INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Mobile Devices / Consumer Electronics HIGH 56m Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 3h Global supply_chain Software Development and DevOps CRITICAL 4h Global supply_chain Software Development and Technology CRITICAL 4h Global apt Multiple sectors HIGH 6h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 7h Global ddos Technology and Social Media HIGH 7h Global phishing Financial Services, Telecommunications, General Public HIGH 7h Global vulnerability Mobile Devices / Consumer Electronics HIGH 56m Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 3h Global supply_chain Software Development and DevOps CRITICAL 4h Global supply_chain Software Development and Technology CRITICAL 4h Global apt Multiple sectors HIGH 6h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 7h Global ddos Technology and Social Media HIGH 7h Global phishing Financial Services, Telecommunications, General Public HIGH 7h Global vulnerability Mobile Devices / Consumer Electronics HIGH 56m Global malware Networking / Infrastructure CRITICAL 1h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 3h Global supply_chain Software Development and DevOps CRITICAL 4h Global supply_chain Software Development and Technology CRITICAL 4h Global apt Multiple sectors HIGH 6h Global general Digital Content & Intellectual Property MEDIUM 6h Global malware Technology and Software Development CRITICAL 7h Global ddos Technology and Social Media HIGH 7h Global phishing Financial Services, Telecommunications, General Public HIGH 7h

📚 Knowledge Base

Comprehensive cybersecurity Q&A covering Saudi regulatory compliance

1,784
Q&A Entries
49
Categories
1784
Results
🔒
What are data subject rights under PDPL?
ما هي حقوق أصحاب البيانات في نظام PDPL؟
PDPL
Under Saudi PDPL, individuals have: 1) Right to be informed about data collection. 2) Right to access their data. 3) Right to correction of inaccurate data. 4) Right to request data destruction. 5) Right to withdraw consent. 6) Right to object to processing. Requests must be responded to within 30 days.
حقوق أصحاب البيانات تشمل: الإعلام، الوصول، التصحيح، الطلب بالحذف، سحب الموافقة، والاعتراض على المعالجة.
🏷 pdpl,rights,access,deletion,consent
📋
What are the Annex A controls in ISO 27001?
ما هي ضوابط الملحق A في ISO 27001؟
Iso
ISO 27001:2022 Annex A has 4 categories and 93 controls: Organizational (37 controls), People (8 controls), Physical (14 controls), and Technological (34 controls). Key areas include access control, cryptography, physical security, incident management, supplier relationships, and business continuity.
الملحق A لمعيار 2022:27001 يحتوي على 93 ضابطاً في 4 فئات: تنظيمية، أفراد، جسدية، وتكنولوجية.
🏷 iso,27001,annex,controls,categories
📋
Do you offer SOC services?
هل تقدمون خدمات مركز عمليات الأمن؟
Services
Yes, CISO Consulting offers managed SOC (Security Operations Center) services. Our SOC provides 24/7 monitoring, threat detection, incident response, log management (SIEM), and compliance reporting. We support integration with leading SIEM platforms including Microsoft Sentinel, Splunk, and IBM QRadar.
نعم، نقدم خدمات مركز عمليات الأمن المُدار. يوفر مركز العمليات مراقبة 24/7 وكشف التهديدات والاستجابة للحوادث وإدارة السجلات.
🏷 soc,security operations,monitoring,siem,24/7
📋
How is CISO Consulting priced?
ما هو نظام التسعير لـ CISO Consulting؟
Contact
CISO Consulting pricing is customized based on organization size, scope of services, and regulatory requirements. We offer flexible engagement models: project-based, monthly retainer, or annual subscription. Contact us for a tailored quote aligned with your specific needs and budget.
يتم تخصيص أسعار CISO Consulting بناءً على حجم المنظمة ونطاق الخدمات والمتطلبات التنظيمية. نقدم نماذج مشاركة مرنة: مشروع، احتجاز شهري، أو اشتراك سنوي.
🏷 pricing,cost,quote,subscription,budget
What is CYDO?
ما هو منصة CYDO؟
Platform
CYDO is the AI GRC (Governance, Risk, and Compliance) platform developed by JODOR Technologies, integrated with CISO Consulting services. It provides automated compliance assessments, risk registers, policy management, and regulatory tracking specifically for Saudi financial sector and government organizations.
CYDO هي منصة GRC المدعومة بالذكاء الاصطناعي التي طورتها شركة جودور تكنولوجيز. توفر تقييمات الامتثال الآلية وسجلات المخاطر وإدارة السياسات.
🏷 cydo,grc,platform,jodor,compliance
🔐
What should I do in case of a cyber incident?
ماذا أفعل في حالة وقوع حادث سيبراني؟
Security
In case of a cyber incident: 1) Contain — isolate affected systems immediately. 2) Assess — determine scope and impact. 3) Notify — alert your CISO/security team and, if required, notify regulators (SAMA within 72h for critical incidents). 4) Eradicate — remove malware and vulnerabilities. 5) Recover — restore systems from clean backups. 6) Document — prepare incident report. CISO Consulting offers 24/7 incident response support.
في حالة الحوادث: 1) العزل الفوري 2) التقييم 3) الإخطار (ساما خلال 72 ساعة للحوادث الحرجة) 4) الاستئصال 5) الاسترداد 6) التوثيق
🏷 incident,response,containment,cyber,attack
🔒
Can we transfer personal data outside Saudi Arabia under PDPL?
هل يمكن نقل البيانات الشخصية خارج المملكة في ظل PDPL؟
PDPL
Under PDPL, cross-border data transfer to other countries is restricted. The transfer is only allowed if: (1) the destination country has adequate data protection laws, (2) SDAIA approval is obtained, (3) the transfer is necessary for contractual obligations, or (4) explicit consent is given. Saudi government data must remain in-country.
يقيد نظام PDPL نقل البيانات الشخصية خارج المملكة. يُسمح بالنقل فقط إذا كانت الدولة المستقبِلة توفر حماية مناسبة أو بعد الحصول على موافقة SDAIA أو بموافقة صريحة من صاحب البيانات.
🏷 pdpl,transfer,cross-border,international,abroad
📋
What are the cloud security requirements in Saudi Arabia?
ما هي متطلبات أمن السحابة في المملكة؟
Cloud
Saudi Arabia has specific cloud security requirements: (1) NCA CSCC - Cloud Cybersecurity Controls for government entities, (2) SAMA Cloud Requirements for banking sector, (3) CITC cloud regulations for telecom, (4) Government data must be stored in Saudi-based data centers or approved cloud regions, (5) CSPs must be NCA-certified. Major approved providers include AWS, Azure, Google Cloud, Oracle (all with Saudi regions).
متطلبات أمن السحابة في السعودية تشمل: ضوابط NCA CSCC للجهات الحكومية، متطلبات SAMA للبنوك، لوائح CITC للاتصالات. يجب تخزين البيانات الحكومية في مراكز بيانات سعودية أو مناطق سحابية معتمدة.
🏷 cloud,security,saudi,cscc,nca,data center,residency
📋
How long does ISO 27001 certification take?
كم يستغرق الحصول على شهادة ISO 27001؟
Iso27001
ISO 27001 certification timeline typically takes 6-18 months depending on organization size and complexity. Key phases: (1) Gap assessment - 1-2 months, (2) ISMS design & documentation - 2-4 months, (3) Implementation & evidence gathering - 3-6 months, (4) Internal audit - 1 month, (5) Stage 1 audit (document review) - 1-2 weeks, (6) Stage 2 audit (certification) - 1-3 days. Surveillance audits annually; recertification every 3 years.
يستغرق الحصول على شهادة ISO 27001 عادةً من 6 إلى 18 شهراً. المراحل الرئيسية: تقييم الفجوات، تصميم ISMS، التنفيذ، التدقيق الداخلي، ومرحلتا التدقيق الخارجي.
🏷 iso27001,certification,timeline,how long,process
📋
What are the Annex A controls in ISO 27001:2022?
ما هي ضوابط الملحق A في ISO 27001:2022؟
Iso27001
ISO 27001:2022 Annex A has 93 controls across 4 categories: (A.5) Organizational controls - 37 controls, (A.6) People controls - 8 controls, (A.7) Physical controls - 14 controls, (A.8) Technological controls - 34 controls. New in 2022: Threat intelligence, cloud security, data masking, data leakage prevention, secure coding, and ICT readiness for business continuity.
يحتوي الملحق A في ISO 27001:2022 على 93 ضابطاً في 4 فئات: الضوابط التنظيمية (37)، ضوابط الأفراد (8)، الضوابط المادية (14)، والضوابط التكنولوجية (34).
🏷 iso27001,annex,controls,93,categories,2022
📋
How to identify phishing emails?
كيف تتعرف على رسائل التصيد الإلكتروني؟
Awareness
Signs of phishing emails: (1) Urgent/threatening language - "Your account will be suspended", (2) Generic greetings - "Dear Customer", (3) Suspicious sender domain - support@paypa1.com, (4) Hover over links - check actual URL differs from display, (5) Unexpected attachments, (6) Requests for sensitive information via email, (7) Poor grammar/spelling, (8) Unusual requests from "known" senders. Always verify directly with the organization.
علامات رسائل التصيد: (1) لغة عاجلة أو تهديدية، (2) تحية عامة غير شخصية، (3) نطاق مرسل مشبوه، (4) روابط تختلف عن عرضها، (5) مرفقات غير متوقعة، (6) طلبات معلومات حساسة. تحقق دائماً مباشرة من المصدر.
🏷 phishing,email,identify,signs,recognize,awareness
📋
What is Zero Trust Architecture?
ما هو مفهوم Zero Trust في الأمن السيبراني؟
Framework
Zero Trust is a security framework based on "Never trust, always verify." Core principles: (1) Verify every user and device, regardless of location, (2) Least privilege access - grant minimum permissions needed, (3) Assume breach - segment networks, monitor continuously, (4) Microsegmentation, (5) Strong identity verification (MFA, PAM). Key technologies: IAM, MFA, PAM, network segmentation, SASE, UEBA. NIST SP 800-207 provides the Zero Trust architecture guidelines.
Zero Trust هو إطار أمني مبني على "لا ثقة دائماً، تحقق دائماً". المبادئ الأساسية: التحقق من كل مستخدم وجهاز، مبدأ أقل الصلاحيات، افتراض الاختراق، التجزئة الدقيقة.
🏷 zero trust,architecture,never trust,verify,ztna,sase
📋
What is SWIFT CSP and who needs to comply?
ما هو برنامج SWIFT CSP ومن يجب الامتثال له؟
Framework
SWIFT Customer Security Programme (CSP) is a mandatory security framework for all SWIFT users. It has 3 mandatory baselines: (1) Secure your environment - restrict internet access, update software, (2) Know and limit access - authentication, privilege management, (3) Detect and respond - anomaly detection, incident response. Annual self-attestation is required via KYC-SA. Saudi banks must comply under both SWIFT CSP and SAMA CSF.
برنامج SWIFT CSP إلزامي لجميع مستخدمي SWIFT. يشمل 3 ركائز: تأمين البيئة، إدارة الوصول، والكشف والاستجابة. يجب على البنوك السعودية الامتثال له بالإضافة إلى SAMA CSF.
🏷 swift,csp,customer security,programme,banking,mandatory
📋
What is the difference between RTO and RPO?
ما الفرق بين RTO و RPO في استمرارية الأعمال؟
Bcp
RTO (Recovery Time Objective) is the maximum acceptable downtime - how long can the business survive without the system? RPO (Recovery Point Objective) is the maximum acceptable data loss - how old can the recovery data be? Example: RTO=4 hours means systems must be restored within 4 hours; RPO=1 hour means we cannot lose more than 1 hour of data. Both are determined by Business Impact Analysis (BIA).
RTO (هدف وقت الاسترداد): أقصى وقت مقبول للتوقف عن العمل. RPO (هدف نقطة الاسترداد): أقصى قدر مقبول من فقدان البيانات. يتم تحديدهما من خلال تحليل أثر الأعمال (BIA).
🏷 bcp,rto,rpo,recovery,business continuity,disaster
📋
How should we classify data?
كيف نصنف البيانات في المؤسسة؟
Data
Standard data classification levels: (1) Public - freely shareable, no restrictions, (2) Internal - for employees only, not for public, (3) Confidential - sensitive business data, limited access, (4) Restricted/Secret - highest protection, minimal access (financial records, personal data, intellectual property). PDPL requires special treatment for sensitive personal data including health, financial, biometric, criminal, religious information. Implement DLP tools to enforce classification.
مستويات تصنيف البيانات: (1) عام - قابل للمشاركة الحرة، (2) داخلي - للموظفين فقط، (3) سري - بيانات أعمال حساسة، (4) مقيد - أعلى مستوى حماية (سجلات مالية، بيانات شخصية). يتطلب PDPL معالجة خاصة للبيانات الشخصية الحساسة.
🏷 data classification,public,internal,confidential,restricted,dlp
📋
What pricing packages does CISO Consulting offer?
ما هي باقات أسعار CISO Consulting؟
Ciso
CISO Consulting offers flexible pricing to suit organizations of all sizes. Contact us for customized pricing based on your organization size and specific requirements. We offer: (1) Starter - for SMEs, core GRC features, (2) Professional - full GRC suite + vCISO advisory, (3) Enterprise - unlimited users, full AI + SOC integration, white-label option. All plans include Arabic language support, Saudi frameworks (SAMA/NCA/PDPL), and local compliance expertise. Request a demo for a tailored quote.
تقدم CISO Consulting أسعاراً مرنة تناسب جميع أحجام المؤسسات. تواصل معنا للحصول على سعر مخصص بناءً على احتياجاتك. تشمل جميع الباقات دعم اللغة العربية وأطر العمل السعودية.
🏷 pricing,cost,packages,plans,how much
🔒
What are data subject rights under PDPL?
ما هي حقوق أصحاب البيانات في نظام PDPL؟
PDPL
Under Saudi PDPL, individuals have: 1) Right to be informed about data collection. 2) Right to access their data. 3) Right to correction of inaccurate data. 4) Right to request data destruction. 5) Right to withdraw consent. 6) Right to object to processing. Requests must be responded to within 30 days.
حقوق أصحاب البيانات تشمل: الإعلام، الوصول، التصحيح، الطلب بالحذف، سحب الموافقة، والاعتراض على المعالجة.
🏷 pdpl,rights,access,deletion,consent
📋
What are the Annex A controls in ISO 27001?
ما هي ضوابط الملحق A في ISO 27001؟
Iso
ISO 27001:2022 Annex A has 4 categories and 93 controls: Organizational (37 controls), People (8 controls), Physical (14 controls), and Technological (34 controls). Key areas include access control, cryptography, physical security, incident management, supplier relationships, and business continuity.
الملحق A لمعيار 2022:27001 يحتوي على 93 ضابطاً في 4 فئات: تنظيمية، أفراد، جسدية، وتكنولوجية.
🏷 iso,27001,annex,controls,categories
📋
Do you offer SOC services?
هل تقدمون خدمات مركز عمليات الأمن؟
Services
Yes, CISO Consulting offers managed SOC (Security Operations Center) services. Our SOC provides 24/7 monitoring, threat detection, incident response, log management (SIEM), and compliance reporting. We support integration with leading SIEM platforms including Microsoft Sentinel, Splunk, and IBM QRadar.
نعم، نقدم خدمات مركز عمليات الأمن المُدار. يوفر مركز العمليات مراقبة 24/7 وكشف التهديدات والاستجابة للحوادث وإدارة السجلات.
🏷 soc,security operations,monitoring,siem,24/7
📋
How is CISO Consulting priced?
ما هو نظام التسعير لـ CISO Consulting؟
Contact
CISO Consulting pricing is customized based on organization size, scope of services, and regulatory requirements. We offer flexible engagement models: project-based, monthly retainer, or annual subscription. Contact us for a tailored quote aligned with your specific needs and budget.
يتم تخصيص أسعار CISO Consulting بناءً على حجم المنظمة ونطاق الخدمات والمتطلبات التنظيمية. نقدم نماذج مشاركة مرنة: مشروع، احتجاز شهري، أو اشتراك سنوي.
🏷 pricing,cost,quote,subscription,budget
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.