The Methodologies That Could Save Your Organization

Contents
One of the handiest modules (IMO) inside 6clicks has just had a bit of work done. And it looks a whole lot better than a celebrity after a dodgy Beverly Hills surgery.
6clicks Projects was awesome enough in allowing anyone associated with risk and compliance activities to manage all of the team's tasks in the same place they run risk and compliance engagements.
I mean, it spelt the end for separate tools and log-ins, spreadsheets or sticky notes and gave us one place for all our tasks, files and communication.
But ohhhh nooo, that wasn't enough for our product, security and content teams. The greed for fast intelligence... the terrifying lust for smart and agile GRC... will their gluttonous appetite to combine content, function, AI and reporting ever be satisfied!??
Probably not, because the module is now called 'Projects & Playbooks' - and it's an absolute banger.
Throw the Playbook At It
Let's face it, stuff goes wrong. All the time. Just look at the finale of Dexter, or the 9th season of Scrubs for that matter.
From stolen credentials and malware infections to remote access and device theft dramas - the chances of things going awry is becoming higher every day in business.
To that end, the team has come up with these 'hacks' of sorts. Playbooks are like your quiet achievers in the background - methodologies that may well save your entire organisation.
Here's the mindset order:
Preparation: Get ready to handle the incident
Identification: Detect the incident
Containment: Limit the impact of the incident
Remediation: Address or remove the threat
Recovery: Get back to your normal stage of operation
Aftermath: Reflect on what's been learnt and improve future processes
What's Inside
Brilliantly, the amount of playbooks in the Content Library is already packed (and growing, no doubt) which means you can shore up your offensive line really well, check out the selection here:
๐จ Files or devices locked up? = Ransomware Incident Response Playbook
โ๏ธ Getting some dodgy requests? = Cloud Email Compromise Incident Response Playbook
๐ช Secure your privileged accounts = Backdoor User Accounts Incident Response Playbook
๐ณ๐ Attackers want your credentials, especially administrative credentials. = Password Spraying Incident Response Playbook & Unsecured Credentials Incident Response Playbook
๐ก๏ธ Cyber criminals love hiding in your systems and networks. Defend yourself! = Defense Evasion (Disabling Security Software) Incident Response Playbook
๐ฃ Before someone accidentally (or not) infects your system with malware = Malware Incident Response Playbook
๐ฅ Stop criminals from making a machine or network inaccessible to its intended users = Denial of Service (DOS) Incident Response Playbook
๐ Someone lost their laptop, tablet or phone? Or was it...(gasp)...stolen!? = Device Theft/Loss Incident Response Playbook
โ ๏ธ You never know what vulnerabilities cyber criminals are going to find just by visiting your website! = Drive By Compromise Incident Response Playbook
โ๏ธ This is a nasty one. Don't become a headline! = Cyber Blackmail Incident Response Playbook
โ๏ธ It's a traaap! Social Engineering is EVERYWHERE = Social Engineering Incident Response Playbook
๐ Not a very nice thing to talk about, but it happens = Insider abuse Incident Response Playbook
๐ If some dodgy crim modifies the settings of your domain with malicious intent, then your defences, services and security could be rendered useless and cause some serious damage = Group Policy Modification Incident Response Playbook
๐ฐ What if someone gained control of your admin accounts? = Resource Development (Compromise Accounts) Incident Response Playbook
๐ Someone on the shonk? = Scam Incident Response Playbook
๐ด Money mules help criminal syndicates to remain anonymous when moving funds around the world. If you fail to detect them, you are in major trouble = Money Mule Scams (CEO Fraud) Incident Response Playbook
Making Projects More Manageable
In addition to the module allowing you to manage your workflow, there are now pre-packed project task templates ready to go for you and your team to execute on.
Here are a few you can kick off with:
ISO 31000:2009 Risk Management
ISO27005:2008 Information Security Risk Management
MEHARI 2010 Processing guide for risk analysis and management
NIST SP 800-30 r1 Guide for Conducting Risk Assessments
NIST Special Publication 800-39 Managing Information Security Risk
The DREAD Risk Assessment Model
The STRIDE Threat Model
Take It For a Spin
Jump into the 6clicks platform and give the new module a go! If you haven't signed up already, hit the Get Started button (top right) to sort you out ASAP.
Our Content Library is the Amazon of risk and compliance, with hundreds of pieces ranging from:
- Standards
- Laws
- Regulations
- Policies
- Control Sets
- Assessments
- Risk Libraries
- Projects & Playbooks
- Checklists
You can tighten your risk and compliance activities at the click of a button.
How about a whistle-stop tour with one of our 6clicks maestros? Easy, just click the button below and let the good times roll.
All we want to do, every day, is make the world of GRC easier to manage. We can't do that without you, so we hope to hear from you real soon!
Team 6clicks
Fast, clear, smart, agile. #NoSpreadsheets ๐ซ
Leave a Comment
Register for webinars, watch replays and download our ebooks
Our blog and 6clicks TV
Latest articles and interviews with our partners and thought leaders.
Our blog
6clicks TV
Top analysts and customers have spoken.
They genuinely love 6clicks.
"The best cyber GRC platform for businesses and advisors."
CEO | VAR & MSP
"We chose 6clicks not only for our clients, but also our internal useโ
Partner | Big 4
"With 6clicks we can simply close deals much faster"
CEO | Startup
"The 6clicks solution simplifies and strengthens risk, compliance, and control processes across entities and can grow and adapt as the organization changes and evolves."
Michael Rasmussen | GRC 20/20 Research LLC
Why businesses and advisors choose 6clicks
It's faster, easier and more cost effective than any alternative.
Powered by artificial
intelligence
Experience the magic of Hailey, our artificial intelligence engine for risk and compliance.
Unique Hub & Spoke architecture
Deploy multiple teams all connected to a hub - perfect for federated, multi-team structures.
Fully integrated
content library
Access 100's of standards, control sets, assessment templates, libraries and playbooks.