Skip to content
[email protected]
  • About us
    • About us
    • Partners
    • Careers
  • Investors
  • How can we help
    NIS2 Compliance DORA Compliance Security Level Assessments Increased cyber protection Solutions
    • GAP Assessment
    • Compliance audit
    • Penetration testing
    • Compliance support and consultancy
    • Incident Response
    • Awareness Training and Assessment
    • Security Operations Center
    • GAP Assesment
    • Compliance Audit
    • Penetration testing
    • Compliance support and consultancy
    • Incident Response
    • Awareness Training and Assessment
    • Security Operations Center
    • Third Party Supplier Assessment
    • Network Infrastructure Evaluation
    • Digital operational resilience testing
    • ICT Business Continuity Planning
    • Recovery Planning and Disaster Recovery
    • Regulatory Reporting Preparation
    • GAP Assesment
    • Compliance audit
    • Penetration Testing​
    • Security Assessment
    • Merger and Acquisition (M&A) Cybersecurity Audits
    • Penetration Testing
    • Standards implementation (ISO, SOC2, etc)
    • IT Governance Consultancy
    • Risk Assessment and Management
    • DevSecOps
    • CISO as a Service
    • Merger and Acquisition (M&A) Cybersecurity Audits
    • SOC & Incident Response
    • Beyond Trust
    • Knowbe4
    • KELA
    • Cynet
    • Fortinet
    • F5
  • Our work
  • News

    NIS2 vs. GDPR: Understanding the Key Differences and What They Mean for Your Business

    Understanding NIS2 Compliance: A Clear Guide for Romanian Businesses

    Understanding a Security Operations Center (SOC): what it is and when you need it

    Regulations and Directives

    The Business Show Asia

    London Tech Week

    Bucharest Stock Exchange

Contact
Are you under attack?

Subscribe to our newsletter

Get the latest cybersecurity updates, business and finance updates from FORT.

  • Str. Calea Serban Voda, Nr. 109-111, Sector 4
  • [email protected]
Services
  • NIS2 Compliance
  • DORA Compliance
  • Security level assesments
  • Incresed cyber protection
  • Solutions
  • Partner with us
About us
  • Partners
  • Careers
  • Contact
Investors
  • Financial report
News
  • Blog
  • Regulations
  • Past events
Our work
  • Case studies
  • Str. Calea Serban Voda, Nr. 109-111, Sector 4
  • [email protected]
  • 2025 © FORT. All rights reserved
  • Privacy Policy
  • Terms & Conditions
  • Cookies Policy

Quick Links

›How we can help ›Financial report ›News ›Contact
  • About us
    • About us
    • Partners
    • Careers
  • Investors
  • How can we help
    • GAP Assessment
    • Compliance audit
    • Penetration testing
    • Compliance support and consultancy
    • Incident Response
    • Awareness Training and Assessment
    • Security Operations Center
    • GAP Assesment
    • Compliance Audit
    • Penetration testing
    • Compliance support and consultancy
    • Incident Response
    • Awareness Training and Assessment
    • Security Operations Center
    • Third Party Supplier Assessment
    • Network Infrastructure Evaluation
    • Digital operational resilience testing
    • ICT Business Continuity Planning
    • Recovery Planning and Disaster Recovery
    • Regulatory Reporting Preparation
    • GAP Assesment
    • Compliance audit
    • Penetration Testing​
    • Security Assessment
    • Merger and Acquisition (M&A) Cybersecurity Audits
    • Standards implementation (ISO, SOC2, etc)
    • IT Governance Consultancy
    • Risk Assessment and Management
    • Penetration Testing
    • CISO as a Service
    • DevSecOps
    • Merger and Acquisition (M&A) Cybersecurity Audits
    • SOC & Incident Response
    • Beyond Trust
    • Knowbe4
    • KELA
    • Cynet
    • Fortinet
    • F5
  • Our work
  • News

    NIS2 vs. GDPR: Understanding the Key Differences and What They Mean for Your Business

    Understanding NIS2 Compliance: A Clear Guide for Romanian Businesses

    Understanding a Security Operations Center (SOC): what it is and when you need it

    Thistle Initiatives and Fort Cyber partner to accelerate cybersecurity and compliance for Financial Services clients

    What is WAF (web application firewall) and should you use it?

    Can XDR replace your current antivirus, and why should you consider making the switch?

    Regulations and Directives

    The Business Show Asia

    London Tech Week

    Bucharest Stock Exchange

    Pay360 London

    Marsh Cyber Risks Update 2024

    RoFintech event series launch

Contact
Are you under attack?