Skip to content

The Best of GRC Thought Leadership

Enjoy the latest in risk and compliance thought
leadership from the team at 6clicks.

Latest Posts

What can you do to get ahead of the privacy curve?

What is ISO/IEC 27018:2019 ISO/IEC 27018:2019 provides organizations with the internationally accepted code of practice for the protection of personally identifiable information..

Read More

Increase Your Chances of Achieving DISP Membership

6clicks Releases New Materials to Support DISP Members

6clicks has long supported Defence Industry Security Program (DISP) members and our advisory partners working to achieve and maintain DISP membership and compliance with the..

Read More

Using 6clicks to align with ISO 31001 risk management best practices

What is ISO 31001? ISO/IEC 31001 is a standard that provides guidance on how to establish, implement, maintain, and improve risk management in an organization. It is based on the..

Read More

ISO IEC 27017:2015

An introduction to ISO/IEC 27017:2015 and information security for cloud services

What is ISO/IEC 27017:2015 ISO/IEC 27017:2015 provides organizations with the internationally accepted code of practice for infromation security controls based on ISO/IEC 27002..

Read More

An overview of third party risk management frameworks

What is a third party risk management framework? A third party risk management framework is a set of policies, procedures, and tools that an organization uses to identify, assess,..

Read More

What is third party risk assessment?

What is third party risk assessment? Third party risk assessment is a process that organizations use to identify and evaluate the potential risks associated with working with..

Read More

Threat vs vulnerability vs risk - what’s the difference?

A threat is a potential danger or adverse action that could cause harm or damage. A vulnerability is a weakness or gap in an organization's defenses that could be exploited by a..

Read More

Simplifying the NIST framework for enhanced cybersecurity

What is the NIST framework for cybersecurity? The NIST Cybersecurity Framework (CSF) is a set of guidelines and recommendations developed by the National Institute of Standards..

Read More

Vulnerability management lifecycle explained!

What is the vulnerability management lifecycle? The vulnerability management lifecycle is a systematic approach to managing and mitigating vulnerabilities in an organization's..

Read More

ISO 27001 2022 - what has changed?

The latest version, ISO 27001 2022 was released on October 25. It replaces the 2013 version of ISO 27001. Let’s find out what the key changes are and how the latest revision to..

Read More