Cyberday splits chosen frameworks (e.g. ISO 27001, NIST CSF, ISO 27701) down to prioritized security tasks and guides you in implementing them directly inside Microsoft Teams.
Vaatimukset täyttyvät jalkauttamalla digiturvatehtäviä.
Mitä kukin tekee digiturvan eteen?
Osa tehtävistä vaatii asioiden ohjeistamista henkilöstölle.
Mitä pitää muistaa arjessa?
Osa tehtävistä vaatii listausten pitoa tietoturvan ydinelementeistä.
Mistä pitää voida raportoida?
In Cyberday you can pick the most important cyber security frameworks as targets for your work. From these, a single list of security tasks is formed to your management system. Read more from solution pages.
Get a clear plan on how to improve and get compliant in the process
To see a detailed presentation of a theme that interests you, check out our weekly webinars.
Dashboard lists the active frameworks that configure for the organization's management system, a summary of the contents of the management system by theme, and other status information. In connection with each theme, the state of the tasks inside each theme is displayed and who is primarily responsible for their implementation.
Work in the Cyberday is guided through security tasks. Tasks tell you what kind of work is required of the organization and how this requirement could be met. Each user sees the actions assigned for them in their personal Taskbook-view.
By selecting the most relevant requirement frameworks to guide digital security work from the perspective of their own operations, the organization is able to focus its efforts on digital security on important issues. Often, the same security task is associated with many requirements, so the compliance improves for many frameworks and double work is eliminated.
Guidebook-tab is the end user's view of Cyberday. Admins define the guidelines, and staff are required to confirm the guidelines as read and accepted. They can also assist in improving the guidelines by commenting. Reminders are sent automatically by Cyberday's Teams bot and the process can be extended to include training content and skill tests.
Identified risks, data systems, processors of personal data ... Digital security work requires a systematic record of many things, either for reporting or to guide one's own work. Collect data in a smart format using ready-made data templates, examples and instructions. Each user sees the documentation items assigned for them in their personal Taskbook-view.
A policy, a description required by law, or a report about the organization's information security operating models in general. To own management, external authority or auditor. You can find ready-made report templates for all kinds of reporting needs in Cyberday's report library, through which organization's own, ready-made reports are created directly with one click.
Every week we inform you about the most important cyber security news, upcoming free webinars and recent Cyberday development.
Select your goals to get pre-filled policies. Implement -> Gather assurance -> Report -> Improve.
Set your goals by activating your most relevant frameworks from our library. Requirements are instantly turned into policies you can start implementing.
Choose the first theme and start evaluating how your current measures cover requirements. You’ll quickly see your starting compliance and understand the gap.
Tasks are proven to be implemented (for auditors, top management or your own team) through assurance information. Assurance info differs according to task’s type.
With report library's dynamic templates, you can create the desired summaries of cyber security with "one click".
Once you have a clear plan, you can start improving it smartly. You can utilize our tools for risk management, internal auditing and improvement management to get better every day. Our Cyberday AI will also help you spot most urgent improvements.
Hundreds of companies all over the world use Cyberday to manage their information security.