KAM Certifications is now
Fendix
Services
Services
Implementation
GAP analysis
New
Accompanying implementation process
New
Unburdening implementation process
New
ISO templates
New
Maintain and improve
NIS2 Executive Training
New
AVG scan
New
Maintenance packages
New
Internal audit
New
Security awareness
Guardey Gamified Security Awareness
New
Cybersecurity Awareness Escape Room
New
(Spear) Phishing simulations
New
Cybersecurity week
New
Specialty as a service
Privacy Officer
New
Security Officer
New
Data Protection Officer (FG)
New
Standards
Standards
Information security & privacy
ISO 27001
NEN 7510
NIS2
DORA
View more
AI
ISO 42001
AI Act
Quality
ISO 9001
ISO 22301
Services
Standards
About us
Working at
3
News & insights
Contact
NL
EN
menu
News & insights
filter
View all
news
whitepaper
Quality Management
information security
work at
customer case
Information Security
Alles wat je moet weten over bewaartermijnen: een compleet overzicht
read more
Information Security
Wat is MiCA en waarom is het noodzakelijk voor crypto-uitgevers, -platforms en financiële instellingen?
read more
Information Security
Wat is GRC?
read more
News
Why an AVG scan is important for your organization
read more
Information Security
Security Awareness in de zorg is enorm belangrijk én verplicht vanuit de NEN 7510
read more
News
Zelf phishing campagnes opzetten was nog nooit zo makkelijk met Guardey!
read more
Information Security
Hoe bereid je jouw organisatie voor op de NIS2-Richtlijn? Alles over NIS2 compliance en awareness
read more
Information Security
The updated NEN 7510: what healthcare institutions need to know
read more
Information Security
Jouw eigen security awareness content maken? Maak kennis met de custom content module van Guardey!
read more
Customer case
Customer case study: cybersecurity week at GOOSE VPN
read more
Information Security
The 10 biggest challenges in an ISO 27001 implementation
read more
Information Security
What should I do if I click on a phishing link?
read more
Information Security
Differences between ISO 27001 and ISO 27002
read more
Information Security
Make your organization cyber-secure with Cybersecurity Week
read more
Customer case
Success Story: How Total Energies Charging Solutions Netherlands achieved more than a certificate with ISO 27001 implementation
read more
Whitepaper
Create behavior change and increase security awareness
read more
Information Security
How do you protect your organization from spear phishing?
read more
Information Security
What is phishing and how do you recognize it?
read more
News
Play the Cybersecurity Awareness Escape Room at your location now
read more
Information Security
NIS2: Mandatory training for management and directors.
read more
Information Security
Boost your ISO 27001 implementation with our ready-to-use templates
read more
Customer case
Why A-VISION chooses a Data Protection Officer from Fendix
read more
Information Security
What you need to know about the Digital Operational Resilience Act (DORA)
read more
Information Security
What is security awareness and why is it essential for your organization?
read more
Information Security
Carefree to 2027: The Information Security and Privacy Standards Framework for Undergraduate Education Explained
read more
Information Security
How to implement the ISO 27001 standard: a step-by-step guide
read more
Customer case
A smart move: NowOnline's choice of an interim Security Officer from Fendix
read more
Information Security
How do I conduct a risk analysis? - With example
read more
Working at
A month on the road with Jelle, Information Security Consultant at Fendix
read more
Customer case
Customer case: SPL | As a start-up to an ISO 27001 and NEN 7510 certificate in 6 months
read more
News
Fendix offers everything you need for Security Awareness with Guardey
read more
Information Security
All you need to know about the European AI Act: Entry into force, Risks and Obligations
read more
Information Security
Is Chat-GPT a risk for your organization? With 3 immediately applicable tips!
read more
News
What is responsible AI? Is ISO/IEC 42001 the solution?
read more
Whitepaper
The right software for your ISO management system
read more
Whitepaper
What is ISO 27001? - Get your free ISO 27001 guide
read more
Whitepaper
What does our implementation process look like?
read more
News
KAM Certifications is now Fendix Consultants
read more
Information Security
What is NIS2?
read more
Information Security
NEN 7510 the standard for information security in healthcare
read more
Information Security
What is the BIO?
read more
Information Security
What does an ISO 27001 Certification cost?
read more
Information Security
What are the duties of a Data Protection Officer?
read more
Information Security
What does a Privacy Officer do?
read more
Whitepaper
7 criteria for choosing the right ISO implementation partner
read more
Information Security
Allowlisting? What is it? And why is it important?
read more
Information Security
Do the advantages of a VPN outweigh the disadvantages?
read more
Information Security
Data destruction, why is it so important?
read more
Working at
Mathijs on his first year at Fendix
read more
News
Wat is een Certificerende Instelling? - Partnerships met Certificerende Instellingen (CI)
read more
Information Security
What is the role of a Security Officer?
read more
Working at
Jelle on his first weeks of work
read more
News
What does the external audit process look like?
read more
Information Security
Risk analysis within the ISO standards
read more
News
Maintaining your ISO certification. This includes.
read more
Working at
Kilian speaking on Fendix culture
read more
Working at
Working at Fendix, how does it work? Storm tells
read more
Working at
Ruben on the freedom and own projects within Fendix
read more
Working at
Wouter on culture and personal development
read more
Working at
A working day at Fendix, what's it like? Jelle tells:
read more
Information Security
What does the change to the ISO 27001 standard mean for my organization?
read more
News
An ISO 9001 or ISO 27001 certificate, what are the benefits?
read more
Quality Management
What is the role of a KAM Coordinator?
read more
News
What does executive evaluation look like?
read more
Information Security
Increase Awareness? An explanation of awareness in ISO 27001 information security.
read more
News
What is a management system?
read more
News
What is an internal audit?
read more
Information Security
What is the importance of information security?
read more
News
What does an ISO track look like?
read more
Information Security
The updated NEN 7510: what healthcare institutions need to know
read more
Information Security
NIS2: Mandatory training for management and directors.
read more
News
Fendix offers everything you need for Security Awareness with Guardey
read more
News
What is responsible AI? Is ISO/IEC 42001 the solution?
read more
News
KAM Certifications is now Fendix Consultants
read more
News
Wat is een Certificerende Instelling? - Partnerships met Certificerende Instellingen (CI)
read more
News
What does the external audit process look like?
read more
News
Maintaining your ISO certification. This includes.
read more
News
An ISO 9001 or ISO 27001 certificate, what are the benefits?
read more
News
What does executive evaluation look like?
read more
News
What is a management system?
read more
News
What is an internal audit?
read more
News
What does an ISO track look like?
read more
Whitepaper
Create behavior change and increase security awareness
read more
Whitepaper
The right software for your ISO management system
read more
Whitepaper
What is ISO 27001? - Get your free ISO 27001 guide
read more
Whitepaper
What does our implementation process look like?
read more
Whitepaper
7 criteria for choosing the right ISO implementation partner
read more
Information Security
How do I conduct a risk analysis? - With example
read more
Whitepaper
The right software for your ISO management system
read more
Whitepaper
What is ISO 27001? - Get your free ISO 27001 guide
read more
Whitepaper
What does our implementation process look like?
read more
Whitepaper
7 criteria for choosing the right ISO implementation partner
read more
Quality Management
What is the role of a KAM Coordinator?
read more
News
Why an AVG scan is important for your organization
read more
Customer case
Customer case study: cybersecurity week at GOOSE VPN
read more
Customer case
Success Story: How Total Energies Charging Solutions Netherlands achieved more than a certificate with ISO 27001 implementation
read more
News
Play the Cybersecurity Awareness Escape Room at your location now
read more
Information Security
Boost your ISO 27001 implementation with our ready-to-use templates
read more
Customer case
Why A-VISION chooses a Data Protection Officer from Fendix
read more
Information Security
What you need to know about the Digital Operational Resilience Act (DORA)
read more
Information Security
Carefree to 2027: The Information Security and Privacy Standards Framework for Undergraduate Education Explained
read more
Customer case
A smart move: NowOnline's choice of an interim Security Officer from Fendix
read more
Information Security
How do I conduct a risk analysis? - With example
read more
Working at
A month on the road with Jelle, Information Security Consultant at Fendix
read more
Customer case
Customer case: SPL | As a start-up to an ISO 27001 and NEN 7510 certificate in 6 months
read more
News
Fendix offers everything you need for Security Awareness with Guardey
read more
Information Security
All you need to know about the European AI Act: Entry into force, Risks and Obligations
read more
Information Security
Is Chat-GPT a risk for your organization? With 3 immediately applicable tips!
read more
Whitepaper
The right software for your ISO management system
read more
Whitepaper
What does our implementation process look like?
read more
Information Security
What is NIS2?
read more
Information Security
NEN 7510 the standard for information security in healthcare
read more
Information Security
What is the BIO?
read more
Information Security
What does an ISO 27001 Certification cost?
read more
Information Security
What are the duties of a Data Protection Officer?
read more
Information Security
What does a Privacy Officer do?
read more
Whitepaper
7 criteria for choosing the right ISO implementation partner
read more
Information Security
Allowlisting? What is it? And why is it important?
read more
Information Security
Do the advantages of a VPN outweigh the disadvantages?
read more
Information Security
Data destruction, why is it so important?
read more
Information Security
What is the role of a Security Officer?
read more
Information Security
Risk analysis within the ISO standards
read more
Information Security
What does the change to the ISO 27001 standard mean for my organization?
read more
Information Security
Increase Awareness? An explanation of awareness in ISO 27001 information security.
read more
Information Security
What is the importance of information security?
read more
Working at
Mathijs on his first year at Fendix
read more
Working at
Jelle on his first weeks of work
read more
Working at
Kilian speaking on Fendix culture
read more
Working at
Working at Fendix, how does it work? Storm tells
read more
Working at
Ruben on the freedom and own projects within Fendix
read more
Working at
Wouter on culture and personal development
read more
Working at
A working day at Fendix, what's it like? Jelle tells:
read more
Customer case
Customer case study: cybersecurity week at GOOSE VPN
read more
Customer case
Success Story: How Total Energies Charging Solutions Netherlands achieved more than a certificate with ISO 27001 implementation
read more
Customer case
Why A-VISION chooses a Data Protection Officer from Fendix
read more
Customer case
A smart move: NowOnline's choice of an interim Security Officer from Fendix
read more
Customer case
Customer case: SPL | As a start-up to an ISO 27001 and NEN 7510 certificate in 6 months
read more
We are a partner of