Defining your ISMS scope (Information Security Management System) is one of the most important and basic requirements for implementing the ISO 27001 standard. While it looks like..
The Best of GRC Thought Leadership
It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout.

Subscribe for more from 6clicks
Tags

Third party risk management for cyber risks in 2022
Many people view risk in business as something that should be avoided at all costs. However, we believe that with the appropriate third-party risk management processes, these..

5 enterprise compliance considerations: Gaming edition
5 Enterprise compliance considerations, knowing 33% of employees are gaming and participating in sports gambling on their company PC. Online gaming is now the worlds largest..

Considerations when shopping for cyber insurance
I just returned from the RIMS2020 conference in San Francisco and while the newly built façade of Moscone Center was impressive, COVID protocols were dialed in and many friendly..

Navigating cyber security compliance
Introduction There are literally hundreds of standards, laws, frameworks and regulations that relate to cyber security. In most cases, there is considerable overlap with these...

It's times like these you learn to live again
Let out a good SBOM and carry on...

The innovators: Nick Yonko - Hershfield Consulting LLC
In short, Nick Yonko is an Information Security superstar. I could leave it at that, but here's a little more just to rub it in. As an information systems and security..

Delivering innovation & scale for MSSPs and risk advisors
Throughout 2021, we've had the opportunity to speak with over 200 leaders of risk advisory firms focused on supporting clients with challenges related to cyber, privacy, and more...

The methodologies that could save your organization
Stress less. Prepare, respond and recover with our step-by-step guides. Welcome to 6clicks Projects & Playbooks!

Cyber security risk 101: Introduction, frameworks and...
More than ever, organizations of all sizes are finding themselves under increasing pressure to mitigate and manage cyber risk. With cybercrime soaring and cyber incidents..