www.cyberday.ai Open in urlscan Pro
18.102.16.191  Public Scan

Submitted URL: https://cyberreg-compliance.com/
Effective URL: https://www.cyberday.ai/
Submission: On December 02 via api from BE — Scanned from DE

Form analysis 3 forms found in the DOM

Name: wf-form-Header-email-FormPOST

<form id="wf-form-Header-email-Form" name="wf-form-Header-email-Form" data-name="Header email Form" method="post" class="form partner-program w-clearfix" data-wf-page-id="5fa3e565154cd609d91e3344"
  data-wf-element-id="d1b0bb0c-ffd2-20e1-9cbb-8cdcb33693db" aria-label="Header email Form"><input class="text-field menu w-input" maxlength="256" name="email-2" data-name="Email 2" placeholder="Your email address..." type="email" id="email-2"
    required="">
  <div class="vahti-form-divider"></div><input type="submit" data-wait="Odota hetki..." class="submit-button menu w-button" value="Subscribe now">
</form>

Name: email-formPOST https://agendium.us7.list-manage.com/subscribe/post?u=fe96e6fbe1065d5309db727a8&id=812bfdd6c6

<form id="email-form" name="email-form" data-name="Email Form" action="https://agendium.us7.list-manage.com/subscribe/post?u=fe96e6fbe1065d5309db727a8&amp;id=812bfdd6c6" method="post" class="form-2 w-clearfix"
  data-wf-page-id="5fa3e565154cd609d91e3344" data-wf-element-id="3896845e-4953-ee46-2c2d-8853410b53fd" aria-label="Email Form">
  <div class="email-icon"></div><input class="text-field-2 w-input" maxlength="256" name="email-3" data-name="Email 3" placeholder="Email address" type="email" id="email-3" required=""><input type="submit" data-wait="Odota hetki..."
    class="submit-button-2 w-button" value="Subscribe">
</form>

Name: email-formPOST https://agendium.us7.list-manage.com/subscribe/post?u=fe96e6fbe1065d5309db727a8&id=812bfdd6c6

<form id="email-form" name="email-form" data-name="Email Form" action="https://agendium.us7.list-manage.com/subscribe/post?u=fe96e6fbe1065d5309db727a8&amp;id=812bfdd6c6" method="post" class="form-2 w-clearfix"
  data-wf-page-id="5fa3e565154cd609d91e3344" data-wf-element-id="4c388925-9815-5d70-dec9-f95e24afad17" aria-label="Email Form">
  <div class="email-icon"></div><input class="text-field-2 w-input" maxlength="256" name="Email" data-name="Email" placeholder="Sähköpostiosoite" type="email" id="email" required=""><input type="submit" data-wait="Odota hetki..."
    class="submit-button-2 w-button" value="Liity">
</form>

Text Content

We value your privacy

We use cookies to enhance your browsing experience and analyze our traffic. By
clicking "Accept All", you consent to our use of cookies.

Customize Reject All Accept All
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions.
You will find detailed information about all cookies under each consent category
below.

The cookies that are categorized as "Necessary" are stored on your browser as
they are essential for enabling the basic functionalities of the site. ... Show
more


NecessaryAlways Active

Necessary cookies are required to enable the basic features of this site, such
as providing secure log-in or adjusting your consent preferences. These cookies
do not store any personally identifiable data.

 * Cookie
   _lfa
 * Duration
   1 year
 * Description
   This cookie is set by the provider Leadfeeder to identify the IP address of
   devices visiting the website, in order to retarget multiple users routing
   from the same IP address.

 * Cookie
   __cfruid
 * Duration
   session
 * Description
   Cloudflare sets this cookie to identify trusted web traffic.

 * Cookie
   OptanonConsent
 * Duration
   1 year
 * Description
   OneTrust sets this cookie to store details about the site's cookie category
   and check whether visitors have given or withdrawn consent from the use of
   each category.

 * Cookie
   _GRECAPTCHA
 * Duration
   6 months
 * Description
   This cookie is set by the Google recaptcha service to identify bots to
   protect the website against malicious spam attacks.

 * Cookie
   cookieyes-consent
 * Duration
   1 year
 * Description
   CookieYes sets this cookie to remember users' consent preferences so that
   their preferences are respected on their subsequent visits to this site. It
   does not collect or store any personal information of the site visitors.

 * Cookie
   intercom-id-*
 * Duration
   8 months 26 days 1 hour
 * Description
   Intercom sets this cookie that allows visitors to see any conversations
   they've had on Intercom websites.

 * Cookie
   intercom-session-*
 * Duration
   7 days
 * Description
   Intercom sets this cookie that allows visitors to see any conversations
   they've had on Intercom websites.

 * Cookie
   intercom-device-id-*
 * Duration
   8 months 26 days 1 hour
 * Description
   Intercom sets this cookie that allows visitors to see any conversations
   they've had on Intercom websites.

 * Cookie
   _cfuvid
 * Duration
   session
 * Description
   Calendly sets this cookie to track users across sessions to optimize user
   experience by maintaining session consistency and providing personalized
   services

 * Cookie
   JSESSIONID
 * Duration
   session
 * Description
   New Relic uses this cookie to store a session identifier so that New Relic
   can monitor session counts for an application.

Functional


Functional cookies help perform certain functionalities like sharing the content
of the website on social media platforms, collecting feedback, and other
third-party features.

 * Cookie
   __cf_bm
 * Duration
   1 hour
 * Description
   This cookie, set by Cloudflare, is used to support Cloudflare Bot Management.

 * Cookie
   __sharethis_cookie_test__
 * Duration
   session
 * Description
   ShareThis sets this cookie to track which pages are being shared and by whom.

 * Cookie
   player
 * Duration
   1 year
 * Description
   Vimeo uses this cookie to save the user's preferences when playing embedded
   videos from Vimeo.

 * Cookie
   _calendly_session
 * Duration
   21 days
 * Description
   Calendly, a Meeting Schedulers, sets this cookie to allow the meeting
   scheduler to function within the website and to add events into the visitor’s
   calendar.

Analytics


Analytical cookies are used to understand how visitors interact with the
website. These cookies help provide information on metrics such as the number of
visitors, bounce rate, traffic source, etc.

 * Cookie
   _ga
 * Duration
   1 year 1 month 4 days
 * Description
   The _ga cookie, installed by Google Analytics, calculates visitor, session
   and campaign data and also keeps track of site usage for the site's analytics
   report. The cookie stores information anonymously and assigns a randomly
   generated number to recognize unique visitors.

 * Cookie
   _gid
 * Duration
   1 day
 * Description
   Installed by Google Analytics, _gid cookie stores information on how visitors
   use a website, while also creating an analytics report of the website's
   performance. Some of the data that are collected include the number of
   visitors, their source, and the pages they visit anonymously.

 * Cookie
   _lfa_test_cookie_stored
 * Duration
   Less than a minute
 * Description
   No description

 * Cookie
   referrer_user_id
 * Duration
   14 days
 * Description
   No description available.

 * Cookie
   vuid
 * Duration
   1 year 1 month 4 days
 * Description
   Vimeo installs this cookie to collect tracking information by setting a
   unique ID to embed videos to the website.

 * Cookie
   _gat_gtag_UA_*
 * Duration
   1 minute
 * Description
   Google Analytics sets this cookie to store a unique user ID.

 * Cookie
   _ga_*
 * Duration
   1 year 1 month 4 days
 * Description
   Google Analytics sets this cookie to store and count page views.

 * Cookie
   ajs_user_id
 * Duration
   Never Expires
 * Description
   This cookie is set by Segment to help track visitor usage, events, target
   marketing, and also measure application performance and stability.

 * Cookie
   ajs_group_id
 * Duration
   Never Expires
 * Description
   This cookie is set by Segment to track visitor usage and events within the
   website.

 * Cookie
   _pendo_visitorId.4cfbcefc-fcf9-4b66-5dc6-9b0d81bb07a9
 * Duration
   Never Expires
 * Description
   Pendo sets this cookie to identify and record the visitor’s Account ID that
   will be used in Pendo, like Guide delivery and analytics.

 * Cookie
   ajs_anonymous_id
 * Duration
   Never Expires
 * Description
   This cookie is set by Segment to count the number of people who visit a
   certain site by tracking if they have visited before.

 * Cookie
   _pendo_guides_blocked.4cfbcefc-fcf9-4b66-5dc6-9b0d81bb07a9
 * Duration
   Never Expires
 * Description
   Pendo sets this cookie to identify and record the visitor’s Account ID that
   will be used in Pendo, like Guide delivery and analytics.

Performance


Performance cookies are used to understand and analyze the key performance
indexes of the website which helps in delivering a better user experience for
the visitors.

 * Cookie
   sync_active
 * Duration
   Never Expires
 * Description
   This cookie is set by Vimeo and contains data on the visitor's video-content
   preferences, so that the website remembers parameters such as preferred
   volume or video quality.

Advertisement

Advertisement cookies are used to provide visitors with customized
advertisements based on the pages you visited previously and to analyze the
effectiveness of the ad campaigns.

No cookies to display.

Others


Other uncategorized cookies are those that are being analyzed and have not been
classified into a category as yet.

 * Cookie
   m
 * Duration
   1 year 1 month 4 days
 * Description
   No description available.

 * Cookie
   BROWNIE
 * Duration
   7 days
 * Description
   Description is currently not available.

 * Cookie
   cf_clearance
 * Duration
   1 year
 * Description
   Description is currently not available.

 * Cookie
   loom_anon_comment
 * Duration
   1 year 1 month 4 days
 * Description
   No description available.

 * Cookie
   loom_referral_video
 * Duration
   session
 * Description
   Description is currently not available.

 * Cookie
   __Host-psifi.analyticsTrace
 * Duration
   6 hours
 * Description
   Description is currently not available.

 * Cookie
   __Host-psifi.analyticsTraceV2
 * Duration
   6 hours
 * Description
   Description is currently not available.

Reject All Save My Preferences Accept All
Powered by
Webinars weekly on different cyber security themes
Webinars weekly - sign up >>
- Register >>
How it works

CYBERDAY CONCEPT



How it works?
Summary of building your management system in Cyberday

Frameworks
Browse our growing library of security frameworks

Security tasks and assurance
Decide what needs goind and ensure it gets done

MUUT SISÄLLÖT



Documentation workflows
Use our templates to efficiently document assets or plans

Employee guidelines
Delegate rules for acceptance to employees

Policy and procedure templates
Gather documents from other content when necessary

RELATED LINKS



Book a meeting
Our team of experts is happy to assist you

Help center
Cyberday FAQ

Development
Recent improvements in Cyberday
Use cases

BY METHOD



Cyber risk management
Find the most critical areas for improvement

Employee awareness
Automate employee guidance and training

Compliance reporting
Show credible reports of how you comply

LAAJENNUKSET



Control management
Decide what needs doing and ensure things get done

Asset management
Gather information of assets efficiently and set owners

Dynamic policy and procedure documents
Create dynamic repot documents when needed
NEW
Tulossa pian

BY FRAMEWORK



ISO 27001
Leading international information security standard

NIS2 directive
EU-wide cyber security law for important industries

NIST CSF
Designed to help cyber risk mgmt for critical infrastructure
ISO 27701
GDPR
ISO 27018
ISO 27017
See all frameworks
Resources

GET STARTED



Webinars
Sign up and join us live or via recording

Blog
Recent writings from our team

Customers
See how others have benefited

GET HELP



Academy
Succeed with Cyberday with the help of our resource center.

Book a meeting
Our team of experts is happy to assist you

Development
Log of recent improvements in Cyberday

WORK WITH US



Partner program
Let's collaborate to improve security and create new revenue for you!
BECOME A PARTNER
Subscribe for newsletter
Get a weekly digest of cybersec content
Thanks! See in your inbox on Fridays. :)
Unfortunately something went wrong. Contact us at team@cyberday.ai.
AcademyPricing
Free trial
Book a meeting
Login




IMPROVE AND CERTIFY CYBER SECURITY

Cyberday splits chosen frameworks (e.g. ISO 27001, NIS2, DORA, ISO 27701) down
to prioritized security tasks and guides you in implementing them directly
inside Microsoft Teams.


Try free in MS Teams
Book a demo

500+ ORGANIZATIONS CERTIFY OR IMPROVE SECURITY WITH CYBERDAY





VAATIMUSKEHIKOT

VAATIMUS-KEHIKOT

Valitse ensin, minkä vaatimusten mukaisesti haluatte toimia.

Mikä ohjaa työtämme?

ISO27001
ISO27
GDPR
Lisää

TEHTÄVÄT

Vaatimukset täyttyvät jalkauttamalla digiturvatehtäviä.

Mitä kukin tekee digiturvan eteen?

OHJEISTUKSET

Osa tehtävistä vaatii asioiden ohjeistamista henkilöstölle.

Mitä pitää muistaa arjessa?

DOKUMENTAATIO

Osa tehtävistä vaatii listausten pitoa tietoturvan ydinelementeistä.

Mistä pitää voida raportoida?


MOST POPULAR FRAMEWORKS

In Cyberday you can pick the most important cyber security frameworks as targets
for your work. From these, a single list of security tasks is formed to your
management system. Read more from solution pages.

ISO 27001
2022 & 2013 versions
NIST CSF
GDPR
ISO 27701
CSA CCM
ISO 27017
ISO 27018


HOW SECURITY WORKS IN CYBERDAY‍

Get a clear plan on how to improve and get compliant in the process

See a detailed version
1


CHOOSE YOUR FRAMEWORKS

Configure your security work by choosing your most relevant entities from
framework library.
ISO 27001
GDPR
NIST
CSA CCM
Laws
ISO 27701
ISO 27017
ISO 27018


WE CREATE YOUR POLICIES AUTOMATICALLY

Cyberday's Content AI creates the necessary policies that get you compliant with
selected frameworks.
587 tasks in content library
Tasks mapped to 16 frameworks and 249 risks
2


IMPLEMENT POLICIES THROUGH SMART TASKS

Policies are monitored through task owners and logs. Tasks are implemented using
support tools and content in Cyberday.´
Asset management tools
Risk management tools
Employee awareness tools
Link your security technology
Write process descriptions
3


AUTOMATED CYBER SECURITY REPORTING

With report library's dynamic templates, you can create the desired summaries of
cyber security with "one click".
Compliance reports
PDF-snapshots of policies
Procedure documents
Descriptions required by law
Custom reports
CONFIGURE
GET A UNIFIED PLAN
DELEGATE FOR IMPLEMENTATION
GATHER ASSURANCE





YOUR INFORMATION SECURITY LEADERSHIP DASHBOARD

To see a detailed presentation of a theme that interests you, check out our
weekly webinars.

Show upcoming webinars
Monitor your compliance
Control management and assurance
Unified plan, multi-framework compliance
Employee awareness on auto-pilot
Efficient asset management
Automated compliance reporting


UNDERSTAND WHAT'S HAPPENING AROUND YOUR INFORMATION SECURITY

Dashboard lists the active frameworks that configure for the organization's
management system, a summary of the contents of the management system by theme,
and other status information. In connection with each theme, the state of the
tasks inside each theme is displayed and who is primarily responsible for their
implementation.


UNDERSTAND WHAT TO DO AND HOW, TO MEET THE REQUIREMENTS

Work in the Cyberday is guided through security tasks. Tasks tell you what kind
of work is required of the organization and how this requirement could be met.
Each user sees the actions assigned for them in their personal Taskbook-view.


SET THE BAR TO A LEVEL THAT SUITS YOU

By selecting the most relevant requirement frameworks to guide digital security
work from the perspective of their own operations, the organization is able to
focus its efforts on digital security on important issues. Often, the same
security task is associated with many requirements, so the compliance improves
for many frameworks and double work is eliminated.


TRAIN AND INSTRUCT STAFF AUTOMATICALLY

Guidebook-tab is the end user's view of Cyberday. Admins define the guidelines,
and staff are required to confirm the guidelines as read and accepted. They can
also assist in improving the guidelines by commenting. Reminders are sent
automatically by Cyberday's Teams bot and the process can be extended to include
training content and skill tests.


GATHER THE NECESSARY INFORMATION EFFICIENTLY

Identified risks, data systems, processors of personal data ... Digital security
work requires a systematic record of many things, either for reporting or to
guide one's own work. Collect data in a smart format using ready-made data
templates, examples and instructions. Each user sees the documentation items
assigned for them in their personal Taskbook-view.


GENERATE THE DESIRED SUMMARY WITH ONE CLICK

A policy, a description required by law, or a report about the organization's
information security operating models in general. To own management, external
authority or auditor. You can find ready-made report templates for all kinds of
reporting needs in Cyberday's report library, through which organization's own,
ready-made reports are created directly with one click.





RECENT CONTENT FROM OUR TEAM

Every week we inform you about the most important cyber security news, upcoming
free webinars and recent Cyberday development.

Show all blog content
webinar

Wednesday

30

.

5

.

@

14:00

ADMIN TRAINING (PART 3/5): RISK MANAGEMENT AND SECURITY CONTROL IMPLEMENTATION

Register now
news
news

29.11.2024

at 

ANOTHER 'MAJOR CYBER INCIDENT' AT A UK HOSPITAL, OUTPATIENTS ASKED TO STAY AWAY

Read full news
blog

29.11.2024

CYBERDAY GOES CYBER SECURITY NORDIC 2024!

Open article


HOW CYBERDAY WORKS

Select your goals to get pre-filled policies. Implement -> Gather assurance ->
Report -> Improve.

STEP 1


SELECT YOUR GOALS. WE FILL YOUR SECURITY PLAN WITH CONTENT.

Set your goals by activating your most relevant frameworks from our library.
Requirements are instantly turned into policies you can start implementing.

ISO 27001
NIS2
NIST CSF
ISO 27017
GDPR
ISO 27701
ISO 27018
Cyber Essentials
...


STEP 2


EVALUATE YOUR CURRENT COVERAGE OF POLICIES.

Choose the first theme and start evaluating how your current measures cover
requirements. You’ll quickly see your starting compliance and understand the
gap.

Technical cyber security
Privacy
Personnel security
Risk management and leadership
Development and cloud

STEP 3


CREATE ASSURANCE TO GIVE CONFIDENCE FOR YOUR EVALUATIONS.

Tasks are proven to be implemented (for auditors, top management or your own
team) through assurance information. Assurance info differs according to task’s
type.

Technological tasks
Link security systems
Organizational tasks
Fill documentation or link reports
People tasks
Distribute guidelines
Supporting tasks
Write process descriptions



STEP 4


USE AUTOMATED REPORTS TO COMMUNICATE YOUR CYBER SECURITY

With report library's dynamic templates, you can create the desired summaries of
cyber security with "one click".

Compliance reports
Security statements
Policy snapshots (PDF)
Procedure documents
Legal descriptions
Embeddable reports


STEP 5


IMPROVE THROUGH RISK MANAGEMENT AND OTHER ADVANCED FEATURES

Once you have a clear plan, you can start improving it smartly. You can utilize
our tools for risk management, internal auditing and improvement management to
get better every day. Our Cyberday AI will also help you spot most urgent
improvements.

Risk management
Internal audits
Incident management
Continuous improvement


CHANGING REQUIREMENTS, SAME SINGLE PLAN

Same plan
ISO 27001
NIS2
NIST CSF
SOC 2
GDPR
Cyber Essentials



UNIVERSAL CYBER COMPLIANCE LANGUAGE MODEL: COMPLY WITH CONFIDENCE AND LEAST
EFFORT

In Cyberday, all frameworks’ requirements are mapped into universal tasks, so
you achieve multi-framework compliance effortlessly.

Security frameworks tend to share the common core. All frameworks cover basic
topics like risk management, backup, malware, personnel awareness or access
management in their respective sections.
Cyberday’s universal cyber security language technology creates you a single
security plan and ensures you implement the common parts of frameworks just
once. You focus on implementing your plan, we automate the compliance part - for
current and upcoming frameworks.
Start your free trial



ENDLESS METHODS TO IMPROVE YOUR SECURITY

PERSONNEL CYBER SECURITY AWARENESS

CONTROL MONITORING

SECURITY RISK MANAGEMENT

ASSET MANAGEMENT

COMPLIANCE PROOF

SMART REPORTING

SEE ALL SUPPORTED FRAMEWORKS

Learn more from Academy


JOIN A GLOBAL CYBER SECURITY MOVEMENT

Hundreds of companies all over the world use Cyberday to manage their
information security.


Certifications
Critical industries
Software / MSP companies
Public administration
The integration within the Teams app is great and ease of implementing it into
the organization via app we all already use was great.

The task based implementation made it simple to build upon and get everything
completed within the time limit allowed for implementation.

JAY B.

Network Security Specialist

Cyberday is well integrated with our daily tools. This was one of our main
criteria when selecting a ISMS.

With Teams and Slack integration we are able to reach our employees on the
platform they use in their day to day activity.

KIM B.

Head of Cyber Security
We are following the ISO 27001, Cyberday provides great tools to achieve all of
the requirements.

NIKO R.

Application Specialist



1
2

We liked especially the easy of use, easy to get started, good for SME companies
with limited resources.

It's a nice fit for our needs at the moment.

JANNE P.

Director, Quality & Processes and Research

Cyberday's advantages were a cheaper price, comprehensive scope, ease of use and
an unlimited number of users.

It also works as part of Microsoft Teams, which will make it easier to deploy
the system.

TOMMI S.

ICT Development Manager





STAY UP-TO-DATE ON CYBER SECURITY


SUBSCRIBE FOR OUR FREE, WEEKLY NEWSLETTER


Get a weekly digest with most important cybersec news, new Academy content and
next week's free webinars.



Kiitos! Saat vielä vahvistuksen sähköpostiisi.
Valitettavasti tietojasi ei voitu lähettää eteenpäin.

* YOUR EMAIL WON'T BE SOLD NOR DISCLOSED FORWARD. CONFIRMATION HAS MORE INFO.
LEARN MORE




GET STARTED TODAY

Start free, in your familiar Teams environment.
If you have some questions first, book a meeting with us.

Start free 14-day trial
Book a meeting

PYSY KÄRRYILLÄ DIGITURVASTA


TILAA DIGITURVAUUTISET SÄHKÖPOSTIISI


Tiimimme seuraa jatkuvasti kymmeniä uutislähteitä maailmalta ja toimittaa
tärkeimmät digiturvauutiset sähköpostiisi viikottain.


Kiitos! Saat vielä vahvistuksen sähköpostiisi.
Valitettavasti tietojasi ei voitu lähettää eteenpäin.

* OSOITETTA EI MYYDÄ TAI LUOVUTETA ETEENPÄIN. VAHVISTUSVIESTISSÄ LISÄTIETOJA.
LUE LISÄÄ


HomePricingTeamSecurityCustomersBook a meetingBook a demoLogin

HOW IT WORKS?

SummarySecurity tasks and assuranceDocumentation workflowsEmployee
guidelinesReporting templates

USE CASES

By frameworkAll frameworksISO 27001NIS2 directiveNIST CSFCSA CCMISO
27701GDPRISO 27017ISO 27018
By methodCyber risk managementEmployee awarenessCompliance reportingControl
managementAsset managementDynamic policy documentsPrivacy management

RESOURCES

AcademyWebinarsBlogLeave a reviewPartner programTeamTerms of usePrivacy policy

CONTACT US

+358 10 231 6010
team@cyberday.ai


App works in:
Known in Finland as Digiturvamalli
© Cyberday Inc. Kalevantie 2 33100 Tampere, Finland
Cyberday.ai - Improve and certify your cyber security
English
 * Deutsch
 * Svenska
 * Français
 * Nederlands
 * Dansk