Webinaari on ohi. Katso tulevat webinaarit >>

Starting in...


CyberSec & ISO 27001: Take control of the basics

Quick intro to ISO 27001 and starting your organisation's systematic cyber security management in Cyberday
More info about webinar
Presented by

Aleksi Pulkkanen

Co-Founder & COO @
Cyberday / Agendium Ltd
(45 min)
Session chosen
Book your spot now!
As a registered participant you can take part "live" or via recording.
about 45 minutes
We will talk about the cyber security basics that build the foundations for any systematic information security management system.

Webinar description

Welcome to our webinar training, where we go through utilizing Cyberday on organisation's cyber security management and complying with cyber security standards.

The main framework used in the training will be the leading international cyber security standard ISO 27001. We will present a step-by-step plan towards compliance. Part 1 of the webinar series addresses the cyber security basics, that always serve as a base for later development. Part 2 continues to more advanced cyber security management and aims at certification-level ISMS.

This is the part 1/2, which focuses on basics. We will give a short intro to ISO 27001 -standard's requirements and present the compliance action plan, documenting the cyber environments and creating an automatized personnel instructing / training process directly in Cyberday.

Webinar is suitable for anyone interested in developing cyber security in their own organization, as well as for current users of Cyberday who want to expand the use of the tool.

Webinar contents

1. Action plan towards better cyber security

  • Quick intro to ISO 27001 standard's main contents
  • 15-step action plan towards compliance

2. Efficiently document your cyber operating environment

  • Data systems, data pools, other data assets
  • System providers, data processors and other stakeholders
  • Incident management

3. Create an automated staff instructing and training process

  • Themes include e.g. phishing, remote work, mobile device usage and secure authentication
  • Implemention directly inside Microsoft Teams

4. How can everyone know their own role in cyber security work?

  • Taskbook-view
  • Guidebook-view

5. Next steps

  • Towards a certification-level ISMS

We welcome questions and comments throughout the webinar! These are also an important part of the webinar content.

P.s. Registering for the webinar doesn't commit you to anything. You may also participate either "live" or via the recording, which you will receive automatically via email after the webinar is over.

Register for the webinar

Registering for the webinar does not bind you to anything. In addition, you can arrive to comment either "live" or look back at the recording you will automatically receive in the email. Also, watching the webinar does not require any software or installations.

We recommend using a Chrome, Firefox, Safari or Edge browser.

Related webinars