Infigo IS

Infigo IS

Speciality: Offensive Security and Managed SOC Services

100 employees Publishes CVEs
[01] About

Croatian cybersecurity company based in Zagreb; provides managed security services including SOC management; offers penetration testing and red team exercises, emphasizing offensive security and vulnerability testing.

Croatian cybersecurity company based in Zagreb; provides managed security services including SOC management; offers penetration testing and red team exercises, emphasizing offensive security and vulnerability testing.
[02] Services
Managed Security Operations Center (soc)
Penetration Testing
Red Team Exercises
Offensive Security
Fraud And Anti-money Laundering Software
Compliance Management Software
Risk And Compliance Consulting
Security Information And Event Management (siem)
[03] Certifications
ISO/IEC 9001:2015
ISO/IEC 27001:2013

ISO/IEC 27001:2013


Origin


ISO/IEC 27001:2013 was developed jointly by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). The standard was first published in 2005, with the 2013 version representing a major revision that updated the framework to address evolving cybersecurity challenges. It originated from the British Standard BS 7799, which was developed in the 1990s to provide organizations with a systematic approach to managing sensitive information. The standard was created to establish an internationally recognized framework for information security management systems (ISMS), enabling organizations to protect their information assets through a risk-based approach.


Industry Value


ISO/IEC 27001:2013 is highly valued in the industry because it provides organizations with a comprehensive, vendor-neutral framework for establishing, implementing, and continuously improving information security practices. Certification to this standard demonstrates to clients, partners, and regulators that an organization has implemented robust security controls and follows international best practices for protecting sensitive data. Many industries, particularly those handling personal data, financial information, or critical infrastructure, consider ISO 27001 certification essential for vendor selection and compliance with regulatory requirements. The certification also provides competitive advantages in the marketplace and helps organizations systematically identify and mitigate information security risks.

ISO 22301:2019
SOC 2

SOC 2 Certification Overview


Origin


SOC 2 (Service Organization Control 2) was developed by the American Institute of Certified Public Accountants (AICPA) in 2011 as part of their Service Organization Control reporting framework. It was created to address the growing need for standardized security evaluations as businesses increasingly moved to cloud-based services and outsourced IT operations. The AICPA developed SOC 2 to provide a framework that service providers could use to demonstrate their commitment to protecting customer data across five "Trust Service Criteria": security, availability, processing integrity, confidentiality, and privacy.


Industry Value


SOC 2 certification has become a critical trust signal in the technology and service provider industry, particularly for SaaS companies, cloud hosting providers, and data centers. Organizations value SOC 2 compliance because it provides third-party validation that a vendor has implemented appropriate controls to protect sensitive data, reducing the risk and liability associated with outsourcing. For service providers, achieving SOC 2 compliance is often a competitive necessity, as many enterprise customers and partners require it before entering into business relationships. The certification helps streamline vendor security assessments, as clients can rely on the audited report rather than conducting their own lengthy security reviews.

ISC2 CISSP
CCSP

CCSP Certification Overview


Origin


The Certified Cloud Security Professional (CCSP) certification was created through a collaboration between (ISC)² (International Information System Security Certification Consortium) and the Cloud Security Alliance (CSA). Launched in 2015, the certification was developed in response to the rapidly growing adoption of cloud computing and the increasing need for security professionals with specialized knowledge in cloud environments. (ISC)² partnered with CSA to ensure the certification addressed real-world cloud security challenges and aligned with industry best practices.


Industry Value


The CCSP is highly valued because it validates expertise in cloud security architecture, governance, risk management, and compliance—critical skills as organizations continue migrating to cloud platforms. It demonstrates that professionals understand how to secure data, applications, and infrastructure across major cloud service models (IaaS, PaaS, SaaS) and can implement security controls specific to cloud environments. Employers recognize CCSP holders as qualified to manage the unique security challenges of cloud computing, making it particularly valuable for security architects, engineers, and IT managers working with AWS, Azure, Google Cloud, and other platforms.

SSCP
ISACA CISA
CISM

CISM Certification: Origin


The Certified Information Security Manager (CISM) certification was created by ISACA (Information Systems Audit and Control Association) in 2003. ISACA developed CISM to address the growing need for a certification specifically focused on information security management and governance, rather than just technical security skills. The certification was designed to recognize professionals who design, manage, and oversee an enterprise's information security program, filling a gap between technical security certifications and the strategic, managerial aspects of cybersecurity.


Industry Value and Importance


CISM is highly valued in the cybersecurity industry because it demonstrates expertise in security risk management, governance, incident management, and program development from a management perspective. Many organizations, particularly large enterprises and government agencies, specifically seek CISM-certified professionals for leadership roles in information security. The certification is globally recognized and often commands higher salaries compared to non-certified peers. Its focus on aligning security practices with business objectives makes it particularly relevant for professionals aspiring to senior security management positions, including Chief Information Security Officer (CISO) roles.

CRISC

CRISC Certification Overview


Origin and Creation


The Certified in Risk and Information Systems Control (CRISC) certification was created and launched by ISACA (Information Systems Audit and Control Association) in 2010. ISACA developed this credential in response to growing demand from organizations for professionals who could identify and manage IT risks and implement effective information systems controls. The certification was designed to fill a gap in the market for a specialized credential focused specifically on enterprise risk management within IT environments, distinguishing it from ISACA's other certifications like CISA, which focuses more on auditing.


Industry Value and Importance


The CRISC certification is highly valued because it validates a professional's expertise in four critical domains: IT risk identification, assessment, evaluation and response, and control design and implementation. Organizations prize CRISC holders for their ability to bridge the gap between technical IT operations and business risk management, helping enterprises make informed decisions about technology investments and security measures. The certification is particularly sought after in regulated industries like finance, healthcare, and government, where managing IT risk and demonstrating compliance are essential. Many employers list CRISC as a preferred or required qualification for risk management, compliance, and IT governance positions, often associated with higher salary potential.

CDPSE
ISO 27001 Lead Auditor

ISO 27001 Lead Auditor Certification


Origin


The ISO 27001 Lead Auditor certification stems from the ISO/IEC 27001 standard, which was published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) in 2005, with its roots in the British Standard BS 7799. The certification was created to train professionals to audit information security management systems (ISMS) against the ISO 27001 standard. Various accredited training organizations worldwide offer this certification, following guidelines established by bodies like IRCA (International Register of Certificated Auditors) and other national accreditation organizations.


Industry Value


The ISO 27001 Lead Auditor certification is highly valued because it demonstrates an individual's expertise in conducting comprehensive information security audits and assessing organizational compliance with internationally recognized security standards. Organizations worldwide seek certified lead auditors to perform internal audits, prepare for external certification audits, and ensure their ISMS meets regulatory and customer requirements. The certification is particularly important for consulting firms, audit organizations, and enterprises managing sensitive data, as it provides assurance that security controls are properly implemented and maintained according to global best practices.

ISO 27032 Lead Cyber Security Manager
[05] Notable Clients
  • Global banks
  • Payment providers
  • Hypercar manufacturers