ISO 27001 (part 2/5): Security controls, risk management and SoA
Coming up on:
Cyberday splits chosen frameworks (e.g. ISO 27001, NIST CSF, ISO 27701) down to prioritized security tasks and guides you in implementing them directly inside Microsoft Teams.
Vaatimukset täyttyvät jalkauttamalla digiturvatehtäviä.
Mitä kukin tekee digiturvan eteen?
Osa tehtävistä vaatii asioiden ohjeistamista henkilöstölle.
Mitä pitää muistaa arjessa?
Osa tehtävistä vaatii listausten pitoa tietoturvan ydinelementeistä.
Mistä pitää voida raportoida?
Join 300+ organisations using Cyberday for improved security and compliance
Get a clear plan on how to improve and get compliant in the process. See a detailed version
Dashboard lists the active frameworks that configure for the organization's management system, a summary of the contents of the management system by theme, and other status information. In connection with each theme, the state of the tasks inside each theme is displayed and who is primarily responsible for their implementation.Learn more
Work in the Cyberday is guided through security tasks. Tasks tell you what kind of work is required of the organization and how this requirement could be met. Each user sees the actions assigned for them in their personal Taskbook-view.Learn more
By selecting the most relevant requirement frameworks to guide digital security work from the perspective of their own operations, the organization is able to focus its efforts on digital security on important issues. Often, the same security task is associated with many requirements, so the compliance improves for many frameworks and double work is eliminated.Learn more
Guidebook-tab is the end user's view of Cyberday. Admins define the guidelines, and staff are required to confirm the guidelines as read and accepted. They can also assist in improving the guidelines by commenting. Reminders are sent automatically by Cyberday's Teams bot and the process can be extended to include training content and skill tests.Learn more
Identified risks, data systems, processors of personal data ... Digital security work requires a systematic record of many things, either for reporting or to guide one's own work. Collect data in a smart format using ready-made data templates, examples and instructions. Each user sees the documentation items assigned for them in their personal Taskbook-view.Learn more
A policy, a description required by law, or a report about the organization's information security operating models in general. To own management, external authority or auditor. You can find ready-made report templates for all kinds of reporting needs in Cyberday's report library, through which organization's own, ready-made reports are created directly with one click.Learn more
Choose the framework you're interested in to learn more or view the whole framework library.
"A ready-made operating model for managing digital security and implementing various themes speeds up the start of digital security work, helps to get up to speed and helps people to participate in work more flexibly."
"With the help of Cyberday it is possible to significantly reduce the municipality's burden in managing the requirements set by law and to increase the efficiency of management and control work related to digital security. The service helps to increase the personnel's cyber security skills and to take care of their own responsibilities on time."
"Cyberday has helped to understand the requirements of the GDPR holistically and to organize the cooperation through which data protection issues are taken over in the organization."
We help you succeed through weekly webinars of varying security themes. See all webinars
Coming up on:
Coming up on:
⚠️ +186% increase between 6/2020 - 6/2021 in #ransomware attacks at transportation industry. 🚆 Cyber attacks targeting transport authorities e.g. managing train or subway routes could be terrible. Article lists needed best practices >>
⚠️ Potentially harmful apps persist on Google Play for avg. 77 days Now researchers found 200 Android apps distributing #malware called Facestealer. These apps masquerade as VPNs, fitness, photo editing, and puzzle apps.
Researchers developed a tool for Bluetooth Low Energy relay attacks. Tesla Model 3 & Y use a BLE-based entry system, so attack could unlock and start the cars. More security? At least there's ‘PIN to Drive’ feature. 🚘 #cybersecurity