Skip to content

The Best of GRC Thought Leadership

Enjoy the latest in risk and compliance thought
leadership from the team at 6clicks.

Latest Posts

What you need to know about CMMC 2.0 requirements

In early 2020, the US Department of Defense (DoD) introduced the Cybersecurity Maturity Model Certification (CMMC), which has since gained significant attention. The CMMC program..

Read More

What is enterprise risk management (ERM)?

Enterprise risk management (ERM) is the process of identifying, assessing, and managing risks that may impact an organization. It is a systematic and structured approach to..

Read More

7 tips for an effective threat and vulnerability management program

Threat actors are constantly searching for ways to exploit vulnerabilities in networks and software systems. These threats can come from both domestic and global sources and can..

Read More

4 elements of a robust vulnerability management program

In the wake of major security breaches, companies have been working to implement stronger and more proactive measures for managing vulnerabilities in their systems. However, as..

Read More

The risk based vulnerability management approach

What is risk based vulnerability management? Risk-based vulnerability management is an approach to identifying, evaluating, and prioritizing vulnerabilities in a system or network..

Read More

Risk identification: A key step in risk management

What is risk identification? Risk identification is the process of identifying potential risks that could affect a project or organization. This involves identifying and analyzing..

Read More

Understanding cybersecurity risk management

What is cybersecurity risk management? Cybersecurity risk management is the process of identifying, assessing, and mitigating risks to an organization's information and systems..

Read More

A brief overview of ASD Essential Eight

The ASD Essential Eight strategies are used by organisations to improve their cybersecurity posture. Here are some common questions about the cybersecurity framework. What is ASD..

Read More

How to choose vendor risk management software?

Vendor risk management is the process of identifying, assessing, and mitigating the risks associated with using third-party vendors. It involves conducting due diligence on..

Read More

What is vendor risk assessment and why is it important?

According to a Ponemon report, 51% of organisations have experienced a data breach due to the involvement of a third-party entity. Vendor risk assessment is a key step in..

Read More