Skip to content
[email protected]
About us
Close About us
Open About us
About us
Partners
Careers
Investors
How can we help
Close How can we help
Open How can we help
NIS2 Compliance
DORA Compliance
Security Level Assessments
Increased cyber protection
Solutions
GAP Assessment
Compliance audit
Penetration testing
Compliance support and consultancy
Incident Response
Awareness Training and Assessment
Security Operations Center
GAP Assesment
Compliance Audit
Penetration testing
Compliance support and consultancy
Incident Response
Awareness Training and Assessment
Security Operations Center
Third Party Supplier Assessment
Network Infrastructure Evaluation
Digital operational resilience testing
ICT Business Continuity Planning
Recovery Planning and Disaster Recovery
Regulatory Reporting Preparation
GAP Assesment
Compliance audit
Penetration Testing
Security Assessment
Merger and Acquisition (M&A) Cybersecurity Audits
Penetration Testing
Standards implementation (ISO, SOC2, etc)
IT Governance Consultancy
Risk Assessment and Management
DevSecOps
CISO as a Service
Merger and Acquisition (M&A) Cybersecurity Audits
SOC & Incident Response
Beyond Trust
Knowbe4
KELA
Cynet
Fortinet
F5
Our work
News
Close News
Open News
News
Regulations
Past Events
NIS2 vs. GDPR: Understanding the Key Differences and What They Mean for Your Business
Understanding NIS2 Compliance: A Clear Guide for Romanian Businesses
Understanding a Security Operations Center (SOC): what it is and when you need it
Regulations and Directives
The Business Show Asia
London Tech Week
Bucharest Stock Exchange
Contact
Are you under attack?
Search
Search
Quick Links
›
How we can help
›
Financial report
›
News
›
Contact
About us
Close About us
Open About us
About us
Partners
Careers
Investors
How can we help
Close How can we help
Open How can we help
NIS2 Compliance
DORA Compliance
Security Level Assessments
Increased cyber protection
Solutions
GAP Assessment
Compliance audit
Penetration testing
Compliance support and consultancy
Incident Response
Awareness Training and Assessment
Security Operations Center
GAP Assesment
Compliance Audit
Penetration testing
Compliance support and consultancy
Incident Response
Awareness Training and Assessment
Security Operations Center
Third Party Supplier Assessment
Network Infrastructure Evaluation
Digital operational resilience testing
ICT Business Continuity Planning
Recovery Planning and Disaster Recovery
Regulatory Reporting Preparation
GAP Assesment
Compliance audit
Penetration Testing
Security Assessment
Merger and Acquisition (M&A) Cybersecurity Audits
Standards implementation (ISO, SOC2, etc)
IT Governance Consultancy
Risk Assessment and Management
Penetration Testing
CISO as a Service
DevSecOps
Merger and Acquisition (M&A) Cybersecurity Audits
SOC & Incident Response
Beyond Trust
Knowbe4
KELA
Cynet
Fortinet
F5
Our work
News
Close News
Open News
News
Regulations
Past Events
NIS2 vs. GDPR: Understanding the Key Differences and What They Mean for Your Business
Understanding NIS2 Compliance: A Clear Guide for Romanian Businesses
Understanding a Security Operations Center (SOC): what it is and when you need it
Thistle Initiatives and Fort Cyber partner to accelerate cybersecurity and compliance for Financial Services clients
What is WAF (web application firewall) and should you use it?
Can XDR replace your current antivirus, and why should you consider making the switch?
Regulations and Directives
The Business Show Asia
London Tech Week
Bucharest Stock Exchange
Pay360 London
Marsh Cyber Risks Update 2024
RoFintech event series launch
Contact
Are you under attack?