Skip to content

Resources

Curated content for the cyber, risk and compliance professional: We cover the latest on cybersecurity, frameworks, risk, and compliance trends.

Webinars

6clicks product roadshow: Discover ...

On-demand Webinar

6clicks product roadshow: Discover the latest updates

Gain exclusive insights into the latest advancements on the 6clicks platform, starting with our integration with Wiz and...
date-icon

Oct 31, 2024

location

Virtual

Reducing cost and complexity of GRC...

On-demand Webinar

Reducing cost and complexity of GRC with CyberCX

Join Andrew Robinson, CISO & Co-Founder of 6clicks, and Belinda Edwards, Manager - Governance, Risk, and Compliance of C...
date-icon

Sep 19, 2024

location

Virtual

6clicks Hub & Spoke: Smart GRC solu...

On-demand Webinar

6clicks Hub & Spoke: Smart GRC solution for enterprise needs

Explore how 6clicks' unique Hub & Spoke deployment architecture streamlines cyber GRC management for federated enterpris...
date-icon

Sep 2, 2024

location

Virtual

See all webinars
{tableName=glossary, name=Risk Management System And Process, description= A Risk Management System and Process is a system of structured procedures and processes used to identify, assess, monitor, manage, and mitigate risks associated with any activity, event, or project. This system is designed to help organizations identify, analyze, and respond to potential risks and threats, both internal and external. It is also used to help organizations create an effective strategy to reduce the likelihood of risks occurring and to minimize any potential damage if they do occur. Risk Management Systems and Processes involve assessing the probability of risks occurring, the severity of the consequences if they do occur, and the likelihood of success in mitigating the risks. It also involves creating policies and procedures to address the risks, as well as implementing systems to monitor and control risks. Risk Management Systems and Processes are designed to help organizations proactively identify, assess, and manage potential risks, as well as develop strategies to minimize potential losses., topic=null, hs_path=risk-management-system-and-process}--
{tableName=glossary, name=Cybersecurity Incident, description= Cybersecurity Incident: A cybersecurity incident is an event or series of events that occur when malicious actors attempt to compromise or gain unauthorized access to an organization’s information systems, networks, or data. This can include a variety of activities, such as unauthorized access, data theft, data manipulation, or disruption of service. A cybersecurity incident can have serious consequences for an organization, including financial losses, reputational damage, and disruption of operations. As such, organizations should have policies and procedures in place to identify and respond to cybersecurity incidents in a timely manner., topic=[{id=97620570528, createdAt=1673040885452, updatedAt=1715624222504, path='cybersecurity-risk-management', name=' Cybersecurity Risk Management: A Guide for Businesses', 1='{type=string, value=Cybersecurity Risk Management}', 2='{type=string, value= This guide provides essential information on cyber security risk management, including how to identify, assess, and mitigate risks to your organization's data and systems. Learn how to create a cyber security strategy that}', 5='{type=string, value=This Cybersecurity Risk Management Guide is designed to provide an authoritative overview of the key concepts and processes associated with effective cybersecurity risk management. It provides an introduction to the principles of risk management and the key steps involved in developing a successful risk management plan. It outlines the importance of understanding the threats and vulnerabilities that exist in the digital environment, as well as the steps that can be taken to mitigate these risks. It also discusses the need to develop a culture of security within an organization and the role of leadership in setting the tone for a secure environment. Finally, the guide provides guidance on the selection and implementation of security technologies, as well as the monitoring and review of risk management processes. This guide is an essential resource for anyone looking to understand and manage risks associated with cyber threats.}', 15='{type=list, value=[{id=97620570528, name='Cybersecurity Risk Management'}]}'}], hs_path=cybersecurity-incident}--
{tableName=comparison, name=ASD Essential 8 vs SOC 2, description=ASD Essential 8 vs SOC 2: Learn the differences between the Australian Signals Directorate's Essential 8 security strategies and the AICPA's SOC 2 framework, topic=[{id=97620570506, createdAt=1673040885315, updatedAt=1715624279165, path='asd-essential-8', name=' ASD Essential 8 Guide: A Comprehensive Overview', 1='{type=string, value=ASD Essential 8}', 2='{type=string, value= This guide provides an overview of the ASD Essential 8 - 8 evidence-based strategies to help improve the outcomes of children with Autism Spectrum Disorder. Learn how to identify and implement these strategies to help}', 5='{type=string, value=This authoritative guide provides an in-depth look at the ASD Essential 8 (E8), a set of eight measures developed by the Australian Signals Directorate (ASD) to protect organizations from cyber threats. It explores whether the ASD Essential 8 are mandatory or not for your organisations and covers the fundamentals of each of the eight measures, including the maturity levels, how to perform an assessment and implementation guidenace.}', 15='{type=list, value=[{id=97620570506, name='ASD Essential 8'}]}'}], hs_path=asd-essential-8-vs-soc-2}--
{tableName=glossary, name=Defence In Depth, description= Defence In Depth is a military strategy which seeks to protect an area from attack by creating multiple layers of defence. It involves a series of mutually supporting defensive positions, often located at different depths within the defensive area. The aim is to force an attacker to penetrate multiple layers of defences, each of which can be used to slow the attackers' progress and buy time for reinforcements to arrive. This strategy can be used to defend a wide variety of areas and assets, including physical locations, networks, and information systems. Defence In Depth is also known as a layered defence, or a multi-tiered defence., topic=null, hs_path=defence-in-depth}--
{tableName=guides, name=Critical Infrastructure, description=Discover our expert guide on Cyber GRC for critical infrastructure. Learn key frameworks, risk management, and compliance practices to protect vital systems from cyber threats., topic=[{id=167306711909, createdAt=1715639896212, updatedAt=1715708390844, path='critical-infrastructure', name='Cybersecurity risk and compliance for Critical Infrastructure', 1='{type=string, value=Critical Infrastructure}', 2='{type=string, value=Discover our expert guide on Cyber GRC for critical infrastructure. Learn key frameworks, risk management, and compliance practices to protect vital systems from cyber threats.}', 5='{type=string, value=This comprehensive guide delves into Cyber Governance, Risk, and Compliance (GRC) tailored for critical infrastructure sectors such as energy, healthcare, and transportation. Discover key components, best practices, and country-specific frameworks from Australia, the UK, and the US. Gain insights on risk assessment, incident response, and future trends to enhance your organization's cybersecurity resilience.}', 15='{type=list, value=[{id=167306711909, name='Critical Infrastructure'}]}'}], hs_path=critical-infrastructure}--
{tableName=comparison, name=NIST CSF vs SOC 2, description= The NIST Cybersecurity Framework (CSF) and SOC 2 are two important standards for organizations to understand and implement. Learn the differences between the two and how they can help protect your company, topic=[{id=97620570503, createdAt=1673040885296, updatedAt=1715624266851, path='nist-cybersecurity-framework-csf', name=' NIST Cybersecurity Framework: A Comprehensive Guide', 1='{type=string, value=NIST Cybersecurity Framework (CSF)}', 2='{type=string, value= A comprehensive guide to the NIST Cybersecurity Framework (CSF) and how to use it to protect your organization's IT infrastructure and data. Learn best practices and tips to help you improve}', 5='{type=string, value=This authoritative guide provides an overview of the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF). The guide will provide an in-depth look at the five core functions of the CSF, which are Identify, Protect, Detect, Respond, and Recover. It will also explain the importance of the CSF and how it can help organizations of all sizes to protect their networks and data from cyber threats. The guide will also provide an overview of the various tools and resources available to help organizations implement the CSF, as well as best practices for using the framework to ensure the security of their systems. Finally, the guide will provide a comprehensive look at the various roles and responsibilities associated with the CSF, including the roles of the organization, its employees, and external partners. This guide is an essential resource for any organization looking to protect its networks and data from the ever-evolving cyber threats.}', 15='{type=list, value=[{id=97620570503, name='NIST Cybersecurity Framework (CSF)'}]}'}], hs_path=nist-cybersecurity-framework-csf-vs-soc-2}--