Financial Services Sector

ISO 26000 – Social Responsibility Assessment

Overview
ISO 26000 is the internationally recognized guidance on social responsibility. It helps organizations of all sizes integrate ethical, transparent, and sustainable practices into their operations—covering areas such as human rights, labor practices, environmental stewardship, fair operating practices, consumer issues, and community involvement.

Who It’s For

  • Organizations aiming to embed CSR and ESG into their strategy

  • Companies seeking stronger social-responsibility credentials for investors and stakeholders

  • NGOs, public bodies, and businesses wanting to improve corporate citizenship

Why a Social Responsibility Assessment Matters

  • Boost Reputation: Show your stakeholders you take ethics and sustainability seriously

  • Mitigate Risks: Identify gaps in labor, environmental, and community practices before they become liabilities

  • Win Business: Differentiate in tenders and RFPs by evidencing robust CSR practices

  • Drive Improvement: Build a clear roadmap based on a third-party-validated gap analysis

Scope of Our Remote Assessment

  1. Gap Analysis
    – Compare your policies and practices against ISO 26000 principles

  2. Stakeholder Mapping
    – Identify and engage key groups (employees, suppliers, communities)

  3. Document & Data Review
    – Audit codes of conduct, sustainability reports, environmental data, grievance mechanisms

  4. Virtual Interviews & Workshops
    – Conduct remote sessions with leadership and operational teams

  5. Recommendations & Roadmap
    – Deliver a prioritized action plan aligned to ISO 26000 guidance

Our 6-Step Remote Audit Process

  1. Kick-off & Scoping Call: Define objectives, scope, and remote-audit logistics

  2. Document Collection: Secure file transfer of your CSR policies, reports, and data

  3. Virtual Interviews: Live video sessions with your team to validate implementation

  4. Preliminary Findings Workshop: Share initial gaps and confirm with stakeholders

  5. Final Report & Certificate: Issue a Conformity Assessment Certificate and detailed gap matrix

  6. Follow-up Support: Optional remote workshops to help you start on improvements

Deliverables

  • Conformity Assessment Certificate confirming alignment with ISO 26000 guidance

  • Comprehensive Gap Analysis Report with executive summary

  • Tailored Improvement Roadmap with responsibilities and timelines

  • Presentation Deck for your board or steering committee

Why Company Certification Int.?

  • Remote-First Expertise: Proven track record delivering thorough assessments entirely online

  • 15+ Years’ Experience: Across manufacturing, healthcare, retail, NGOs, and public sector

  • Actionable Insights: We don’t just flag issues—we help you fix them with clear, practical advice

  • Global Reach: Consultants versed in regional regulations and cultural contexts

Ready to demonstrate your commitment to social responsibility?

ISO/IEC TR 38502 – IT Governance Framework Conformity Assessment

Overview

ISO/IEC TR 38502 provides guidance on the governance of IT within organizations. Our assessment helps:

  • Evaluate your IT governance framework against international standards

  • Identify gaps in IT decision-making and oversight structures

  • Align IT strategy with business objectives

  • Improve value delivery from IT investments

Who It's For

  • Corporate boards and executive teams

  • CIOs and IT leadership teams

  • Organizations undergoing digital transformation

  • Companies preparing for COBIT or ISO 38500 implementation

  • Regulated industries with strict IT governance requirements

Why an IT Governance Assessment Matters

  • Strategic Alignment: Ensure IT supports business goals

  • Risk Management: Identify governance-related IT risks

  • Value Optimization: Maximize return on IT investments

  • Stakeholder Confidence: Demonstrate effective IT oversight

Scope of Our Assessment

  • Governance Framework: Structure and processes

  • Strategic Alignment: IT-business integration

  • Value Delivery: IT investment performance

  • Risk Management: IT risk oversight

  • Resource Optimization: People, processes and technology

  • Performance Measurement: Metrics and monitoring

Our 6-Step Assessment Process

  1. Scoping Workshop: Define assessment objectives

  2. Document Review: Policies, charters, and reports

  3. Leadership Interviews: Board, executives, and IT management

  4. Process Evaluation: Decision-making and oversight

  5. Gap Analysis: Against ISO/IEC TR 38502 guidelines

  6. Final Report: Conformity Assessment with improvement roadmap

Deliverables

  • Conformity Assessment Certificate

  • IT Governance Maturity Report

  • Strategic Alignment Evaluation

  • Governance Improvement Plan

  • Board-Level Presentation Package

Why Company Certification Int.?

  • Governance Experts: Assessors with CGEIT and IT governance certifications

  • Board-Level Experience: Understand executive perspectives

  • Practical Approach: Actionable recommendations

  • Global Standards Alignment: Integrates with COBIT and ISO 38500

FAQ

Q: Is this a certification?
A: No, this is a conformity assessment against guidance standards, providing validation of your IT governance framework.

Q: How does this differ from an IT audit?
A: We focus on governance (decision-making and oversight) rather than operational controls.

Q: Who should participate in the assessment?
A: Board members, executives, and IT leadership for comprehensive evaluation.

Q: What's the typical duration?
A: 3-4 weeks depending on organization size and complexity.

Q: Can this help with regulatory compliance?
A: Yes, particularly for regulations requiring demonstrated IT governance.

Get Started

Ready to strengthen your IT governance?
[Request Governance Assessment] [Download Framework Checklist]

ISO/TR 24028 – AI Trustworthiness Conformity Assessment

Overview

ISO/TR 24028 provides guidance on trustworthiness in artificial intelligence systems. Our assessment helps organizations:

  • Evaluate AI systems against international trustworthiness principles

  • Identify risks in AI decision-making processes

  • Improve transparency and accountability of AI implementations

  • Align with emerging AI governance frameworks

Who It's For

  • Developers and deployers of AI systems

  • Organizations using AI for critical decision-making

  • Regulatory compliance teams addressing AI risks

  • Procurement teams evaluating AI vendor solutions

  • Ethics committees overseeing AI implementations

Why an AI Trustworthiness Assessment Matters

  • Risk Mitigation: Identify and address AI system vulnerabilities

  • Regulatory Preparedness: Stay ahead of evolving AI regulations

  • Stakeholder Trust: Demonstrate responsible AI practices

  • System Improvement: Enhance AI reliability and performance

Scope of Our Assessment

  • AI System Documentation: Review of development processes

  • Algorithmic Transparency: Explainability and interpretability

  • Data Quality: Training data representativeness and bias

  • Decision Auditing: Output validation and monitoring

  • Human Oversight: Control mechanisms and fallback procedures

Our 6-Step Assessment Process

  1. Scoping Call: Define AI systems and use cases

  2. Document Review: Technical documentation and policies

  3. Technical Evaluation: Algorithm and data pipeline analysis

  4. Stakeholder Interviews: Developers, users, and affected parties

  5. Impact Assessment: Potential harms and mitigation strategies

  6. Final Report: Conformity Assessment with improvement plan

Deliverables

  • Trustworthiness Assessment Certificate

  • AI Risk Profile Report

  • Bias and Fairness Evaluation

  • Governance Improvement Plan

  • Executive Summary Presentation

Why Company Certification Int.?

  • AI Ethics Experts: Assessors with technical and ethical expertise

  • Multidisciplinary Approach: Combines technical and governance perspectives

  • Practical Framework: Actionable recommendations for improvement

  • Future-Ready: Aligns with emerging global AI standards

FAQ

Q: Is this a certification of our AI system?
A: This is a conformity assessment providing independent validation of your AI's trustworthiness characteristics.

Q: How does this relate to EU AI Act requirements?
A: Our assessment helps prepare for compliance with high-risk AI system requirements.

Q: What types of AI systems can be assessed?
A: We assess machine learning, deep learning, and other AI approaches across all applications.

Q: How long does the assessment take?
A: Typically 3-5 weeks depending on system complexity.

Q: Do you need access to our source code?
A: We require appropriate technical documentation but typically don't need full source code access.

Get Started

Ready to demonstrate your AI's trustworthiness?
[Request AI Assessment] [Download Trustworthiness Checklist]

ISO/IEC 29134 – Privacy Impact Assessment (PIA) Service

Company Certification Int. offers expert Privacy Impact Assessment (PIA) services based on ISO/IEC 29134, a global guideline that helps organizations systematically assess the privacy risks associated with processing personally identifiable information (PII).

What Is ISO/IEC 29134?

ISO/IEC 29134 provides guidance on:

  • Planning and conducting Privacy Impact Assessments (PIAs)

  • Identifying and evaluating PII-related risks

  • Documenting mitigation actions and accountability

  • Supporting privacy-by-design practices in systems and services

  • Aligning with global laws like GDPR, HIPAA, and PDPA

Our PIA Assessment Services

We support your organization by:

  • Conducting structured PIAs on systems or projects handling PII

  • Mapping data flows, risk points, and third-party data sharing

  • Evaluating the legal and technical risks to individuals’ privacy

  • Recommending mitigation strategies and controls

  • Providing a non-accredited Conformity Assessment Certificate

Key Benefits

  • Demonstrates responsible data processing practices

  • Helps meet legal obligations under GDPR Article 35 (DPIA)

  • Identifies privacy risks early in project life cycles

  • Builds trust with customers and regulators

  • Supports ISO 27701 and ISO 29100 alignment

When to Conduct a PIA

  • Before launching new products/services that process PII

  • During digital transformation, cloud migration, or system redesign

  • When handling biometric, financial, health, or location data

  • If required by law or regulation

What You’ll Receive

  • PIA Report aligned with ISO/IEC 29134

  • Data flow mapping and risk register

  • Detailed recommendations for mitigation

  • Staff awareness guidance

  • PIA Conformity Assessment Certificate

Our Assessment Process

  • Information gathering and scoping with key stakeholders

  • Identification of privacy risks and impact severity

  • Documentation of mitigation controls and responsibilities

  • Delivery of a formal PIA assessment report

Frequently Asked Questions (FAQ)

Q1: Is ISO/IEC 29134 certifiable?
A1: No. It’s a guideline. We provide conformity assessment to verify implementation of its recommendations.

Q2: Is this service helpful for GDPR compliance?
A2: Yes. It aligns closely with GDPR’s DPIA requirements under Article 35.

Q3: What type of organizations need a PIA?
A3: Any organization processing sensitive or large-scale personal data, especially in fintech, health tech, government, and HR systems.

Q4: Who conducts the assessment?
A4: Our privacy experts with experience in data protection and security conduct the assessments remotely or onsite.

Protect Privacy. Minimize Risk.

Ensure your projects handle personal data responsibly with ISO/IEC 29134 – Privacy Impact Assessment by Company Certification Int.

ISO/IEC 29100 – Privacy Framework Assessment

Company Certification Int. offers a structured Privacy Framework Assessment based on ISO/IEC 29100, the international guideline that defines a common privacy terminology and outlines principles for protecting personally identifiable information (PII). While not certifiable, our conformity assessment helps your organization align with global privacy best practices.

What Is ISO/IEC 29100?

ISO/IEC 29100 provides a high-level framework that:

  • Establishes privacy principles for handling PII

  • Defines key privacy terminology

  • Identifies actors and roles in PII processing

  • Supports compliance with privacy laws (e.g., GDPR, HIPAA, PDPA)

  • Enables organizations to embed privacy-by-design

Our Assessment Services

We assess your organization’s alignment with ISO/IEC 29100 through:

  • Review of privacy policies, notices, and practices

  • Mapping PII life cycle stages and risk points

  • Gap analysis against privacy principles

  • Recommendations for improving governance and controls

  • Issuance of a Conformity Assessment Certificate

Key Benefits

  • Enhances trust with clients and stakeholders

  • Supports regulatory compliance across jurisdictions

  • Promotes privacy-by-design and by-default practices

  • Reduces risk of data breaches and non-compliance fines

  • Positions you for future ISO 27701 certification

Who Should Consider This?

  • Organizations processing personal or sensitive data

  • Data controllers and processors

  • SaaS platforms, e-commerce, fintech, healthcare, and HR systems

  • Startups seeking privacy readiness before product launch

  • Compliance, DPOs, and legal teams

What You’ll Receive

  • Privacy Framework Assessment Report

  • Custom recommendations for improvement

  • Alignment summary with ISO/IEC 29100

  • Awareness training options for staff

  • Non-accredited Conformity Certificate

Our Approach

  • Remote interviews with data owners and privacy teams

  • Review of existing PII handling procedures

  • Risk analysis and remediation planning

Frequently Asked Questions (FAQ)

Q1: Is ISO/IEC 29100 a certifiable standard?
A1: No. It’s a guideline. We offer conformity assessment services to help you demonstrate alignment.

Q2: How is it different from ISO 27701?
A2: ISO 29100 provides general privacy principles. ISO 27701 builds on ISO 27001 to implement a full privacy information management system.

Q3: Is it helpful for GDPR compliance?
A3: Yes. The principles of ISO/IEC 29100 are aligned with GDPR and other global privacy regulations.

Q4: Who conducts the assessment?
A4: Our certified privacy and information security professionals assess your organization remotely or onsite.

Show Your Commitment to Privacy

Strengthen your privacy posture with ISO/IEC 29100 Assessment from Company Certification Int.

ISO/IEC 27050 – eDiscovery Assessment

At Company Certification Int., we provide conformity assessment services based on ISO/IEC 27050, the international guideline for handling electronic discovery (eDiscovery) in a legally sound and secure manner. While it is not certifiable, demonstrating alignment with this standard supports legal readiness, digital forensics integrity, and data privacy compliance.

What Is ISO/IEC 27050?

ISO/IEC 27050 is a multi-part guideline that focuses on the processes and principles involved in eDiscovery, i.e., identifying, preserving, collecting, reviewing, and producing electronically stored information (ESI) for legal and investigative purposes.

The standard helps ensure:

  • Lawful and defensible handling of electronic evidence

  • Collaboration between legal, IT, and compliance teams

  • Protection of sensitive and personal data

  • Chain-of-custody and audit trail integrity

  • Risk and cost control during litigation or investigations

Our Assessment Services

Our eDiscovery Assessment includes:

  • Evaluation of your existing eDiscovery policies and workflows

  • Mapping against ISO/IEC 27050 guidance

  • Gap analysis and compliance recommendations

  • Integration guidance with legal and information governance systems

  • Issuance of a Conformity Assessment Certificate

Key Benefits

  • Ensures defensible legal processes for ESI handling

  • Minimizes data loss, tampering, or procedural errors

  • Reduces legal and regulatory risk exposure

  • Enhances readiness for litigation, audits, or incident response

  • Demonstrates privacy-conscious data handling

Who Should Consider This?

  • Legal and compliance departments

  • Organizations involved in litigation or regulatory audits

  • IT service providers handling third-party data

  • Financial, healthcare, and telecom companies

  • Any business subject to digital forensic or court discovery processes

What You’ll Receive

  • eDiscovery Compliance Assessment Report

  • Actionable recommendations for improvement

  • Optional privacy and legal awareness training

  • Conformity Certificate (non-accredited)

Our Approach

  • Remote assessment with interviews and document review

  • Review of systems, logs, data storage, and protocols

  • Collaborative improvement planning with your teams

Frequently Asked Questions (FAQ)

Q1: Can an organization be certified for ISO/IEC 27050?
A1: No. It's a guideline, not a certifiable standard. We offer conformity assessments to verify alignment.

Q2: What parts of eDiscovery does the standard cover?
A2: It includes identification, preservation, collection, processing, review, and production of ESI.

Q3: Is this useful for organizations outside the legal industry?
A3: Yes. Any organization subject to regulatory audits or legal proceedings benefits from ISO/IEC 27050 alignment.

Q4: Will the assessment help with compliance or litigation readiness?
A4: Absolutely. It ensures your digital evidence handling is defensible, auditable, and privacy-compliant.

Be Legally Ready – Secure Your Digital Evidence

Get ahead of legal risk with ISO/IEC 27050 eDiscovery Assessment by Company Certification Int.

ISO/IEC 27040 – Storage Security Assessment

At Company Certification Int., we offer conformity assessment services based on ISO/IEC 27040, the globally recognized guideline for securing digital storage systems. While not certifiable, aligning with this standard demonstrates your organization's commitment to robust information security practices.

What Is ISO/IEC 27040?

ISO/IEC 27040 provides detailed recommendations for planning, implementing, and maintaining secure storage environments. It covers a broad range of storage technologies, from cloud to local data centers, with a focus on confidentiality, integrity, and availability.

It includes:

  • Threat and risk analysis for storage

  • Secure storage architecture and design

  • Encryption, access control, and data masking

  • Backup, replication, and data retention strategies

  • Lifecycle protection of data at rest and in motion

Our Assessment Services

Our Storage Security Assessment includes:

  • Review of current storage technologies and controls

  • Gap analysis against ISO/IEC 27040 guidelines

  • Recommendations tailored to your storage architecture

  • Risk mitigation strategies for data storage environments

  • A Conformity Assessment Certificate upon completion

Key Benefits

  • Reduces risk of data breaches and unauthorized access

  • Strengthens compliance with privacy and industry laws

  • Enhances resilience of storage infrastructure

  • Supports business continuity and disaster recovery

  • Builds customer trust and regulatory confidence

Who Should Consider This?

  • Data center operators and cloud service providers

  • IT and cybersecurity managers

  • Finance, healthcare, legal, and government sectors

  • Organizations managing critical or sensitive data

  • Businesses pursuing ISO/IEC 27001 implementation

What You’ll Receive

  • Storage Security Assessment Report

  • Customized action plan for enhancements

  • Certificate of Conformity (non-accredited)

  • Optional team awareness training

Our Approach

  • Remote or onsite evaluations available

  • Interviews, system reviews, and architecture mapping

  • Practical, risk-based recommendations

Frequently Asked Questions (FAQ)

Q1: Is ISO/IEC 27040 a certifiable standard?
A1: No. It’s a guideline. We offer conformity assessments to confirm your alignment with its best practices.

Q2: Does this overlap with ISO/IEC 27001?
A2: ISO/IEC 27040 complements ISO/IEC 27001 by providing detailed technical guidance for storage security controls.

Q3: Is this suitable for cloud storage environments?
A3: Yes. It includes recommendations for securing both on-premises and cloud-based storage systems.

Q4: Can we use this assessment in our audit reports or vendor evaluations?
A4: Yes. The report and certificate enhance credibility during audits and supply chain assessments.

Secure Your Data Storage with Confidence

Partner with Company Certification Int. to demonstrate leadership in data storage security aligned with ISO/IEC 27040.

ISO/IEC 27037 – Digital Evidence Handling Assessment

At Company Certification Int., we provide expert conformity assessment services based on ISO/IEC 27037, the international guideline that outlines how to properly identify, collect, acquire, and preserve digital evidence. Though this is not a certifiable standard, our assessment helps organizations demonstrate alignment with best practices in digital forensics and incident response.

What Is ISO/IEC 27037?

ISO/IEC 27037 provides guidance on handling digital evidence in a legally sound and forensically reliable manner. It is especially valuable for organizations that may face legal disputes, security breaches, or need to collect evidence for internal investigations.

It covers:

  • Identification and documentation of potential digital evidence

  • Proper collection and preservation methods

  • Role definition: Digital Evidence First Responders and Specialists

  • Legal and procedural considerations in evidence handling

Our Assessment Services

Our ISO/IEC 27037 conformity assessment includes:

  • Review of digital evidence handling policies and SOPs

  • Evaluation of systems and tools used for data collection

  • Gap analysis against ISO/IEC 27037 recommendations

  • Assessment of staff readiness and role clarity

  • Delivery of a Conformity Assessment Certificate

Key Benefits

  • Increases the reliability of digital evidence in investigations

  • Strengthens your organization's readiness for cyber incidents

  • Supports compliance with data protection and legal standards

  • Builds trust with regulators, auditors, and clients

  • Reduces legal and reputational risk

Who Needs This?

  • Organizations handling sensitive or regulated data

  • IT and cybersecurity teams

  • Legal departments and compliance officers

  • Digital forensics and incident response units

  • Government, telecom, finance, and healthcare sectors

What You’ll Receive

  • Digital Evidence Handling Assessment Report

  • Practical recommendations for improvement

  • Certificate of Conformity (non-accredited)

  • Optional awareness training for key staff

Our Process

  • Conducted remotely or on-site

  • Based on interviews, document review, and tool walkthroughs

  • Efficient delivery with actionable insights

Frequently Asked Questions (FAQ)

Q1: Can we get certified to ISO/IEC 27037?
A1: No, it is a guideline. However, you can obtain a conformity assessment certificate showing your alignment with its principles.

Q2: Is this assessment useful for legal compliance?
A2: Yes. Proper digital evidence handling supports legal defensibility and readiness for disputes or cybercrime investigations.

Q3: How does it relate to ISO/IEC 27001?
A3: It complements ISO 27001 by offering depth in incident evidence collection and forensic practices, especially for security events.

Q4: Do you assess our team’s readiness?
A4: Yes. We review the roles, responsibilities, and preparedness of evidence handlers as defined in the standard.

Take Control of Your Digital Evidence Process

Let Company Certification Int. help you align with ISO/IEC 27037 and build confidence in your digital evidence practices.

ISO/IEC 27036 – Supplier Relationship Security Assessment

Company Certification Int. offers a professional conformity assessment service based on ISO/IEC 27036, the international guideline that helps organizations manage information security risks in supplier and third-party relationships. While it is not a certifiable standard, this assessment supports businesses in aligning with best practices to secure their supply chain.

What Is ISO/IEC 27036?

ISO/IEC 27036 is a multi-part guideline that provides structured advice on managing information security in supplier relationships. It focuses on:

  • Risk identification and mitigation in outsourcing and procurement

  • Secure information exchange with suppliers and service providers

  • Lifecycle security from onboarding to contract termination

  • Integration with broader information security management systems

This guideline supports compliance with ISO/IEC 27001, especially in environments where third-party vendors, cloud services, or outsourcing are involved.

What We Offer

Our conformity assessment services for ISO/IEC 27036 include:

  • Evaluation of supplier security risk controls

  • Assessment of policies, contracts, and SLAs

  • Review of due diligence, onboarding, and monitoring processes

  • Identification of vulnerabilities and gaps in supplier relationships

  • Issuance of a Conformity Assessment Certificate (non-accredited)

Key Benefits

  • Strengthens third-party risk management

  • Reduces risk of data breaches via supply chain channels

  • Improves contract-based security governance

  • Supports ISO 27001 Annex A control requirements (A.15 & A.6)

  • Demonstrates responsible vendor management to clients and regulators

Who Should Consider This Assessment?

  • Organizations that outsource IT, cloud, or business processes

  • Enterprises with complex vendor ecosystems

  • Government and regulated industries

  • Any business pursuing ISO 27001 or general cybersecurity enhancement

Our Delivery Method

  • 100% remote or hybrid assessments

  • Efficient, tailored reviews for your supply chain context

  • Clear reporting and remediation advice

What You’ll Receive

  • Supplier Security Assessment Report

  • Actionable recommendations

  • Certificate of Conformity (showing alignment with ISO/IEC 27036)

  • Optional consultation on supplier onboarding and contract controls

Frequently Asked Questions (FAQ)

Q1: Is ISO/IEC 27036 a certifiable standard?
A1: No, it’s a guideline. Organizations can align with it and obtain a conformity assessment certificate, but not ISO certification.

Q2: Is this useful if we’re already ISO 27001 certified?
A2: Absolutely. ISO/IEC 27036 deepens your control over supplier-related security, which is part of ISO 27001’s Annex A controls.

Q3: Can this help us prepare for client audits or RFPs?
A3: Yes. Many clients and contracts demand supplier risk management. This assessment shows your proactive approach.

Q4: Do you review actual supplier contracts?
A4: Yes. Our assessors evaluate relevant clauses and SLAs to check alignment with ISO/IEC 27036 best practices.

Ready to Secure Your Supplier Network?

Reach out to Company Certification Int. today to schedule your ISO/IEC 27036 conformity assessment and strengthen your supplier relationships with confidence.

ISO/IEC 27035 – Information Security Incident Management Assessment

Company Certification Int. offers professional conformity assessment services for organizations aiming to align with ISO/IEC 27035, the globally recognized guideline for managing information security incidents. While ISO/IEC 27035 is not certifiable, our structured assessment ensures your organization adopts best practices to effectively detect, respond to, and recover from security incidents.

What Is ISO/IEC 27035?

ISO/IEC 27035 is an international guideline designed to help organizations establish and maintain an effective Information Security Incident Management (ISIM) process. It includes guidance for:

  • Preparing for incident handling

  • Detecting and reporting incidents

  • Assessing and responding to incidents

  • Learning from incidents to improve the system

The current version (ISO/IEC 27035-1:2023) outlines principles and processes that align well with ISO/IEC 27001 and modern cybersecurity needs.

What We Offer

Company Certification Int. provides comprehensive conformity assessments that include:

  • Independent review of your incident management policies and procedures

  • Gap analysis based on ISO/IEC 27035 principles

  • Evaluation of detection, response, and communication mechanisms

  • Expert recommendations for closing identified gaps

  • Issuance of a Conformity Assessment Certificate (non-accredited)

Key Benefits

  • Improves cyber incident readiness and response

  • Supports ISO/IEC 27001 implementation and audits

  • Demonstrates commitment to global security standards

  • Builds trust with clients, regulators, and stakeholders

  • Identifies vulnerabilities and process improvement areas

Who Should Consider This Assessment?

  • IT service providers and MSPs/MSSPs

  • Financial institutions and fintech companies

  • Healthcare, insurance, and government bodies

  • Organizations managing personal, confidential, or regulated data

  • Any business pursuing ISO/IEC 27001 certification or needing robust incident handling

Our Delivery Method

  • Fully remote or hybrid assessment options

  • Fast turnaround and flexible scheduling

  • Secure digital reporting and documentation

What You’ll Receive

  • Gap Analysis Report

  • Recommendations aligned with ISO/IEC 27035

  • Optional improvement roadmap

  • Certificate of Conformity (3rd-party verified)

Frequently Asked Questions (FAQ)

Q1: Is ISO/IEC 27035 certifiable like ISO 27001?
A1: No, ISO/IEC 27035 is a guideline. It does not have certifiable requirements, but organizations can undergo a conformity assessment to show alignment.

Q2: What’s the benefit of a conformity assessment?
A2: It validates that your organization follows international best practices in security incident management and provides credibility in front of clients and partners.

Q3: Do I need ISO 27001 before doing this?
A3: No, but ISO/IEC 27035 complements ISO 27001 by covering incident management. It can be done as a standalone assessment or in support of ISO 27001 efforts.

Q4: Will you help improve our incident response process?
A4: Yes, we provide recommendations and, if needed, consulting services to enhance your processes based on the assessment findings.

Get Started

Let our team at Company Certification Int. help you assess, improve, and align your information security incident management process with ISO/IEC 27035.

Pages