Cyberday splits chosen frameworks (e.g. ISO 27001, NIST CSF, ISO 27701) down to prioritized security tasks and guides you in implementing them directly inside
Vaatimukset täyttyvät jalkauttamalla digiturvatehtäviä.
Mitä kukin tekee digiturvan eteen?
Osa tehtävistä vaatii asioiden ohjeistamista henkilöstölle.
Mitä pitää muistaa arjessa?
Osa tehtävistä vaatii listausten pitoa tietoturvan ydinelementeistä.
Mistä pitää voida raportoida?
In Cyberday you can pick the most important cyber security frameworks as targets for your work. From these, a single list of security tasks is formed to your management system. Read more from solution pages.
To see a detailed presentation of a theme that interests you, check out our weekly webinars.
Dashboard lists the active frameworks that configure for the organization's management system, a summary of the contents of the management system by theme, and other status information. In connection with each theme, the state of the tasks inside each theme is displayed and who is primarily responsible for their implementation.
Work in the Cyberday is guided through security tasks. Tasks tell you what kind of work is required of the organization and how this requirement could be met. Each user sees the actions assigned for them in their personal Taskbook-view.
By selecting the most relevant requirement frameworks to guide digital security work from the perspective of their own operations, the organization is able to focus its efforts on digital security on important issues. Often, the same security task is associated with many requirements, so the compliance improves for many frameworks and double work is eliminated.
Guidebook-tab is the end user's view of Cyberday. Admins define the guidelines, and staff are required to confirm the guidelines as read and accepted. They can also assist in improving the guidelines by commenting. Reminders are sent automatically by Cyberday's Teams bot and the process can be extended to include training content and skill tests.
Identified risks, data systems, processors of personal data ... Digital security work requires a systematic record of many things, either for reporting or to guide one's own work. Collect data in a smart format using ready-made data templates, examples and instructions. Each user sees the documentation items assigned for them in their personal Taskbook-view.
A policy, a description required by law, or a report about the organization's information security operating models in general. To own management, external authority or auditor. You can find ready-made report templates for all kinds of reporting needs in Cyberday's report library, through which organization's own, ready-made reports are created directly with one click.
Choose the framework you're interested in to learn more or view the whole framework library.
"A ready-made operating model for managing digital security and implementing various themes speeds up the start of digital security work, helps to get up to speed and helps people to participate in work more flexibly."
"With the help of Cyberday it is possible to significantly reduce the municipality's burden in managing the requirements set by law and to increase the efficiency of management and control work related to digital security. The service helps to increase the personnel's cyber security skills and to take care of their own responsibilities on time."
"Cyberday has helped to understand the requirements of the GDPR holistically and to organize the cooperation through which data protection issues are taken over in the organization."
Every week we inform you about the most important cyber security news, upcoming free webinars and recent Cyberday development.