Recognising growth: move to new offices with Cyberday!
Join the Cyberday team when it's time to upgrade to a bigger office space. Read about the highlights of the autumn, and let's reflect together on how growth and physical security can shape the workspace.
Our Cyberday team attended the Cyber Security Nordic 2024 event 29th-30th October. Read about the event, keynote and our insights. This post offers insight into topical themes, also for those who were unable to attend.
We are thrilled to announce that our company is entering an exciting new chapter with an updated brand, from Agendium Ltd to Cyberday Inc, our new name better reflects our entity, and the direction we are heading.
This category includes diverse topics beyond frameworks, product updates, or company news, offering insights into cybersecurity, compliance, and tech trends.
What is GDPR? Learn what the General Data Protection Regulation is, who it applies to, key requirements, and how to stay compliant with the EU data privacy law.
Cyber security regulations and frameworks in Belgium 🇧🇪
Explore Belgium cyber security regulations and frameworks like NIS2, GDPR, DORA, and ISO 27001 to ensure your business stays compliant and secure.
What is the NIS2 Law in Belgium? 🇧🇪 Introduction to requirements
Learn what the Belgian NIS2 Law is, Belgium’s national implementation of the EU NIS2 Directive. Understand key requirements, compliance timelines, sector coverage, and how Cyberday helps you meet them.
What is CyberFundamentals? 🇧🇪 Belgium's cybersecurity framework
Learn what is CyberFundamentals, Belgium's cybersecurity framework for SMEs. Get an overview of requirements, benefits, and steps for compliance.
10 things I wish I knew: Starting your ISO 27001 project on the right track
This post shares 10 key lessons learned from going through an ISO 27001 certification project - from the importance of setting clear goals and managing documentation to the realities of risk management and the value of using the right tools.
Understanding NIS2: supervision and penalties of non-compliance
Let's now look into the NIS2 directive, it's supervision in EU member states and what is supervised. We'll also check out NIS2 penalties for noncompliance and how you can stay compliant (to avoid penalties).
Cannes Hospital data breach, the impact of AI and NIS2 evolution: the Cyberday product and news round-up 5/2024 🛡️
May's Product and News Update presents the new monthly ISMS reports as well as the Metrics page. Other topics include Cyberday's new framework DORA and recent news around the world.
6 ways to assess security work effectiveness
Evaluating the effectiveness of your cybersecurity involves examining the adequacy of your existing security measures. This process helps you identify your current security status and determine the necessary actions to enhance and fortify.
System acquisition and development in NIS2: Suggested best practices
Get tips on securely acquiring and developing systems with a focus on ISO 27001, helping meet NIS2 requirements. Post explains key aspects like secure coding, acquiring secure applications and testing or publishing changes in a controlled manner.
Continuity management in NIS2: Benchmark measures for business continuity and backups with ISO 27001
This post offers insight on complying with NIS2's continuity and backup requirements using ISO 27001's best practices. It guides you through continuity planning, backup processes, challenges, and achieving compliance effectively.
HR security in NIS2: Best practices for compliance
Learn how HR drives ISO 27001 and NIS2 compliance through security training, roles, and policies essential for building a strong information security culture.
Access control & MFA in NIS2: Build a solid foundation with ISO 27001 controls
What are the requirements for access control and MFA in NIS2 and ISO 27001 and how can they be implemented successfully? Learn more about the controls, requirements, best practices and how to overcome potential challenges in this blog post.
Potential Struggles IT Companies might Encounter with Incident Identification and Reporting Today
The complexities of incident identification and reporting in IT, touching on coordination problems, tool inadequacies, and process deficiencies. It explores modern challenges like cyber threats and alert fatigue, as well as the cognitive gap.
Information Security Risk Management: A Step-by-step Guide to a Clear Process
Get a step-by-step guide on managing information security risks, from asset identification to monitoring, essential for navigating growing cybersecurity threats.
Ransomware, AI Act 101, NIST CSF 2.0: Cyberday product and news round up 3/2024 🛡️
In the March digest, development themes include new frameworks, risk management improvements and a new visual view for documentation cards. The news features Information Security Trailblazers, data breaches and AI Act 101.
Empowering Employees: The Keystone in Incident Detection and Reporting
Employees are vital for detecting and reporting cyber threats and bolstering security. Proper training fosters a resilient culture, ensuring timely responses and safeguarding against breaches.
Incident reporting in NIS2: Requirements and related ISO 27001 best practices
Understand NIS2 incident reporting requirements and how ISO 27001 best practices can help ensure compliance and enhance your organization's security posture.
Top 7 information security standards, frameworks and laws explained
Many information security frameworks are available to help organizations build their own security plans. This article provides key information about some of the most popular information security frameworks.