SAFFRON Sp. z o.o.

SAFFRON Sp. z o.o.

Speciality: Web and Mobile Application Penetration Testing

Gdańsk, Poland 9 employees
[01] About

Poland-based IT services and consulting company specializing in cybersecurity, GRC-as-a-Service, and penetration testing; 6 employees with 28.6% YoY growth; founded 2015; headquartered in Gdańsk, Poland; offers security testing, risk management, compliance, and cybersecurity governance services.

Saffron pomaga organizacjom budować cyfrową odporność w świecie rosnącej złożoności regulacji, technologii i zagrożeń. Działamy w oparciu o trzy uzupełniające się filary: Security, Technology i Academy, które razem tworzą spójny ekosystem wsparcia dla nowoczesnych firm. W obszarze Saffron Security dostarczamy GRC-as-a-Service — model abonamentowy, w którym projektujemy, wdrażamy i utrzymujemy operacyjny system bezpieczeństwa informacji i zgodności. Wspieramy organizacje w spełnianiu wymagań takich jak ISO 27001, RODO, NIS2, DORA, AI Act czy SOC2-aligned controls, zapewniając ciągłość, aktualność i realną gotowość. Saffron Technology koncentruje się na jakości i stabilności systemów IT. Oferujemy testowanie oprogramowania, security testing, wsparcie technologiczne i utrzymanie systemów — tak, aby bezpieczeństwo i zgodność były osadzone w realnym środowisku technicznym, a nie wyłącznie w dokumentacji. W ramach Saffron Academy rozwijamy kompetencje zespołów i liderów poprzez szkolenia i warsztaty z zakresu bezpieczeństwa, compliance, jakości oprogramowania i zarządzania ryzykiem. Edukacja jest dla nas kluczowym elementem budowania trwałej odporności organizacyjnej. Dla firm, które nie potrzebują formalnej certyfikacji akredytowanej, oferujemy Saffron Attestation — niezależne potwierdzenie zgodności z wybranymi normami i kontrolami (np. ISO 27001 readiness, SOC2 Controls, RODO, NIS2), pozwalające spełnić wymagania klientów i partnerów w sposób szybki i kosztowo efektywny. Saffron to nie jednorazowy dostawca usług, lecz długoterminowy partner, który przejmuje odpowiedzialność za bezpieczeństwo, zgodność i jakość — umożliwiając klientom skupienie się na rozwoju biznesu. #Security #Technology #Academy Digital resilience — delivered as a service.
[02] Services
Provides Penetration Testing
Vulnerability Assessments
IT Security Consulting Services Focused On Building Digital Resilience.
[03] Certifications
ISO 27001

ISO 27001: Information Security Management Certification


Origin


ISO 27001 was developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), and was first published in 2005. It evolved from the British Standard BS 7799-2, which was created in the late 1990s. The standard was developed in response to the growing need for organizations to systematically manage and protect sensitive information in an increasingly digital business environment. ISO 27001 has since been revised, with major updates released in 2013 and 2022 to address evolving cybersecurity threats and best practices.


Industry Value and Importance


ISO 27001 is globally recognized as the leading standard for information security management systems (ISMS) and is valued for providing a systematic, risk-based approach to protecting sensitive data. Organizations that achieve ISO 27001 certification demonstrate to clients, partners, and regulators that they have implemented comprehensive security controls and are committed to maintaining confidentiality, integrity, and availability of information. The certification is particularly important for organizations handling sensitive data, as it helps meet regulatory compliance requirements, reduces security incidents, builds customer trust, and often provides a competitive advantage in procurement processes where information security assurance is required.

ISO 27005
ISO 27017

ISO 27017: Origin


ISO 27017 was developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), published in December 2015. It was created as an extension of ISO 27002 to address the growing need for specific security guidelines in cloud computing environments. The standard emerged from industry recognition that traditional information security controls required adaptation and supplementation to adequately address the unique risks and responsibilities associated with cloud service provision and use.


Industry Importance and Value


ISO 27017 is valued in the industry because it provides clear, internationally recognized guidance for both cloud service providers and cloud customers on their respective security responsibilities. The certification helps organizations demonstrate their commitment to cloud security best practices, facilitating trust between providers and customers in an increasingly cloud-dependent business environment. For businesses, achieving ISO 27017 certification can be a competitive differentiator, meeting procurement requirements, satisfying regulatory expectations, and providing assurance to stakeholders that cloud-specific security controls are properly implemented and maintained.

ISO 27018

ISO 27018: Origin


ISO 27018 was developed by the International Organization for Standardization (ISO) and officially published in 2014. It was created as the first international code of practice specifically designed to address the protection of personally identifiable information (PII) in public cloud computing environments. The standard emerged in response to growing concerns about data privacy and security as organizations increasingly migrated their operations and sensitive data to cloud service providers, necessitating clear guidelines for how cloud providers should handle personal information.


Industry Importance and Value


ISO 27018 is highly valued in the industry because it provides cloud service providers with a recognized framework for demonstrating their commitment to protecting customer data privacy. The certification is particularly important for organizations operating under strict data protection regulations like GDPR, as it helps establish compliance with privacy requirements and builds trust with clients who are entrusting their sensitive information to cloud environments. For businesses selecting cloud providers, ISO 27018 certification serves as a reliable indicator that the provider implements appropriate controls for PII protection, including transparent data handling practices, customer rights management, and restrictions on how personal data can be used or disclosed.

ISO 42001

ISO 42001: AI Management System Certification


Origin


ISO 42001 was published in December 2023 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) as ISO/IEC 42001. It was created to address the growing need for governance and responsible management of artificial intelligence systems. The standard emerged from collaborative efforts by international experts in response to increasing concerns about AI risks, ethics, and the lack of unified frameworks for organizations developing or deploying AI technologies.


Industry Importance


ISO 42001 is valued in the industry because it provides organizations with a structured framework to manage AI systems responsibly while addressing risks related to bias, transparency, privacy, and safety. Certification demonstrates to stakeholders, customers, and regulators that an organization has implemented robust controls for AI governance, which is increasingly critical as AI regulations emerge globally. The standard helps organizations build trust, ensure compliance with evolving legal requirements, and differentiate themselves in a market where responsible AI practices are becoming a competitive advantage and expectation.

NIST

NIST Cybersecurity Framework


Origin and Development


The NIST Cybersecurity Framework was created by the National Institute of Standards and Technology (NIST), a non-regulatory agency of the U.S. Department of Commerce. It was developed in response to Executive Order 13636, signed by President Obama in February 2013, which directed NIST to create a voluntary framework to help organizations manage cybersecurity risks. Released in February 2014 and updated in 2018 (version 1.1), the framework was designed to provide a common language and systematic approach for managing cybersecurity risks across critical infrastructure sectors.


Industry Value and Importance


The NIST Cybersecurity Framework is widely valued because it provides a flexible, cost-effective approach to managing cybersecurity risk that can be adapted by organizations of any size or sector. It has become a de facto standard in both the public and private sectors, often referenced in regulations, contracts, and compliance requirements. Organizations use it to assess their current security posture, communicate security requirements to vendors and partners, and demonstrate due diligence in protecting sensitive data. Its voluntary nature, combined with its comprehensive yet practical approach, has made it one of the most widely adopted cybersecurity frameworks globally.

TISAX

TISAX: Trusted Information Security Assessment Exchange


Origin


TISAX (Trusted Information Security Assessment Exchange) was created by the ENX Association (European Network Exchange) in 2017 at the request of the German automotive industry, specifically the VDA (Verband der Automobilindustrie - German Association of the Automotive Industry). The certification was developed to address the automotive sector's need for a standardized, mutual recognition framework for information security assessments. It was created to reduce the burden of multiple audits on suppliers, as automotive manufacturers were each conducting their own security assessments of shared suppliers, leading to duplication and inefficiency.


Industry Importance


TISAX has become essential for companies working with the automotive industry, particularly in Europe, as many major manufacturers now require it from their suppliers and partners. The certification provides a trusted, industry-recognized validation of a company's information security practices, protecting sensitive data such as intellectual property, product designs, and business information. Its importance stems from the mutual recognition principle—once a company achieves TISAX certification, the results are shared across participating organizations, eliminating redundant audits and creating efficiency while maintaining high security standards. For suppliers, TISAX certification has become virtually mandatory to maintain or establish business relationships with automotive OEMs and tier-1 suppliers.

ISO 22301

ISO 22301: Business Continuity Management


Origin


ISO 22301 was developed and published by the International Organization for Standardization (ISO) in 2012, with a major revision released in 2019. It emerged from the need for a globally recognized standard for business continuity management systems (BCMS), replacing the earlier British standard BS 25999-2. The standard was created to help organizations of all sizes and sectors prepare for, respond to, and recover from disruptive incidents that could threaten their operations.


Industry Value


Note: ISO 22301 is actually a business continuity management certification, not specifically a cybersecurity/IT certification, though IT resilience is often a key component. Organizations value ISO 22301 certification because it demonstrates a systematic approach to identifying potential threats and maintaining critical business functions during disruptions. The certification is particularly important for organizations that must prove operational resilience to clients, regulators, and stakeholders. It provides a competitive advantage by showing commitment to minimizing downtime, protecting revenue streams, and ensuring service delivery even during crises—whether those involve cyber incidents, natural disasters, or other operational disruptions.

HIPAA

HIPAA Compliance and Cybersecurity


HIPAA (Health Insurance Portability and Accountability Act) was enacted by the U.S. Congress and signed into law in 1996. The legislation was created to protect sensitive patient health information from being disclosed without patient consent or knowledge. The Security Rule, added in 2003, established national standards for protecting electronic personal health information (ePHI), requiring covered entities and their business associates to implement administrative, physical, and technical safeguards. While HIPAA itself is legislation rather than a certification, various organizations offer HIPAA compliance training and certification programs to help IT professionals understand and implement these requirements.


HIPAA compliance is critically important in healthcare IT because violations can result in severe penalties, ranging from $100 to $50,000 per violation, with annual maximums reaching $1.5 million. Beyond avoiding fines, HIPAA knowledge is valued because healthcare data breaches can expose sensitive patient information, damage organizational reputation, and erode patient trust. IT professionals with HIPAA expertise are highly sought after as healthcare organizations increasingly rely on digital systems for medical records, billing, and patient communication. Understanding HIPAA requirements helps ensure that healthcare systems are designed, implemented, and maintained with appropriate security controls to protect patient privacy in an era of growing cyber threats.

HITRUST

HITRUST Cybersecurity Certification


Origin


HITRUST (Health Information Trust Alliance) was founded in 2007 by a collaboration of healthcare, technology, and information security leaders. The organization created the HITRUST Common Security Framework (CSF) to address the fragmented landscape of security and privacy regulations facing the healthcare industry. Recognizing that healthcare organizations were struggling to comply with multiple frameworks like HIPAA, PCI-DSS, and ISO standards simultaneously, HITRUST developed a unified, certifiable framework that harmonizes these various requirements into a single comprehensive standard.


Industry Value and Importance


The HITRUST CSF certification has become the gold standard for demonstrating security and compliance in healthcare and beyond, now extending to financial services, retail, and other regulated industries. Organizations value HITRUST certification because it provides a standardized, risk-based approach that satisfies multiple regulatory requirements at once, reducing audit fatigue and compliance costs. The certification is particularly trusted by business partners and customers as third-party validation of an organization's security controls, often becoming a prerequisite for vendor relationships and contracts. Its prescriptive control requirements and rigorous assessment process make it more comprehensive than self-attestation models, giving stakeholders greater confidence in an organization's security posture.

ISO 9001

ISO 9001 and Cybersecurity/IT


Origin


ISO 9001 is a quality management system standard developed by the International Organization for Standardization (ISO), first published in 1987. However, it's important to note that ISO 9001 itself is not a cybersecurity or IT-specific certification—it's a general quality management standard applicable to any industry. For cybersecurity and IT specifically, ISO created ISO/IEC 27001 in 2005, which focuses on information security management systems. ISO 9001 was created to establish consistent quality management practices across organizations worldwide, while ISO/IEC 27001 was developed to address the growing need for standardized information security controls.


Industry Value


ISO 9001 is valued across industries for demonstrating an organization's commitment to quality, customer satisfaction, and continuous improvement, which can indirectly support IT operations. For actual cybersecurity and IT security certification, ISO/IEC 27001 is the recognized standard, valued because it provides a systematic approach to managing sensitive information, demonstrates due diligence to clients and stakeholders, and is often required for government contracts or business partnerships. ISO/IEC 27001 certification signals that an organization has implemented internationally recognized security controls and risk management processes, making it essential for building trust in an increasingly security-conscious business environment.

NIS2

NIS2 Directive Overview


Origin and Background


The NIS2 Directive (Network and Information Security Directive 2) was created by the European Union and adopted in January 2023, replacing the original NIS Directive from 2016. The European Parliament and Council developed this legislation to address the growing cybersecurity threats across member states and to create a more uniform approach to cybersecurity requirements. It was implemented because the original directive had inconsistent application across EU countries and didn't adequately cover the expanding digital landscape and supply chain vulnerabilities that emerged in recent years.


Industry Importance and Value


NIS2 is significant because it establishes mandatory cybersecurity requirements for approximately 160,000 organizations across essential and important sectors in the EU, including energy, healthcare, banking, digital infrastructure, and public administration. The directive is valued for creating harmonized cybersecurity standards across Europe, improving incident reporting mechanisms, and holding senior management directly accountable for compliance. For organizations doing business in or with the EU, NIS2 compliance has become essential—not only to avoid substantial penalties (up to €10 million or 2% of global turnover) but also to demonstrate robust cybersecurity practices to partners and customers in an increasingly interconnected global market.

DORA

DORA (Digital Operational Resilience Act)


DORA is a regulatory framework created by the European Union that entered into force in January 2023, with full application required by January 2025. Developed by the European Commission, the European Parliament, and the Council of the European Union, DORA was established to strengthen the digital operational resilience of financial entities across the EU. The regulation emerged from growing concerns about cyber threats, ICT disruptions, and third-party dependencies that could destabilize the financial sector, particularly following increased digitalization and cloud adoption in financial services.


DORA is highly valued in the penetration testing and cybersecurity industry because it mandates comprehensive testing requirements for financial institutions, including advanced threat-led penetration testing (TLPT) for critical entities. Penetration testing companies reference DORA compliance as it creates significant demand for their services—financial organizations must conduct regular security testing, vulnerability assessments, and sophisticated red team exercises to meet regulatory obligations. For cybersecurity firms, demonstrating knowledge of DORA requirements and offering DORA-aligned testing services has become a competitive differentiator, as it shows they understand the specific regulatory landscape their financial sector clients must navigate and can deliver testing programs that meet these stringent EU standards.

AI Act