www.cyberday.ai
Open in
urlscan Pro
18.102.16.191
Public Scan
Submitted URL: https://cyber-management-eu.com/
Effective URL: https://www.cyberday.ai/
Submission: On November 23 via api from US — Scanned from NL
Effective URL: https://www.cyberday.ai/
Submission: On November 23 via api from US — Scanned from NL
Form analysis
3 forms found in the DOMName: wf-form-Header-email-Form — POST
<form id="wf-form-Header-email-Form" name="wf-form-Header-email-Form" data-name="Header email Form" method="post" class="form partner-program w-clearfix" data-wf-page-id="5fa3e565154cd609d91e3344"
data-wf-element-id="d1b0bb0c-ffd2-20e1-9cbb-8cdcb33693db" aria-label="Header email Form"><input class="text-field menu w-input" maxlength="256" name="email-2" data-name="Email 2" placeholder="Your email address..." type="email" id="email-2"
required="">
<div class="vahti-form-divider"></div><input type="submit" data-wait="Odota hetki..." class="submit-button menu w-button" value="Subscribe now">
</form>
Name: email-form — POST https://agendium.us7.list-manage.com/subscribe/post?u=fe96e6fbe1065d5309db727a8&id=812bfdd6c6
<form id="email-form" name="email-form" data-name="Email Form" action="https://agendium.us7.list-manage.com/subscribe/post?u=fe96e6fbe1065d5309db727a8&id=812bfdd6c6" method="post" class="form-2 w-clearfix"
data-wf-page-id="5fa3e565154cd609d91e3344" data-wf-element-id="3896845e-4953-ee46-2c2d-8853410b53fd" aria-label="Email Form">
<div class="email-icon"></div><input class="text-field-2 w-input" maxlength="256" name="email-3" data-name="Email 3" placeholder="Email address" type="email" id="email-3" required=""><input type="submit" data-wait="Odota hetki..."
class="submit-button-2 w-button" value="Subscribe">
</form>
Name: email-form — POST https://agendium.us7.list-manage.com/subscribe/post?u=fe96e6fbe1065d5309db727a8&id=812bfdd6c6
<form id="email-form" name="email-form" data-name="Email Form" action="https://agendium.us7.list-manage.com/subscribe/post?u=fe96e6fbe1065d5309db727a8&id=812bfdd6c6" method="post" class="form-2 w-clearfix"
data-wf-page-id="5fa3e565154cd609d91e3344" data-wf-element-id="4c388925-9815-5d70-dec9-f95e24afad17" aria-label="Email Form">
<div class="email-icon"></div><input class="text-field-2 w-input" maxlength="256" name="Email" data-name="Email" placeholder="Sähköpostiosoite" type="email" id="email" required=""><input type="submit" data-wait="Odota hetki..."
class="submit-button-2 w-button" value="Liity">
</form>
Text Content
We value your privacy We use cookies to enhance your browsing experience and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Customize Reject All Accept All Customize Consent Preferences We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below. The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... Show more NecessaryAlways Active Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data. * Cookie _lfa * Duration 1 year * Description This cookie is set by the provider Leadfeeder to identify the IP address of devices visiting the website, in order to retarget multiple users routing from the same IP address. * Cookie __cfruid * Duration session * Description Cloudflare sets this cookie to identify trusted web traffic. * Cookie OptanonConsent * Duration 1 year * Description OneTrust sets this cookie to store details about the site's cookie category and check whether visitors have given or withdrawn consent from the use of each category. * Cookie _GRECAPTCHA * Duration 6 months * Description This cookie is set by the Google recaptcha service to identify bots to protect the website against malicious spam attacks. * Cookie cookieyes-consent * Duration 1 year * Description CookieYes sets this cookie to remember users' consent preferences so that their preferences are respected on their subsequent visits to this site. It does not collect or store any personal information of the site visitors. * Cookie intercom-id-* * Duration 8 months 26 days 1 hour * Description Intercom sets this cookie that allows visitors to see any conversations they've had on Intercom websites. * Cookie intercom-session-* * Duration 7 days * Description Intercom sets this cookie that allows visitors to see any conversations they've had on Intercom websites. * Cookie intercom-device-id-* * Duration 8 months 26 days 1 hour * Description Intercom sets this cookie that allows visitors to see any conversations they've had on Intercom websites. * Cookie _cfuvid * Duration session * Description Calendly sets this cookie to track users across sessions to optimize user experience by maintaining session consistency and providing personalized services * Cookie JSESSIONID * Duration session * Description New Relic uses this cookie to store a session identifier so that New Relic can monitor session counts for an application. Functional Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features. * Cookie __cf_bm * Duration 1 hour * Description This cookie, set by Cloudflare, is used to support Cloudflare Bot Management. * Cookie __sharethis_cookie_test__ * Duration session * Description ShareThis sets this cookie to track which pages are being shared and by whom. * Cookie player * Duration 1 year * Description Vimeo uses this cookie to save the user's preferences when playing embedded videos from Vimeo. * Cookie _calendly_session * Duration 21 days * Description Calendly, a Meeting Schedulers, sets this cookie to allow the meeting scheduler to function within the website and to add events into the visitor’s calendar. Analytics Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc. * Cookie _ga * Duration 1 year 1 month 4 days * Description The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. * Cookie _gid * Duration 1 day * Description Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. * Cookie _lfa_test_cookie_stored * Duration Less than a minute * Description No description * Cookie referrer_user_id * Duration 14 days * Description No description available. * Cookie vuid * Duration 1 year 1 month 4 days * Description Vimeo installs this cookie to collect tracking information by setting a unique ID to embed videos to the website. * Cookie _gat_gtag_UA_* * Duration 1 minute * Description Google Analytics sets this cookie to store a unique user ID. * Cookie _ga_* * Duration 1 year 1 month 4 days * Description Google Analytics sets this cookie to store and count page views. * Cookie ajs_user_id * Duration Never Expires * Description This cookie is set by Segment to help track visitor usage, events, target marketing, and also measure application performance and stability. * Cookie ajs_group_id * Duration Never Expires * Description This cookie is set by Segment to track visitor usage and events within the website. * Cookie _pendo_visitorId.4cfbcefc-fcf9-4b66-5dc6-9b0d81bb07a9 * Duration Never Expires * Description Pendo sets this cookie to identify and record the visitor’s Account ID that will be used in Pendo, like Guide delivery and analytics. * Cookie ajs_anonymous_id * Duration Never Expires * Description This cookie is set by Segment to count the number of people who visit a certain site by tracking if they have visited before. * Cookie _pendo_guides_blocked.4cfbcefc-fcf9-4b66-5dc6-9b0d81bb07a9 * Duration Never Expires * Description Pendo sets this cookie to identify and record the visitor’s Account ID that will be used in Pendo, like Guide delivery and analytics. Performance Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors. * Cookie sync_active * Duration Never Expires * Description This cookie is set by Vimeo and contains data on the visitor's video-content preferences, so that the website remembers parameters such as preferred volume or video quality. Advertisement Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns. No cookies to display. Others Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet. * Cookie m * Duration 1 year 1 month 4 days * Description No description available. * Cookie BROWNIE * Duration 7 days * Description Description is currently not available. * Cookie cf_clearance * Duration 1 year * Description Description is currently not available. * Cookie loom_anon_comment * Duration 1 year 1 month 4 days * Description No description available. * Cookie loom_referral_video * Duration session * Description Description is currently not available. * Cookie __Host-psifi.analyticsTrace * Duration 6 hours * Description Description is currently not available. * Cookie __Host-psifi.analyticsTraceV2 * Duration 6 hours * Description Description is currently not available. Reject All Save My Preferences Accept All Powered by Webinars weekly on different cyber security themes Webinars weekly - sign up >> - Register >> How it works CYBERDAY CONCEPT How it works? Summary of building your management system in Cyberday Frameworks Browse our growing library of security frameworks Security tasks and assurance Decide what needs goind and ensure it gets done MUUT SISÄLLÖT Documentation workflows Use our templates to efficiently document assets or plans Employee guidelines Delegate rules for acceptance to employees Policy and procedure templates Gather documents from other content when necessary RELATED LINKS Book a meeting Our team of experts is happy to assist you Help center Cyberday FAQ Development Recent improvements in Cyberday Use cases BY METHOD Cyber risk management Find the most critical areas for improvement Employee awareness Automate employee guidance and training Compliance reporting Show credible reports of how you comply LAAJENNUKSET Control management Decide what needs doing and ensure things get done Asset management Gather information of assets efficiently and set owners Dynamic policy and procedure documents Create dynamic repot documents when needed NEW Tulossa pian BY FRAMEWORK ISO 27001 Leading international information security standard NIS2 directive EU-wide cyber security law for important industries NIST CSF Designed to help cyber risk mgmt for critical infrastructure ISO 27701 GDPR ISO 27018 ISO 27017 See all frameworks Resources GET STARTED Webinars Sign up and join us live or via recording Blog Recent writings from our team Customers See how others have benefited GET HELP Academy Succeed with Cyberday with the help of our resource center. Book a meeting Our team of experts is happy to assist you Development Log of recent improvements in Cyberday WORK WITH US Partner program Let's collaborate to improve security and create new revenue for you! BECOME A PARTNER Subscribe for newsletter Get a weekly digest of cybersec content Thanks! See in your inbox on Fridays. :) Unfortunately something went wrong. Contact us at team@cyberday.ai. AcademyPricing Free trial Book a meeting Login IMPROVE AND CERTIFY CYBER SECURITY Cyberday splits chosen frameworks (e.g. ISO 27001, NIS2, DORA, ISO 27701) down to prioritized security tasks and guides you in implementing them directly inside Microsoft Teams. Try free in MS Teams Book a demo 500+ ORGANIZATIONS CERTIFY OR IMPROVE SECURITY WITH CYBERDAY VAATIMUSKEHIKOT VAATIMUS-KEHIKOT Valitse ensin, minkä vaatimusten mukaisesti haluatte toimia. Mikä ohjaa työtämme? ISO27001 ISO27 GDPR Lisää TEHTÄVÄT Vaatimukset täyttyvät jalkauttamalla digiturvatehtäviä. Mitä kukin tekee digiturvan eteen? OHJEISTUKSET Osa tehtävistä vaatii asioiden ohjeistamista henkilöstölle. Mitä pitää muistaa arjessa? DOKUMENTAATIO Osa tehtävistä vaatii listausten pitoa tietoturvan ydinelementeistä. Mistä pitää voida raportoida? MOST POPULAR FRAMEWORKS In Cyberday you can pick the most important cyber security frameworks as targets for your work. From these, a single list of security tasks is formed to your management system. Read more from solution pages. ISO 27001 2022 & 2013 versions NIST CSF GDPR ISO 27701 CSA CCM ISO 27017 ISO 27018 HOW SECURITY WORKS IN CYBERDAY Get a clear plan on how to improve and get compliant in the process See a detailed version 1 CHOOSE YOUR FRAMEWORKS Configure your security work by choosing your most relevant entities from framework library. ISO 27001 GDPR NIST CSA CCM Laws ISO 27701 ISO 27017 ISO 27018 WE CREATE YOUR POLICIES AUTOMATICALLY Cyberday's Content AI creates the necessary policies that get you compliant with selected frameworks. 587 tasks in content library Tasks mapped to 16 frameworks and 249 risks 2 IMPLEMENT POLICIES THROUGH SMART TASKS Policies are monitored through task owners and logs. Tasks are implemented using support tools and content in Cyberday.´ Asset management tools Risk management tools Employee awareness tools Link your security technology Write process descriptions 3 AUTOMATED CYBER SECURITY REPORTING With report library's dynamic templates, you can create the desired summaries of cyber security with "one click". Compliance reports PDF-snapshots of policies Procedure documents Descriptions required by law Custom reports CONFIGURE GET A UNIFIED PLAN DELEGATE FOR IMPLEMENTATION GATHER ASSURANCE YOUR INFORMATION SECURITY LEADERSHIP DASHBOARD To see a detailed presentation of a theme that interests you, check out our weekly webinars. Show upcoming webinars Monitor your compliance Control management and assurance Unified plan, multi-framework compliance Employee awareness on auto-pilot Efficient asset management Automated compliance reporting UNDERSTAND WHAT'S HAPPENING AROUND YOUR INFORMATION SECURITY Dashboard lists the active frameworks that configure for the organization's management system, a summary of the contents of the management system by theme, and other status information. In connection with each theme, the state of the tasks inside each theme is displayed and who is primarily responsible for their implementation. UNDERSTAND WHAT TO DO AND HOW, TO MEET THE REQUIREMENTS Work in the Cyberday is guided through security tasks. Tasks tell you what kind of work is required of the organization and how this requirement could be met. Each user sees the actions assigned for them in their personal Taskbook-view. SET THE BAR TO A LEVEL THAT SUITS YOU By selecting the most relevant requirement frameworks to guide digital security work from the perspective of their own operations, the organization is able to focus its efforts on digital security on important issues. Often, the same security task is associated with many requirements, so the compliance improves for many frameworks and double work is eliminated. TRAIN AND INSTRUCT STAFF AUTOMATICALLY Guidebook-tab is the end user's view of Cyberday. Admins define the guidelines, and staff are required to confirm the guidelines as read and accepted. They can also assist in improving the guidelines by commenting. Reminders are sent automatically by Cyberday's Teams bot and the process can be extended to include training content and skill tests. GATHER THE NECESSARY INFORMATION EFFICIENTLY Identified risks, data systems, processors of personal data ... Digital security work requires a systematic record of many things, either for reporting or to guide one's own work. Collect data in a smart format using ready-made data templates, examples and instructions. Each user sees the documentation items assigned for them in their personal Taskbook-view. GENERATE THE DESIRED SUMMARY WITH ONE CLICK A policy, a description required by law, or a report about the organization's information security operating models in general. To own management, external authority or auditor. You can find ready-made report templates for all kinds of reporting needs in Cyberday's report library, through which organization's own, ready-made reports are created directly with one click. RECENT CONTENT FROM OUR TEAM Every week we inform you about the most important cyber security news, upcoming free webinars and recent Cyberday development. Show all blog content webinar Wednesday 30 . 5 . @ 14:00 ADMIN TRAINING (PART 3/5): RISK MANAGEMENT AND SECURITY CONTROL IMPLEMENTATION Register now news news 22.11.2024 at DEEPFAKE ATTACKS OCCUR EVERY FIVE MINUTES Read full news blog 22.11.2024 UNDERSTANDING PHYSICAL SECURITY IN CYBERSECURITY: INSIGHTS FROM ISO 27001 AND BEST PRACTICES Open article HOW CYBERDAY WORKS Select your goals to get pre-filled policies. Implement -> Gather assurance -> Report -> Improve. STEP 1 SELECT YOUR GOALS. WE FILL YOUR SECURITY PLAN WITH CONTENT. Set your goals by activating your most relevant frameworks from our library. Requirements are instantly turned into policies you can start implementing. ISO 27001 NIS2 NIST CSF ISO 27017 GDPR ISO 27701 ISO 27018 Cyber Essentials ... STEP 2 EVALUATE YOUR CURRENT COVERAGE OF POLICIES. Choose the first theme and start evaluating how your current measures cover requirements. You’ll quickly see your starting compliance and understand the gap. Technical cyber security Privacy Personnel security Risk management and leadership Development and cloud STEP 3 CREATE ASSURANCE TO GIVE CONFIDENCE FOR YOUR EVALUATIONS. Tasks are proven to be implemented (for auditors, top management or your own team) through assurance information. Assurance info differs according to task’s type. Technological tasks Link security systems Organizational tasks Fill documentation or link reports People tasks Distribute guidelines Supporting tasks Write process descriptions STEP 4 USE AUTOMATED REPORTS TO COMMUNICATE YOUR CYBER SECURITY With report library's dynamic templates, you can create the desired summaries of cyber security with "one click". Compliance reports Security statements Policy snapshots (PDF) Procedure documents Legal descriptions Embeddable reports STEP 5 IMPROVE THROUGH RISK MANAGEMENT AND OTHER ADVANCED FEATURES Once you have a clear plan, you can start improving it smartly. You can utilize our tools for risk management, internal auditing and improvement management to get better every day. Our Cyberday AI will also help you spot most urgent improvements. Risk management Internal audits Incident management Continuous improvement CHANGING REQUIREMENTS, SAME SINGLE PLAN Same plan ISO 27001 NIS2 NIST CSF SOC 2 GDPR Cyber Essentials UNIVERSAL CYBER COMPLIANCE LANGUAGE MODEL: COMPLY WITH CONFIDENCE AND LEAST EFFORT In Cyberday, all frameworks’ requirements are mapped into universal tasks, so you achieve multi-framework compliance effortlessly. Security frameworks tend to share the common core. All frameworks cover basic topics like risk management, backup, malware, personnel awareness or access management in their respective sections. Cyberday’s universal cyber security language technology creates you a single security plan and ensures you implement the common parts of frameworks just once. You focus on implementing your plan, we automate the compliance part - for current and upcoming frameworks. Start your free trial ENDLESS METHODS TO IMPROVE YOUR SECURITY PERSONNEL CYBER SECURITY AWARENESS CONTROL MONITORING SECURITY RISK MANAGEMENT ASSET MANAGEMENT COMPLIANCE PROOF SMART REPORTING SEE ALL SUPPORTED FRAMEWORKS Learn more from Academy JOIN A GLOBAL CYBER SECURITY MOVEMENT Hundreds of companies all over the world use Cyberday to manage their information security. Certifications Critical industries Software / MSP companies Public administration The integration within the Teams app is great and ease of implementing it into the organization via app we all already use was great. The task based implementation made it simple to build upon and get everything completed within the time limit allowed for implementation. JAY B. Network Security Specialist Cyberday is well integrated with our daily tools. This was one of our main criteria when selecting a ISMS. With Teams and Slack integration we are able to reach our employees on the platform they use in their day to day activity. KIM B. Head of Cyber Security We are following the ISO 27001, Cyberday provides great tools to achieve all of the requirements. NIKO R. Application Specialist 1 2 We liked especially the easy of use, easy to get started, good for SME companies with limited resources. It's a nice fit for our needs at the moment. JANNE P. Director, Quality & Processes and Research Cyberday's advantages were a cheaper price, comprehensive scope, ease of use and an unlimited number of users. It also works as part of Microsoft Teams, which will make it easier to deploy the system. TOMMI S. ICT Development Manager STAY UP-TO-DATE ON CYBER SECURITY SUBSCRIBE FOR OUR FREE, WEEKLY NEWSLETTER Get a weekly digest with most important cybersec news, new Academy content and next week's free webinars. Kiitos! Saat vielä vahvistuksen sähköpostiisi. Valitettavasti tietojasi ei voitu lähettää eteenpäin. * YOUR EMAIL WON'T BE SOLD NOR DISCLOSED FORWARD. CONFIRMATION HAS MORE INFO. LEARN MORE GET STARTED TODAY Start free, in your familiar Teams environment. If you have some questions first, book a meeting with us. Start free 14-day trial Book a meeting PYSY KÄRRYILLÄ DIGITURVASTA TILAA DIGITURVAUUTISET SÄHKÖPOSTIISI Tiimimme seuraa jatkuvasti kymmeniä uutislähteitä maailmalta ja toimittaa tärkeimmät digiturvauutiset sähköpostiisi viikottain. Kiitos! Saat vielä vahvistuksen sähköpostiisi. Valitettavasti tietojasi ei voitu lähettää eteenpäin. * OSOITETTA EI MYYDÄ TAI LUOVUTETA ETEENPÄIN. VAHVISTUSVIESTISSÄ LISÄTIETOJA. LUE LISÄÄ HomePricingTeamSecurityCustomersBook a meetingBook a demoLogin HOW IT WORKS? SummarySecurity tasks and assuranceDocumentation workflowsEmployee guidelinesReporting templates USE CASES By frameworkAll frameworksISO 27001NIS2 directiveNIST CSFCSA CCMISO 27701GDPRISO 27017ISO 27018 By methodCyber risk managementEmployee awarenessCompliance reportingControl managementAsset managementDynamic policy documentsPrivacy management RESOURCES AcademyWebinarsBlogLeave a reviewPartner programTeamTerms of usePrivacy policy CONTACT US +358 10 231 6010 team@cyberday.ai App works in: Known in Finland as Digiturvamalli © Cyberday Inc. Kalevantie 2 33100 Tampere, Finland Cyberday.ai - Improve and certify your cyber security English * Deutsch * Svenska * Français * Nederlands * Dansk