Skip to content

Resources

Curated content for the cyber, risk and compliance professional: We cover the latest on cybersecurity, frameworks, risk, and compliance trends.

Webinars

6clicks product roadshow: Discover ...

On-demand Webinar

6clicks product roadshow: Discover the latest updates

Gain exclusive insights into the latest advancements on the 6clicks platform, starting with our integration with Wiz and...
date-icon

Oct 31, 2024

location

Virtual

Reducing cost and complexity of GRC...

On-demand Webinar

Reducing cost and complexity of GRC with CyberCX

Join Andrew Robinson, CISO & Co-Founder of 6clicks, and Belinda Edwards, Manager - Governance, Risk, and Compliance of C...
date-icon

Sep 19, 2024

location

Virtual

6clicks Hub & Spoke: Smart GRC solu...

On-demand Webinar

6clicks Hub & Spoke: Smart GRC solution for enterprise needs

Explore how 6clicks' unique Hub & Spoke deployment architecture streamlines cyber GRC management for federated enterpris...
date-icon

Sep 2, 2024

location

Virtual

See all webinars
{tableName=glossary, name=Health Information Trust Alliance (HITRUST), description= The Health Information Trust Alliance (HITRUST) is a non-profit organization that was created to provide a unified framework for managing and protecting sensitive healthcare information. This framework is designed to help organizations of all sizes and types, including healthcare providers, health plans, healthcare technology vendors, and other stakeholders, better manage and protect their sensitive information. HITRUST provides an array of services, including standards, tools, and resources, to help organizations assess and improve their security and privacy posture. The HITRUST Common Security Framework (CSF) is a comprehensive, prescriptive, and scalable security framework that provides organizations with a unified approach to managing and protecting sensitive information. The CSF includes a variety of security and privacy controls, including those related to data security, system security, personnel security, access control, and incident response. HITRUST also provides a variety of educational and certification programs to help organizations better understand and implement the CSF., topic=[{id=97620570526, createdAt=1673040885440, updatedAt=1715624231354, path='vendor-risk-management', name=' Vendor Risk Management: A Guide to Best Practices', 1='{type=string, value=Vendor Risk Management}', 2='{type=string, value= Vendor Risk Management Guide: Learn the fundamentals of vendor risk management and how to identify, assess, and mitigate risks associated with third-party vendors.}', 5='{type=string, value=This Vendor Risk Management Guide provides a comprehensive overview of the key components of vendor risk management. It covers the fundamentals of vendor risk management, including risk identification, assessment, and mitigation strategies. It also provides guidance on the development of a vendor risk management program, including the process for selecting, onboarding, and monitoring vendors. Additionally, this guide provides guidance on the use of technology to automate and streamline the vendor risk management process. Finally, this guide provides a number of best practices for managing vendor risk and ensuring compliance with applicable regulations. With this guide, organizations can create a comprehensive and effective vendor risk management program that ensures the safety of their data and systems.}', 15='{type=list, value=[{id=97620570526, name='Vendor Risk Management'}]}'}], hs_path=health-information-trust-alliance-hitrust}--
{tableName=glossary, name=Compliance Management, description= Compliance Management is the practice of ensuring that an organization is adhering to all applicable laws, regulations, standards, and ethical practices. It involves developing and implementing policies and procedures to ensure that the organization is in compliance with applicable laws, regulations, standards, and ethical practices. It also involves monitoring and enforcing the policies and procedures, conducting regular audits and reviews, and providing training and guidance to employees to ensure that they are in compliance. Compliance Management is an important part of any organization's overall risk management strategy and helps to ensure that the organization is operating in a safe and compliant manner., topic=null, hs_path=compliance-management}--
{tableName=glossary, name=Inherent Risk, description= Inherent risk is the risk that is naturally present in a situation or activity, and is not necessarily caused by external factors. It is the risk that is always present and cannot be completely eliminated. It is the risk that is associated with a particular activity or process and is not necessarily caused by external factors. Inherent risk is the risk that is associated with the normal course of business, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent, topic=null, hs_path=inherent-risk}--
{tableName=glossary, name=ISO/IEC 27002 Security Policy, description= ISO/IEC 27002 Security Policy is a set of guidelines, procedures, and best practices that organizations use to protect their information assets. It is based on a framework of security controls that are designed to reduce the risk of unauthorized access, use, disclosure, disruption, modification, or destruction of information. The security policy outlines the organization’s security objectives and identifies the security controls that will be used to achieve those objectives. The policy also defines the roles and responsibilities of personnel involved in the security process, and outlines the procedures for responding to security incidents. ISO/IEC 27002 Security Policy provides organizations with a comprehensive approach to information security management., topic=null, hs_path=iso-iec-27002-security-policy}--
{tableName=glossary, name=ISO/IEC , description= ISO/IEC is an international standardization organization that develops and publishes standards for a wide range of technologies and industries. It is a joint venture between the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). ISO/IEC standards are designed to ensure the safety, reliability, and interoperability of products and services across different industries. The standards cover a variety of topics, including information technology, electronics, software engineering, telecommunications, and medical devices. These standards are used to ensure that products and services are safe, reliable, and meet the required level of quality. They also help to promote global trade by providing a common language for businesses to communicate with each other. ISO/IEC standards are voluntary, meaning that companies are not required to adhere to them, but doing so can be beneficial for businesses in terms of cost savings, improved quality, and increased customer satisfaction., topic=null, hs_path=iso-iec-}--
{tableName=glossary, name=IT Audit, description= An IT Audit is an independent review of the information systems and related operations of an organization. It is designed to evaluate the effectiveness of internal controls, ensure compliance with applicable laws and regulations, and identify opportunities for improvement. IT Audits assess the accuracy and completeness of data, the integrity of system security and access controls, the effectiveness of system performance and reliability, the accuracy of system processing, the accuracy and completeness of system documentation, and the accuracy and completeness of system backups and recovery processes. The audit also evaluates the appropriateness of policies and procedures, the effectiveness of the organization’s IT governance framework, the adequacy of risk management processes, and the effectiveness of system change management processes. The audit process typically includes interviews with personnel, review of system documentation, and testing of system controls. The results of the audit are summarized in a report that provides recommendations for improvement and corrective actions., topic=null, hs_path=it-audit}--