The Best of GRC Thought Leadership
Enjoy the latest in risk and compliance thought
leadership from the team at 6clicks.
What can you do to get ahead of the privacy curve?
What is ISO/IEC 27018:2019 ISO/IEC 27018:2019 provides organizations with the internationally accepted code of practice for the protection of personally identifiable information..
An introduction to ISO/IEC 27017:2015 and information security for cloud services
What is ISO/IEC 27017:2015 ISO/IEC 27017:2015 provides organizations with the internationally accepted code of practice for infromation security controls based on ISO/IEC 27002..
An overview of third-party risk management (TPRM) frameworks
What is a TPRM framework? A third party risk management framework is a set of policies, procedures, and tools that an organization uses to identify, assess, and manage the risks..
What is third party risk assessment?
What is third party risk assessment? Third party risk assessment is a process that organizations use to identify and evaluate the potential risks associated with working with..
How to choose vendor risk management software?
Vendor risk management is the process of identifying, assessing, and mitigating the risks associated with using third-party vendors. It involves conducting due diligence on..
What is vendor risk assessment and why is it important?
According to a Ponemon report, 51% of organisations have experienced a data breach due to the involvement of a third-party entity. Vendor risk assessment is a key step in..
The top 5 vendor risk assessment questionnaires for 2023
A vendor risk assessment questionnaire is a highly effective tool for organizations to identify any potential risks posed by their outside vendors. This kind of questionnaire aims..
Third party risk management for cyber risks in 2022
Many people view risk in business as something that should be avoided at all costs. However, we believe that with the appropriate third-party risk management processes, these..
It's times like these you learn to live again
Let out a good SBOM and carry on...
Supply chain cyber security - A guide for CEOs
Our world continues to become more interconnected. Global enterprises and organisations rely on trusted relationships, with their third-party suppliers providing services from..