Certifications
ISO 22301, ISO 27001, NEN 7510, ISO 27701, CISO or ISO as a Service
Choose a resilient organization that meets the highest standards in:
Information security (ISO 27001), Privacy protection (ISO 27701), Business continuity (ISO 22301), Healthcare information security (NEN 7510), With Fortrisk’s expert guidance, you'll smoothly navigate the entire certification process—from risk analysis and implementation to audit.
Boost your resilience, reduce risks, and strengthen client trust.
Structured protection of sensitive information
ISO 27001 offers a structured approach to managing and protecting sensitive data. Companies identify and control risks, reduce the likelihood of data breaches and cyberattacks, and demonstrate their commitment to security—resulting in increased client trust and competitive advantage.
Alternative or complement:
NEN 7510 can be chosen as an alternative or addition for the healthcare sector.
-
Independent
Take full control and work independently toward ISO 27001 certification using our comprehensive templates, step-by-step plans, sample documents, and practical tools.
-
Guided Support
Prefer expert assistance? We guide you through each phase—from risk analysis and policy development to implementation and audit success.
-
Fully Outsourced
No time to manage it yourself? Let Fortrisk handle the entire process for you—from analysis to implementation and audit preparation—so you can focus on your core business.
-
ISO 27701
Privacy Information Management
Expand your ISO 27001 implementation with ISO 27701, the standard for Privacy Information Management Systems (PIMS). This addition demonstrates GDPR compliance and builds on your existing ISMS. -
ISO 22301
Business Continuity
Already working with ISO 27001? Integrate ISO 22301 to ensure operational continuity after incidents. Where ISO 27001 manages risk, ISO 22301 ensures your organization keeps running.
Compliance After Certification
Stay compliant and maintain information and privacy security with ongoing expertise. Fortrisk offers:
External CISO, ISO or FG (Data Protection Officer), Privacy Officer services
All tailored to your organization's needs—ensuring continuous compliance and protection.
What will we do?
With this structured five-step plan, we identify risks, raise employee awareness, and build a strong security culture. From realistic phishing simulations to targeted training and follow-up campaigns — you’ll gain clear insights and practical improvement actions that truly work.
-
Step 1: Setup & phishing test preparation
Intake session: who and how will we test?
Create recipient list
Draft and prepare realistic phishing email
-
Step 2: Execute phishing test
Send phishing email
Monitor behavior: who clicks, who reports?
Analyze risks and user response
-
Step 3: Reporting & tailored trainin
Clear report of test results
Practical training (online or in-person)
Real-life examples, clear explanations, and exercises
-
Step 4: Distribute awareness messages
Timely phishing and cybersecurity updates
Delivered via email, intranet, or newsletter
Reinforcement through repetition
-
Step 5: Retest & final report
Follow-up phishing test ± 3 months later
Compare results
Final report with trends and recommendations
Training & Awareness
Practical and to the point
At Fortrisk, we believe in clarity. No long reports collecting dust, but practical advice and solutions you can apply immediately. We help you take real steps in information security—without complexity or theoretical detours.
Our approach is pragmatic, focused, and adapted to your organization’s reality. We don’t waste time on side issues, but target what truly matters: reducing risks, ensuring compliance, and building trust with clients, partners, and regulators.
Tailored to Your Organization
As experts in risk management, information security, and compliance, we support organizations across sectors—from healthcare institutions to SMEs. Our services include:Risk analyses, Awareness programs, Incident response
Supplier assessments, Business continuity planning.
We can also serve as your external Information Security Advisor or Data Protection Officer (DPO), ensuring ongoing legal compliance.
Get in Touch
Want to know if your organization is ready for certification? Need a baseline assessment, internal audit, or support drafting policies and procedures?
Get in touch for a free introductory meeting. We’ll work with you to design an approach that fits your organization, your risks, and your ambitions.
You can reach us via the contact form, email, or phone. We’ll respond within one business day.
Contact form
Do you have questions or want to know more about our services? Use the form below: