INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h

🔐 Cybersecurity Glossary

Over 265 professional cybersecurity terms in English & Arabic — your comprehensive reference for the cybersecurity world

265 terms 16 categories 47 frameworks
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
35 terms
🏛 Acceptable Use Policy AUP
سياسة الاستخدام المقبول
A document that outlines the rules and guidelines for using an organization's information technology resources.
🏛 Board Cybersecurity Oversight
إشراف المجلس على الأمن السيبراني
The responsibility of the board of directors to oversee the organization's cybersecurity strategy and risk management.
🏛 Business Email Compromise Prevention BEC Prevention
منع اختراق البريد الإلكتروني للأعمال
A strategic security approach combining technical controls, user awareness training, and governance policies to prevent sophisticated email fraud attacks targeting organizations. This includes implementing verification procedures for financial transactions, executive impersonation detection, and incident response protocols.
🏛 Chief Information Security Officer CISO
مسؤول أمن المعلومات الرئيسي
Senior executive responsible for establishing and maintaining the enterprise cybersecurity vision, strategy, and program to ensure information assets and technologies are adequately protected.
🏛 Cybersecurity Framework CSF
إطار الأمن السيبراني
A structured set of guidelines and best practices designed to help organizations manage and reduce cybersecurity risk.
🏛 Data Privacy Impact Assessment DPIA
تقييم أثر خصوصية البيانات
A systematic process to identify and minimize privacy risks associated with processing personal data, particularly when implementing new technologies or systems. This assessment evaluates potential impacts on individuals' privacy rights and determines appropriate safeguards and mitigation measures.
🏛 Defense in Depth DiD
الدفاع المتعمق
A cybersecurity strategy that uses multiple layers of security controls to protect information assets, so if one layer fails, another is in place.
🏛 Domain-based Message Authentication DMARC
مصادقة الرسائل المستندة إلى النطاق
An email authentication protocol that builds on SPF and DKIM to provide domain owners with protection against unauthorized use of their domain in email attacks. DMARC enables senders to specify how receiving mail servers should handle messages that fail authentication checks and provides reporting mechanisms for monitoring.
🏛 Due Diligence
العناية الواجبة
The practice of performing adequate research and assessment before making decisions about security investments, partnerships, or vendor engagements.
🏛 Email Data Loss Prevention Email DLP
منع فقدان البيانات عبر البريد الإلكتروني
A security strategy and technology that monitors, detects, and blocks sensitive information from being transmitted via email in violation of organizational policies or regulatory requirements. Email DLP helps prevent accidental or intentional data breaches by enforcing content inspection and policy-based controls.
🏛 Email Encryption Policy
سياسة تشفير البريد الإلكتروني
A governance framework that defines requirements and procedures for encrypting email communications to protect sensitive information in transit and at rest. This policy establishes standards for encryption methods, key management, and compliance with data protection regulations such as PDPL.
🏛 Email Gateway Security EGS
أمن بوابة البريد الإلكتروني
A security solution that filters and monitors incoming and outgoing email traffic to detect and block malicious content, spam, and phishing attempts. It acts as a protective barrier between an organization's email infrastructure and external threats, enforcing security policies and compliance requirements.
🏛 Email Incident Response Plan
خطة الاستجابة لحوادث البريد الإلكتروني
A documented procedure that outlines the steps to be taken when an email security incident occurs, including detection, containment, investigation, remediation, and reporting. This plan is essential for minimizing damage from email-based attacks and ensuring compliance with regulatory notification requirements.
🏛 Email Retention Policy
سياسة الاحتفاظ بالبريد الإلكتروني
A governance document that defines how long email messages must be retained, archived, and eventually deleted based on regulatory requirements, legal obligations, and business needs. This policy ensures compliance with data protection laws while managing storage resources effectively.
🏛 Email Security Awareness Training
التدريب على التوعية بأمن البريد الإلكتروني
A structured program designed to educate employees about email-based threats such as phishing, malware, and social engineering attacks. This training is a critical component of security governance, helping organizations build a human firewall and reduce the risk of successful email attacks.
🏛 Governance, Risk and Compliance GRC
الحوكمة والمخاطر والامتثال
Integrated framework for managing an organization's governance policies, enterprise risk management, and regulatory compliance. GRC platforms automate control assessment, risk tracking, and audit management across multiple frameworks simultaneously.
🏛 Information Security Management System ISMS
نظام إدارة أمن المعلومات
A systematic approach consisting of policies, processes, and systems to manage sensitive information so that it remains secure, encompassing people, processes, and IT systems.
🏛 Inherent Risk
المخاطر الذاتية
The level of risk existing before any controls are applied. Used in risk assessments to establish baseline risk level before evaluating the effectiveness of existing controls to arrive at residual risk.
🏛 Maturity Model CMM
نموذج النضج
A framework for assessing the current state and improvement path of an organization's cybersecurity capabilities across defined levels.
🏛 NCA Cloud Cybersecurity Controls NCA CCC
ضوابط الأمن السيبراني السحابية
Specialized NCA framework governing cloud computing security for Saudi government and critical infrastructure entities. Contains 76 controls covering cloud provider selection, data residency (data must remain in KSA), shared responsibility, and cloud incident response.
🏛 NCA Cybersecurity Resilience Requirements NCA CSCC
متطلبات مرونة الأمن السيبراني
NCA framework establishing cybersecurity resilience requirements for critical national infrastructure, focusing on continuity of essential services during cyber incidents.
🏛 NCA Essential Cybersecurity Controls NCA ECC
الضوابط الأساسية للأمن السيبراني
Mandatory cybersecurity controls issued by the National Cybersecurity Authority of Saudi Arabia, applicable to government entities and critical national infrastructure operators. The 2024 version contains 114 controls across 7 domains.
🏛 Personal Data Protection Law PDPL
نظام حماية البيانات الشخصية
Saudi Arabia's data protection law enacted by Royal Decree in September 2021 and enforced from September 2023. Governs collection, processing, storage, and transfer of personal data, requiring consent, DPO appointment, and 72-hour breach notification to SDAIA.
🏛 RACI Matrix RACI
مصفوفة المسؤوليات
A responsibility assignment matrix defining who is Responsible, Accountable, Consulted, and Informed for each task.
🏛 Right to Erasure
حق المحو
Data subject right under PDPL to request deletion of their personal data held by an organization under specific circumstances, including withdrawal of consent or when data is no longer necessary for the original purpose.
🏛 SAMA Cybersecurity Framework SAMA CSF
إطار الأمن السيبراني لساما
Mandatory cybersecurity framework issued by the Saudi Arabian Monetary Authority for all regulated financial institutions. Version 2.0 contains 251 sub-controls across 12 domains covering governance, risk, IAM, operations, and business continuity.
🏛 Security Architecture
البنية الأمنية
A unified security design that addresses the necessities and potential risks involved in a certain scenario and specifies when and where to apply security controls.
🏛 Security Baseline
خط الأساس الأمني
A minimum set of security controls required for a system or organization to operate safely.
🏛 Security Governance
حوكمة الأمن
The set of responsibilities exercised by the board and executive management to provide strategic direction and oversight of cybersecurity.
🏛 Security Governance Framework SGF
إطار حوكمة الأمن السيبراني
A comprehensive structure of policies, procedures, and controls that establishes accountability and oversight for cybersecurity activities across an organization. It defines roles, responsibilities, and decision-making processes to ensure security objectives align with business goals and regulatory requirements.
🏛 Security Metrics KPI
مقاييس الأمن
Quantifiable measurements used to track and evaluate the effectiveness of an organization's security program.
🏛 Security Policy
السياسة الأمنية
A formal document that defines the rules, guidelines, and practices for managing and protecting an organization's information assets.
🏛 Security Steering Committee
لجنة توجيه الأمن
A cross-functional leadership body responsible for providing strategic direction and oversight of the cybersecurity program.
🏛 Sender Policy Framework SPF
إطار سياسة المرسل
An email authentication protocol that allows domain owners to specify which mail servers are authorized to send emails on behalf of their domain. SPF helps prevent email spoofing by enabling receiving servers to verify that incoming mail from a domain comes from an authorized IP address.
🏛 Virtual CISO vCISO
مسؤول أمن المعلومات الافتراضي
Fractional or part-time CISO service providing experienced cybersecurity executive leadership to organizations that cannot justify a full-time hire. Ideal for Saudi SMEs, startups, and organizations bridging a CISO vacancy while achieving SAMA or NCA compliance.
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.