
Networking4all is a Dutch cybersecurity company specialising in online security solutions, including SSL certificates, penetration testing, vulnerability scans, SOC monitoring, endpoint protection, security awareness training, and compliance services. With a holistic approach, Networking4all focuses on the three pillars of information security: people, process, and technology. Cybersecurity journalist Jan Meijroos speaks with Frank Leest, founder and CEO, and Ron Willigers, Head of Product & Marketing.
How does Networking4all differentiate itself from competitors?
Ron: “With 25 years of experience in online security and our cybersecurity roadmap strategy, we address gaps across various information security domains in a structured way.”
Frank: “We are pragmatic, fast, and like to keep things simple. Clear reports with actionable steps that can improve things as soon as tomorrow. Our strength lies in combining technology, strategy, and awareness — with a human approach. By focusing on people, process, technology, and monitoring, we are able to support clients broadly. We have developed our own risk analysis tool, have experience with hundreds of audits, and understand the reality from SMEs to enterprise level.”
Ron: “Our certifications such as ISO9001, ISO27001, CCV Certification, NIS2QM Auditor, and the EU Cybersecurity Label highlight our commitment to quality assurance and data protection. These certifications demonstrate that we not only meet requirements but also proactively work to strengthen our processes, earning the trust of our clients and partners.”
Why do clients call you?
Frank: “Clients contact Networking4all BV for solutions and support in the field of cybersecurity. They seek help with raising cybersecurity awareness within their organisation, improving information security processes, guidance during ISO and NEN trajectories, and complying with regulations such as DORA and NIS2.”
Ron: “They also turn to us for advice on technological measures for security monitoring and incident response. Lastly, Networking4all is an expert in SSL-TLS certificate management, including lifecycle automation.”
(Frank Leest, CEO Networking4all)
What important and concerning trends do you observe?
Frank: “Many companies underestimate the speed and severity with which new regulations are being introduced: DORA, NIS2, AI Act… The bar is higher than ever, and many companies don’t yet realise how significantly they’ll be affected.”
Ron: “At the same time, reliance on external IT providers continues to increase, which heightens supply chain vulnerability. Board members are now also legally accountable for compliance, increasing the pressure further.”
Frank: “What truly concerns us is that many companies still don’t know whether NIS2 applies to them — when in fact it often does, either directly or as a supplier. This lack of awareness can lead to major risks, especially if not addressed in time.”
How are your clients dealing with NIS2?
Frank: “The frontrunners among our clients are tackling NIS2 proactively, conducting thorough risk analyses, drafting business continuity plans (BCPs), communication strategies, and revising supplier contracts. These companies understand that NIS2 is not just an obligation but also an opportunity to strengthen their cybersecurity approach.”
Ron: “On the other hand, we see that most companies still think of NIS2 as something for the future — until they’re confronted with demands from major clients or regulators. That’s when awareness and action pick up quickly. We’re here to guide them towards mature NIS2 compliance.”
And what is your role in this?
Frank: “Our role in the NIS2 implementation process is comprehensive. We begin with a risk inventory to identify key vulnerabilities and risks. From there, we guide the journey to compliance, including implementing controls and measures that meet NIS2 requirements. Beyond implementation, we also provide crisis and response exercises to ensure companies are prepared for incidents. We offer awareness training to raise internal understanding and conduct security checks for suppliers, ensuring clarity throughout the chain.”
Ron: “We help our clients get a handle on cybersecurity without it becoming an overwhelming task. We do this by laying out clear steps and guiding them towards a mature cybersecurity approach step by step. The NIS2 Quality Mark provides a structured framework for this. Ultimately, we ensure companies not only meet regulations but are also resilient and ready for the future.”
(Ron Willigers, Head of Product & Marketing)
What is your view on the NIS2 Quality Mark?
Ron: “We see the NIS2 Quality Mark as an excellent development amid a complex and often unclear regulatory environment. It not only provides companies with a roadmap for compliance, but also clearly shows where they stand in relation to the law. This mark offers the certainty businesses need in an era where cybersecurity is increasingly vital.”
Frank: “It helps companies meet legal requirements, while also making that compliance visible to customers, partners, and regulators. This is especially valuable in tenders and supply chain collaborations, where trust and reliability are essential. The mark ensures companies visibly take responsibility for managing risks, which boosts the overall trustworthiness of the organisation.”
What do you find positive about it?
Frank: “The NIS2 Quality Mark has several strong attributes that set it apart from other initiatives. Firstly, it offers a concrete and rigorous assessment framework, so businesses know exactly what they must meet and what is expected. The mark is independent and leaves little room for ‘easy solutions’ or superficial compliance. It forces companies to truly reflect on their cybersecurity strategy and to improve it structurally and sustainably.”
Ron: “The strictness of the requirements makes it a valuable indicator of trustworthiness. It gives clients, partners, and regulators confidence that a company is genuinely committed to protecting its systems and data. This leads to more robust cybersecurity and stronger trust across the supply chain.”
What would you like to share with companies regarding information security and cyber resilience?
Ron: “We believe in simplicity, scalability, and pragmatism. Rather than treating compliance as a mere checklist, we see it as an opportunity for businesses to enhance and optimise their cybersecurity strategy. With a structured and practical approach, we help companies not just meet the law, but implement more effective and sustainable security measures. This enables them to manage today’s risks and prepare for tomorrow’s threats.”
Frank: “Companies that act now and invest in cybersecurity will not only comply with regulations but also gain a solid lead over their competitors. We help them achieve that edge by focusing on durable, scalable solutions tailored to their specific needs.”