The Best of GRC Thought Leadership
Enjoy the latest in risk and compliance thought
leadership from the team at 6clicks.
What you need to know about CMMC 2.0 requirements
In early 2020, the US Department of Defense (DoD) introduced the Cybersecurity Maturity Model Certification (CMMC), which has since gained significant attention. The CMMC program..
What is enterprise risk management (ERM)?
Enterprise risk management (ERM) is the process of identifying, assessing, and managing risks that may impact an organization. It is a systematic and structured approach to..
7 tips for an effective threat and vulnerability management program
Threat actors are constantly searching for ways to exploit vulnerabilities in networks and software systems. These threats can come from both domestic and global sources and can..
4 elements of a robust vulnerability management program
In the wake of major security breaches, companies have been working to implement stronger and more proactive measures for managing vulnerabilities in their systems. However, as..
The risk based vulnerability management approach
What is risk based vulnerability management? Risk-based vulnerability management is an approach to identifying, evaluating, and prioritizing vulnerabilities in a system or network..
Risk identification: A key step in risk management
What is risk identification? Risk identification is the process of identifying potential risks that could affect a project or organization. This involves identifying and analyzing..
Understanding cybersecurity risk management
What is cybersecurity risk management? Cybersecurity risk management is the process of identifying, assessing, and mitigating risks to an organization's information and systems..
A brief overview of ASD Essential Eight
The ASD Essential Eight strategies are used by organisations to improve their cybersecurity posture. Here are some common questions about the cybersecurity framework. What is ASD..
How to choose vendor risk management software?
Vendor risk management is the process of identifying, assessing, and mitigating the risks associated with using third-party vendors. It involves conducting due diligence on..
What is vendor risk assessment and why is it important?
According to a Ponemon report, 51% of organisations have experienced a data breach due to the involvement of a third-party entity. Vendor risk assessment is a key step in..