Skip to content

Resources

Curated content for the cyber, risk and compliance professional: We cover the latest on cybersecurity, frameworks, risk, and compliance trends.

Webinars

6clicks product roadshow: Discover ...

On-demand Webinar

6clicks product roadshow: Discover the latest updates

Gain exclusive insights into the latest advancements on the 6clicks platform, starting with our integration with Wiz and...
date-icon

Oct 31, 2024

location

Virtual

Reducing cost and complexity of GRC...

On-demand Webinar

Reducing cost and complexity of GRC with CyberCX

Join Andrew Robinson, CISO & Co-Founder of 6clicks, and Belinda Edwards, Manager - Governance, Risk, and Compliance of C...
date-icon

Sep 19, 2024

location

Virtual

6clicks Hub & Spoke: Smart GRC solu...

On-demand Webinar

6clicks Hub & Spoke: Smart GRC solution for enterprise needs

Explore how 6clicks' unique Hub & Spoke deployment architecture streamlines cyber GRC management for federated enterpris...
date-icon

Sep 2, 2024

location

Virtual

See all webinars
{tableName=glossary, name=Cybersecurity Insurance, description= Cybersecurity Insurance is a type of insurance that provides coverage for losses resulting from cyber-attacks, data breaches, and other cyber-related risks. It helps to protect businesses from the financial losses that can occur when confidential information, intellectual property, or customer data is compromised. Cybersecurity insurance policies can cover expenses related to responding to a breach, such as the cost of hiring a forensic investigator, legal fees, and notification costs. Additionally, it can provide reimbursement for lost income and expenses related to reputation damage. Cybersecurity insurance can also provide coverage for cyber extortion, cyber liability, and cybercrime., topic=null, hs_path=cybersecurity-insurance}--
{tableName=comparison, name=ASD Essential 8 vs SOC 2, description=ASD Essential 8 vs SOC 2: Learn the differences between the Australian Signals Directorate's Essential 8 security strategies and the AICPA's SOC 2 framework, topic=[{id=97620570506, createdAt=1673040885315, updatedAt=1715624279165, path='asd-essential-8', name=' ASD Essential 8 Guide: A Comprehensive Overview', 1='{type=string, value=ASD Essential 8}', 2='{type=string, value= This guide provides an overview of the ASD Essential 8 - 8 evidence-based strategies to help improve the outcomes of children with Autism Spectrum Disorder. Learn how to identify and implement these strategies to help}', 5='{type=string, value=This authoritative guide provides an in-depth look at the ASD Essential 8 (E8), a set of eight measures developed by the Australian Signals Directorate (ASD) to protect organizations from cyber threats. It explores whether the ASD Essential 8 are mandatory or not for your organisations and covers the fundamentals of each of the eight measures, including the maturity levels, how to perform an assessment and implementation guidenace.}', 15='{type=list, value=[{id=97620570506, name='ASD Essential 8'}]}'}], hs_path=asd-essential-8-vs-soc-2}--
{tableName=glossary, name=Inherent Risk, description= Inherent risk is the risk that is naturally present in a situation or activity, and is not necessarily caused by external factors. It is the risk that is always present and cannot be completely eliminated. It is the risk that is associated with a particular activity or process and is not necessarily caused by external factors. Inherent risk is the risk that is associated with the normal course of business, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent risk is the risk that is associated with the normal operations of an organization, and is not necessarily caused by external events or circumstances. Inherent, topic=null, hs_path=inherent-risk}--
{tableName=glossary, name=Risk Identification (Ri), description= Risk Identification (Ri) is the process of identifying and understanding potential risks that may affect an organization, project, or process. This process typically involves the identification of both internal and external factors that may have an impact on the organization, project, or process. Risk identification involves analyzing the environment and the organization's activities to identify potential risks. It also involves the analysis of internal and external data to identify potential risks. The process includes the identification of the sources of risk, the assessment of the probability of occurrence, and the evaluation of the consequences of the risk. The purpose of risk identification is to identify and prioritize risks that need to be addressed, so that the organization can manage them effectively., topic=null, hs_path=risk-identification-ri}--
{tableName=glossary, name=Vendor Management Policy, description= A Vendor Management Policy is a set of guidelines and procedures designed to ensure that vendors providing goods and services to an organization are properly managed. The policy outlines the expectations for vendors and the organization’s responsibilities for vendor management. It also provides guidance on how to select, assess, and monitor vendors to ensure successful outcomes. The policy outlines how to manage vendor relationships, how to address performance issues, and how to ensure that vendors meet contractual requirements and organizational standards. The policy should also include guidance on how to manage vendor contracts, how to handle confidential information, and how to ensure compliance with applicable laws and regulations., topic=[{id=97620570526, createdAt=1673040885440, updatedAt=1715624231354, path='vendor-risk-management', name=' Vendor Risk Management: A Guide to Best Practices', 1='{type=string, value=Vendor Risk Management}', 2='{type=string, value= Vendor Risk Management Guide: Learn the fundamentals of vendor risk management and how to identify, assess, and mitigate risks associated with third-party vendors.}', 5='{type=string, value=This Vendor Risk Management Guide provides a comprehensive overview of the key components of vendor risk management. It covers the fundamentals of vendor risk management, including risk identification, assessment, and mitigation strategies. It also provides guidance on the development of a vendor risk management program, including the process for selecting, onboarding, and monitoring vendors. Additionally, this guide provides guidance on the use of technology to automate and streamline the vendor risk management process. Finally, this guide provides a number of best practices for managing vendor risk and ensuring compliance with applicable regulations. With this guide, organizations can create a comprehensive and effective vendor risk management program that ensures the safety of their data and systems.}', 15='{type=list, value=[{id=97620570526, name='Vendor Risk Management'}]}'}], hs_path=vendor-management-policy}--
{tableName=glossary, name=ISO/IEC 27001 Mandatory Clauses, description= ISO/IEC 27001 Mandatory Clauses are the minimum requirements for an Information Security Management System (ISMS) that must be met in order for an organization to achieve certification. The clauses are divided into two parts: the Statement of Applicability (SOA) and the Annex A (Controls). The SOA states the scope of the ISMS, the security objectives, and the controls that are applicable to the organization. The Annex A provides the detailed requirements for each of the controls, including their purpose, objectives, and implementation guidance. The ISO/IEC 27001 Mandatory Clauses are designed to ensure that an organization is able to effectively protect the confidentiality, integrity, and availability of its information assets., topic=[{id=97620570500, createdAt=1673040885276, updatedAt=1716010651854, path='iso-27001', name=' ISO 27001 Guide: A Comprehensive Guide', 1='{type=string, value=ISO 27001}', 2='{type=string, value=This guide provides a comprehensive overview of the ISO 27001 standard, including the requirements, implementation, and certification. Learn how to ensure your organization's information security is up to date and compliant.}', 5='{type=string, value=

This guide provides an authoritative and detailed overview of the ISO/IEC 27001 standard, which defines the requirements for an Information Security Management Systems (ISMS) associated with information security, cybersecurity and privacy protection.

Learn about the purpose and scope of the standard, the key requirements for an ISMS, how to implement and maintain an ISMS, how to establish an effective security risk management program, how to develop and implement security policies, how to implement controls to protect information and services and how to audit and review systems to ensure they meet the requirements of the standard.

This guide is an essential resource for anyone looking to understand and implement ISO 27001.

}', 15='{type=list, value=[{id=97620570500, name='ISO 27001'}]}'}], hs_path=iso-iec-27001-mandatory-clauses}--