The Best of GRC Thought Leadership
Enjoy the latest in risk and compliance thought
leadership from the team at 6clicks.
Tags
Latest Posts

What can you do to get ahead of the privacy curve?
What is ISO/IEC 27018:2019 ISO/IEC 27018:2019 provides organizations with the internationally accepted code of practice for the protection of personally identifiable information..

6clicks Releases New Materials to Support DISP Members
6clicks has long supported Defence Industry Security Program (DISP) members and our advisory partners working to achieve and maintain DISP membership and compliance with the..

Using 6clicks to align with ISO 31001 risk management best practices
What is ISO 31001? ISO/IEC 31001 is a standard that provides guidance on how to establish, implement, maintain, and improve risk management in an organization. It is based on the..

An introduction to ISO/IEC 27017:2015 and information security for cloud services
What is ISO/IEC 27017:2015 ISO/IEC 27017:2015 provides organizations with the internationally accepted code of practice for infromation security controls based on ISO/IEC 27002..

An overview of third party risk management frameworks
What is a third party risk management framework? A third party risk management framework is a set of policies, procedures, and tools that an organization uses to identify, assess,..

What is third party risk assessment?
What is third party risk assessment? Third party risk assessment is a process that organizations use to identify and evaluate the potential risks associated with working with..

Threat vs vulnerability vs risk - what’s the difference?
A threat is a potential danger or adverse action that could cause harm or damage. A vulnerability is a weakness or gap in an organization's defenses that could be exploited by a..

Simplifying the NIST framework for enhanced cybersecurity
What is the NIST framework for cybersecurity? The NIST Cybersecurity Framework (CSF) is a set of guidelines and recommendations developed by the National Institute of Standards..

Vulnerability management lifecycle explained!
What is the vulnerability management lifecycle? The vulnerability management lifecycle is a systematic approach to managing and mitigating vulnerabilities in an organization's..

ISO 27001 2022 - what has changed?
The latest version, ISO 27001 2022 was released on October 25. It replaces the 2013 version of ISO 27001. Let’s find out what the key changes are and how the latest revision to..