corecyber.sa
Open in
urlscan Pro
185.206.134.157
Public Scan
Submitted URL: https://corecyber-sa.co/
Effective URL: https://corecyber.sa/
Submission: On November 01 via api from US — Scanned from NL
Effective URL: https://corecyber.sa/
Submission: On November 01 via api from US — Scanned from NL
Form analysis
1 forms found in the DOMhttps://web.whatsapp.com/send
<form action="https://web.whatsapp.com/send" target="_blank" class="whatsapp-chaty-form-0 whatsapp-chaty-form " data-widget="0" data-channel="Whatsapp">
<div class="chaty-whatsapp-data">
<div class="chaty-whatsapp-field"><label for="csass-whatsapp-label-0" class="hide-cht-svg-bg">WhatsApp Message</label><input name="text" type="text" class="csass-whatsapp-input" id="csass-whatsapp-label-0"></div>
<div class="chaty-whatsapp-button"><button type="submit"><span class="hide-cht-svg-bg">undefined</span><svg aria-hidden="true" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24" height="24">
<path fill="#ffffff" d="M1.101 21.757L23.8 12.028 1.101 2.3l.011 7.912 13.623 1.816-13.623 1.817-.011 7.912z"></path>
</svg></button></div>
</div><input type="hidden" name="phone" value="966554772127">
</form>
Text Content
* Location * Contact Have Any Questions? Call Now +966-55-4772127 * Home * About Us * About Us * Our Team * Services * Cyber Security GRC and Regulatory Compliance * Cyber Security Audit and Risk Assurance * Vulnerability and Threat Assessment * Business Continuity Consulting * CISO as a Service * Cyber Security Skill Outsourcing * Training * Become Cyber Security Professional * Become a CISO * Cyber Security Awareness Training * Cyber Risk Training for Top Management * Blogs Get Consult Get a free consultation Cyber Security Experts Protect your organization against cyber threats by ensuring the appropriate security controls are in place. Corecyber Our Services 01 EASY TO START Start with Cyber security gap assessment as per business and industry, and then guide your teams on the best way forward. 02 EASY TO IMPLEMENT Handhold your teams, Develop Policy, procedures, suggest technical solutions for implementation of cyber security controls easily, efficiently and economically. 03 EASY TO COMPLY We provide assurance that data, privacy, cyber security controls are in compliance to business risks and as per SAMA, NCA, NDMO regulator guidelines. Our Expertise SOLUTIONS FOR BUSINESS RISKS CYBER SECURITY GRC AND REGULATORY COMPLIANCE Oversee to deliver cyber security implementation, business continuity, data privacy goals as per SAMA, NCA, NDMO regulations. Learn More CYBER SECURITY AUDIT AND RISK ASSURANCE Conducting IS, Cyber, Application, Data Privacy Assessments through qualified CISA, CISM, CDPSE auditors and provide technical, management and procedural recommendations. Learn More VULNERABILITY AND THREAT ASSESSMENT Threat Assessment (VAPT) of Online portals, Website, Mobile Apps, API, Source code review, Red Teaming to make your solutions hack proof as per OWASP industry standards. Learn More BUSINESS CONTINUITY CONSULTING Design and assess Business Continuity Management (BCM), BCP and DR, Cyber Security Resilience (CRFR) solutions to reduce impact on business operations due to unexpected disruptions. Learn More CISO AS A SERVICE Chief Information Security Officer CISO (Saudi National) is available 30 days a month virtually or onsite to lead, oversee the cyber security gap implementation and build a secure culture of IS operations. Learn More CYBER SECURITY SKILL OUTSOURCING Filling the interim or long term requirements of Incident Manager Analyst, Cloud Administrator, VAPT resources, SOC and SIEM analyst we cover the manpower availability gaps. Learn More DETECT AND PROTECT FROM THREATS Regular monitoring and detection of cyber threats enables secure business operation and to deliver value for business. Get Consult Big Name Customers WHY CUSTOMERS CHOOSE US SERVICES BEYOND YOUR EXPECTATIONS A team that brings experience, commitment and professionalism to stand by management expectations with aligned cyber security goals. EXPERIENCE THAT COUNTS Our CISA, CISM, CDPSE, ISO, Risk consultants have more than 10+ years experience in successful completion of cyber security projects in KSA. MOST ACCEPTABLE INVESTMENTS Our belief that customers have a right to get quality services at value for money rates. We ensure there is a good mutual fit to agree on service models. How we helped customers FROM CASE STUDIES * CISO servicesAlrajhi Takaful * Vulnerability AssessmentMarketing Research company * Cyber GovernanceStellar Informatics, India * Breach of user accessExports company INDUSTRY WE SERVE GOVERNMENT INSURANCE BANKING SERVICES ITES MFG AND TRADING Testimonial WHAT THEY SAY ABOUT US * The consultant did a great job in creating Business Impact Analysis (BIA), Business Continuity framework and support organization in reaching Cyber Security Level 3 as per SAMA. Amar Kumar CGO, Alrajhi Takaful * Our CISO consultant helped in creating Cyber Security Governance structure, Policies, conducted Risk Assessments and filled self assessment requirements as per SAMA Cyber Security frameworks CSF. A committed and mature leader. Confidential Head Compliance Even more secured EMPOWER YOURSELF Know your posture on cyber security to take proactive actions in time with the help of cyber professionals. BUILD ROBUST CYBER SECURITY Manage internal and external threats, data leakages, misuse and reduce impact on business. TEAM THAT MATTERS Focus on your business. Leave cyber security management to us to lead and guide your IT team as needed. Cyber Security in KSA RECENT NEWS * Blog, Cyber Attack News, TechnologyMarch 5, 2023 FORBES CYBER SECURITY TRENDS 2023 Byadmin View All News TAKE THE FIRST STEP. ALLOW US TO PLAN AND DELIVER. Get Consult CORECYBER For solutions to all your Cyber Security needs. ABOUT US * About Us * Blogs * Training * Contact Us * Privacy Policy RIYADH Email Info@corecyber.sa Phone +966-55-4772127 ADDITIONAL LINKS Cyber and IS Audit Risk Assessment Cyber Security Implementation Application VAPT Network VAPT Source Code Review Privacy Risk and Compliance Cloud Security Assurance AI/ML Security Assessment Policies and Procedures Development Hire Technical Skills CISA, CISM, CRISC, CDPSE Training ©2023 Corecyber We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok Contact us Hide WhatsApp Form How can I help you? :) WhatsApp Message undefined 1 / 1 * Facebook * Twitter * Pinterest * Home * About Us * About Us * Our Team * Services * Cyber Security GRC and Regulatory Compliance * Cyber Security Audit and Risk Assurance * Vulnerability and Threat Assessment * Business Continuity Consulting * CISO as a Service * Cyber Security Skill Outsourcing * Training * Become Cyber Security Professional * Become a CISO * Cyber Security Awareness Training * Cyber Risk Training for Top Management * Blogs