This is the May news and product review from Cyberday and also a summary of the latest admin webinar. Read about NIS2 delays, recent cyberattacks as well as recent and future development on Cyberday.
What is an ISMS? A guide to information security management systems
Learn what ISMS is, why it matters, and how to implement an ISMS step-by-step. See how ISO 27001 and NIS2 fit into your information security management system.
10 things I wish I knew: Starting your ISO 27001 project on the right track
This post shares 10 key lessons learned from going through an ISO 27001 certification project - from the importance of setting clear goals and managing documentation to the realities of risk management and the value of using the right tools.
Framework recap, US security & and role management: Cyberday product and news summary 3/2025 🛡️
The March product and news update presents updates to role management and the new Trust Center, a review of the key frameworks for 2025 and US security.
ISMS implementation: comparison of documents, wikis, ISMS tools and GRC
There are a few different approaches to building an ISMS. In this post, we’ll compare these different methods, helping you understand which might be the best fit for your organization’s security management needs.
The evolving cyber sec landscape and growing demand for compliance in combination with a shortage of professionals calls for new ways of working. With the help of partnerships and agile tools, consultants can benefit from the current situation.
By embracing TISAX, automotive industry operators can improve information security, enhance compliance and strengthen their market position. Read more about TISAX, its scope, requirements and how ISO 27001 fits in.
DORA essentials: Introduction, Scope and key requirements
In this blog, we’ll get an comprehensive introduction what DORA is, what it entails, who the requirements framework applies to, and how DORA is implemented within Cyberday. DORA framework is available in Cyberday!
ISO 9001 standard: A peek inside the Quality framework
This blog post explores ISO 9001, the globally recognized standard for quality management systems (QMS), benefits for utilizing the standard and its significance in today’s competitive business environment.
Navigating the Cybersecurity Maze: Master NIS2 with the help of ISO 27001
Learn how to master NIS2 with ISO 27001 and grab our free NIS2 e-book! This blog post was originally written for the Cyber Security Nordic 2024 event where Cyderday is presented as Strategic partner.
Cannes Hospital data breach, the impact of AI and NIS2 evolution: the Cyberday product and news round-up 5/2024 🛡️
May's Product and News Update presents the new monthly ISMS reports as well as the Metrics page. Other topics include Cyberday's new framework DORA and recent news around the world.
This category includes diverse topics beyond frameworks, product updates, or company news, offering insights into cybersecurity, compliance, and tech trends.
What is CRA? Introduction to Cyber Resilience Act requirements
What is CRA (Cyber Resilience Act)? Learn CRA requirements, who it applies to, and how to prepare for CRA compliance with this complete, practical guide.
This is the May news and product review from Cyberday and also a summary of the latest admin webinar. Read about NIS2 delays, recent cyberattacks as well as recent and future development on Cyberday.
End of hourly billing: why value-based pricing works for compliance consultants
Hourly billing is fading fast in compliance consulting. Learn why value-based pricing better aligns incentives, boosts earnings, and how compliance consultants can transition effectively.
What is an ISMS? A guide to information security management systems
Learn what ISMS is, why it matters, and how to implement an ISMS step-by-step. See how ISO 27001 and NIS2 fit into your information security management system.
What is GDPR? Introduction to requirements
What is GDPR? Learn what the General Data Protection Regulation is, who it applies to, key requirements, and how to stay compliant with the EU data privacy law.
Cyber security regulations and frameworks in Belgium 🇧🇪
Explore Belgium cyber security regulations and frameworks like NIS2, GDPR, DORA, and ISO 27001 to ensure your business stays compliant and secure.
DORA essentials: Introduction, Scope and key requirements
In this blog, we’ll get an comprehensive introduction what DORA is, what it entails, who the requirements framework applies to, and how DORA is implemented within Cyberday. DORA framework is available in Cyberday!
Cyberday goes Cyber Security Nordic 2024!
Our Cyberday team attended the Cyber Security Nordic 2024 event 29th-30th October. Read about the event, keynote and our insights. This post offers insight into topical themes, also for those who were unable to attend.
From Compliance to Collaboration: How NIS2 Encourages Stronger Supply Chain Security Collaboration
Discover how NIS2 shifts focus from simple compliance to creating collaborative security partnerships, enhancing supply chain resilience and trust.
Agendium is now Cyberday!
We are thrilled to announce that our company is entering an exciting new chapter with an updated brand, from Agendium to Cyberday, our new name better reflects our entity, and the direction we are heading.
10 compliance traps & how to avoid them
Explore crucial cyber security compliance pitfalls for SMEs, from outdated policies to insider threats, and learn effective strategies to mitigate risks and enhance security measures.
ISO 9001 standard: A peek inside the Quality framework
This blog post explores ISO 9001, the globally recognized standard for quality management systems (QMS), benefits for utilizing the standard and its significance in today’s competitive business environment.
Navigating the Cybersecurity Maze: Master NIS2 with the help of ISO 27001
Learn how to master NIS2 with ISO 27001 and grab our free NIS2 e-book! This blog post was originally written for the Cyber Security Nordic 2024 event where Cyderday is presented as Strategic partner.
Corporate Security Alert: Identifying Dangerous Apps on Employee Phones
This article uncovers hidden security risks of popular apps on work devices, covering social media, messaging, cloud storage, gaming, utility, health, VPN, and shopping apps, with recommendations to safeguard corporate data.
NIS2 national legistation, ransomware and a new development forum: Cyberday product and news round-up 9/2024 🛡️
This is the September news and product review from Cyberday. Read news about ransomware, new phishing techniques and local NIS2-legistations.
IT and OT Cyber Security: Different Environments, Different Priorities
This blog post outlines the key differences between IT and OT cyber security, focusing on their distinct areas, objectives, environments, threat landscapes, and compliance requirements.
Cyber Security in Supply Chain Risk Management
Businesses should prioritize supply chain security by adopting best cyber security practices, fostering resilience, and promoting collaboration to protect against evolving cyber threats. Learn more about this topic in this blog post.
Spreadsheet vs. ISMS tool - top 10 reasons why a tool is better than the traditional way
Discover the top 10 reasons why agile tools outperform traditional spreadsheets in managing cyber security compliance, from centralized management to continuous improvement.