Soon you will be able to assign a role as the owner for all different Cyberday contents instead of a direct user owner.
Roles will have their own management page, where you can link the desired users to roles and add your own roles. We will include a template list with the most common roles that are relevant to an ISMS.
Especially in larger organizations, role thinking can clarify things a lot. In addition, many security frameworks emphasize the importance of roles - and e.g. defining required competences and authorizations connected to roles - in systematic information security management work.