Skip to content

The Best of GRC Thought Leadership

Enjoy the latest in risk and compliance thought
leadership from the team at 6clicks.

Latest Posts

5 Top Questionnaires to Assess Vendor Cybersecurity in 2022

The top 5 vendor risk assessment questionnaires for 2022

The top 5 vendor risk assessment questionnaires for 2022 Third-party risk management, or TPRM, can be a time-consuming task for any organisation – but it’s critical that you get..

Read More

Cyber Security Risk 101: Introduction, Frameworks and Management

Cyber security risk 101: Introduction, frameworks and management

More than ever, organizations of all sizes are finding themselves under increasing pressure to mitigate and manage cyber risk.  With cybercrime soaring and cyber incidents..

Read More

information security management system (ISMS)

Use case spotlight: Information Security Management System (ISMS)

If you need to protect customer and company information (that is almost all of you), an Information Security Management System (ISMS) based on ISO/IEC 27001 or NIST Cyber Security..

Read More

How To Run a COVID19 Risk & Cyber Detox

How to run a COVID19 risk & cyber detox

Before you go back to work, read this. 2020 Has Not Been Kind To Business Even though the previous one didn’t end that great either, COVID-19 is a massive wake-up call for every..

Read More

Why Your Start-up Can Be A Success

Why your start-up can be a success

Why Your Startup Can Be A Success. Cybersecurity: the key to scaling your Startup!  How exciting is it to be a Startup!? The possibilities, the pressure, the pure energy. Makes..

Read More

Meeting ASD Essential 8 requirements and ensuring compliance

The ASD essential 8 maturity model: A practical guide

Essential 8 and cyber security: A Practical Guide to Protect Your Business The digital age is redefining how businesses operate on every level. Technologies such as the cloud,..

Read More

5 reasons why spreadsheets don't work for managing risk assessments

Risky Business: 5 reasons why spreadsheets no longer work for managing risk assessments If your organisation relies on Excel and Word as its preferred tools for managing..

Read More

Revealed: How to develop effective cyber vendor governance

Revealed: How to develop effective cyber vendor governance There’s no doubt that working with third-party vendors and/or suppliers carries a very real risk, particularly in the..

Read More

Streamlining sales for your startup: Cybersecurity and trust

  In Critical to the success of any startup is figuring out the most effective sales process. This is typically very iterative, with lots of learnings along the way. However, one..

Read More