industries like automotive, where sensitive data and complex, global supply chains are prevalent...

Read More

 Developing a cybersecurity strategy for higher education institutions

With its vast network of personal information, research findings, and intellectual property, the education sector faces the challenge of protecting valuable data against diverse..

Read More

 Navigating AI in cyber GRC software: A comprehensive guide

We are thrilled to announce the release of our latest resource, a meticulously crafted spreadsheet designed to guide businesses in evaluating AI capabilities within cyber GRC..

Read More

A guide to TISAX: IT security in the automotive industry

In the digital era, the automotive industry's reliance on information technology is undeniable, making robust IT security a critical concern. The Trusted Information Security..

Read More

 What is security compliance? Understanding the basics

Security compliance involves a comprehensive approach to protecting sensitive data and complying with information security laws and regulations. By meeting security requirements,..

Read More

 The Three Lines and how 6clicks can help

Effective risk management involves not only implementing security measures but also establishing governance processes that form a unified structure for mitigating risks. The Three..

Read More

 ISO 27001: Why do we need an ISMS?

An Information Security Management System (ISMS) is designed to safeguard sensitive data and help organizations reduce risks and minimize the impact of cyber incidents. Providing..

Read More

 Breaking down an ISO 27001 policy

An information security policy is a requirement in the ISO 27001 standard that aims to demonstrate the commitment of an organization’s executive leadership team to information..

Read More

 ISO 27001 vs NIST CSF compliance: What's the difference?

ISO27001 and NIST CSF both provide organizations with a robust framework for establishing cybersecurity, information security, and data privacypractices and controls to..

Read More

 Regulatory changes and their impact on GRC

The ever-shifting regulatory landscape impels organizations to constantly recalibrate their GRC strategy according to all relevant laws and regulations. Information Security..

Read More

 Cyber incident response: A key element in enterprise security planning

While beneficial, digital transformation has opened the door to various modern cyber threats. These threats are becoming increasingly sophisticated, persistent, and difficult to..

Read More

 6clicks on Azure Private Cloud for cyber GRC managed services

Managed service providers play a critical role in helping organizations navigate complex regulatory landscapes and implement robust cyber GRC programs. As more organizations turn..

Read More