corecyber.sa Open in urlscan Pro
185.206.134.157  Public Scan

Submitted URL: http://corecyber.sa/
Effective URL: https://corecyber.sa/
Submission: On November 07 via manual from SA — Scanned from DE

Form analysis 1 forms found in the DOM

https://web.whatsapp.com/send

<form action="https://web.whatsapp.com/send" target="_blank" class="whatsapp-chaty-form-0 whatsapp-chaty-form " data-widget="0" data-channel="Whatsapp">
  <div class="chaty-whatsapp-data">
    <div class="chaty-whatsapp-field"><label for="csass-whatsapp-label-0" class="hide-cht-svg-bg">WhatsApp Message</label><input name="text" type="text" class="csass-whatsapp-input" id="csass-whatsapp-label-0"></div>
    <div class="chaty-whatsapp-button"><button type="submit"><span class="hide-cht-svg-bg">undefined</span><svg aria-hidden="true" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" width="24" height="24">
          <path fill="#ffffff" d="M1.101 21.757L23.8 12.028 1.101 2.3l.011 7.912 13.623 1.816-13.623 1.817-.011 7.912z"></path>
        </svg></button></div>
  </div><input type="hidden" name="phone" value="966554772127">
</form>

Text Content

 * Location
 * Contact


Have Any Questions?
Call Now +966-55-4772127
 * Home
 * About Us
   * About Us
   * Our Team
 * Services
   * Cyber Security GRC and Regulatory Compliance
   * Cyber Security Audit and Risk Assurance
   * Vulnerability and Threat Assessment
   * Business Continuity Consulting
   * CISO as a Service
   * Cyber Security Skill Outsourcing
 * Training
   * Become Cyber Security Professional
   * Become a CISO
   * Cyber Security Awareness Training
   * Cyber Risk Training for Top Management
 * Blogs



Get Consult
Get a free consultation Cyber Security Experts Protect your organization against
cyber threats by ensuring the appropriate security controls are in place.
Corecyber Our Services

01


EASY TO START

Start with Cyber security gap assessment as per business and industry, and then
guide your teams on the best way forward. 


02


EASY TO IMPLEMENT

Handhold your teams, Develop Policy, procedures, suggest technical solutions for
implementation of cyber security controls easily, efficiently and
economically.  


03


EASY TO COMPLY

We provide assurance that data, privacy, cyber security controls are in
compliance to business risks and as per SAMA, NCA, NDMO regulator guidelines. 


Our Expertise


SOLUTIONS FOR BUSINESS RISKS


CYBER SECURITY GRC AND REGULATORY COMPLIANCE

Oversee to deliver cyber security implementation, business continuity, data
privacy goals as per SAMA, NCA,  NDMO regulations. 

Learn More


CYBER SECURITY AUDIT AND RISK ASSURANCE

Conducting IS, Cyber, Application, Data Privacy Assessments through qualified
CISA, CISM, CDPSE auditors and provide technical, management and procedural
recommendations. 

Learn More


VULNERABILITY AND THREAT ASSESSMENT

Threat Assessment (VAPT) of Online portals, Website, Mobile Apps, API, Source
code review, Red Teaming to make your solutions hack proof as per OWASP industry
standards.

Learn More


BUSINESS CONTINUITY CONSULTING

Design and assess Business Continuity Management (BCM), BCP and DR, Cyber
Security Resilience (CRFR) solutions to reduce impact on business operations due
to unexpected disruptions. 

Learn More


CISO AS A SERVICE

Chief Information Security Officer CISO (Saudi National) is available 30 days a
month virtually or onsite to lead, oversee the cyber security gap implementation
and build a secure culture of IS operations. 

Learn More


CYBER SECURITY SKILL OUTSOURCING

Filling the interim or long term requirements of Incident Manager Analyst, Cloud
Administrator, VAPT resources, SOC and SIEM analyst we cover the manpower
availability gaps.

Learn More



DETECT AND PROTECT FROM THREATS

Regular monitoring and detection of cyber threats enables secure business
operation and to deliver value for business. 

Get Consult

Big Name Customers


WHY CUSTOMERS CHOOSE US

SERVICES BEYOND YOUR EXPECTATIONS

A team that brings experience, commitment and professionalism to stand by
management expectations  with aligned cyber security goals.

EXPERIENCE THAT COUNTS

Our CISA, CISM, CDPSE, ISO, Risk consultants have more than 10+ years experience
in successful completion of cyber security projects in KSA.

MOST ACCEPTABLE INVESTMENTS

Our belief that customers have a right to get quality services at value for
money rates. We ensure there is a good mutual fit to agree on service models. 

How we helped customers


FROM CASE STUDIES

 * CISO servicesAlrajhi Takaful
 * Vulnerability AssessmentMarketing Research company
 * Cyber GovernanceStellar Informatics, India
 * Breach of user accessExports company


INDUSTRY WE SERVE




GOVERNMENT




INSURANCE




BANKING




SERVICES




ITES




MFG AND TRADING


Testimonial


WHAT THEY SAY ABOUT US

 * The consultant did a great job in creating Business Impact Analysis (BIA),
   Business Continuity framework and support organization in reaching Cyber
   Security Level 3 as per SAMA. 
   
   Amar Kumar
   CGO, Alrajhi Takaful

 * Our CISO consultant helped in creating Cyber Security Governance structure,
   Policies, conducted Risk Assessments and filled self assessment requirements
   as per SAMA Cyber Security frameworks CSF. A committed and mature leader.
   
   Confidential
   Head Compliance

Even more secured


EMPOWER YOURSELF

Know your posture on cyber security to take proactive actions in time with the
help of cyber professionals.




BUILD ROBUST CYBER SECURITY

Manage internal and external threats, data leakages, misuse and reduce impact on
business. 




TEAM THAT MATTERS

Focus on your business. Leave cyber security management to us to lead and guide
your IT team as needed.


Cyber Security in KSA


RECENT NEWS

 * Blog, Cyber Attack News, TechnologyMarch 5, 2023
   
   
   FORBES CYBER SECURITY TRENDS 2023
   
   
   Byadmin

View All News


TAKE THE FIRST STEP. ALLOW US TO PLAN AND DELIVER.

Get Consult


CORECYBER

For solutions to all your Cyber Security needs.


ABOUT US

 * About Us
 * Blogs
 * Training
 * Contact Us
 * Privacy Policy


RIYADH

Email
Info@corecyber.sa

Phone
+966-55-4772127


ADDITIONAL LINKS

Cyber and IS Audit

Risk Assessment

Cyber Security Implementation

Application VAPT

Network VAPT

Source Code Review

Privacy Risk and Compliance

Cloud Security Assurance

AI/ML Security Assessment

Policies and Procedures Development

Hire Technical Skills

CISA, CISM, CRISC, CDPSE Training

 

 

©2023 Corecyber
We use cookies to ensure that we give you the best experience on our website. If
you continue to use this site we will assume that you are happy with it.Ok
Contact us

Hide WhatsApp Form

How can I help you? :)

WhatsApp Message
undefined
1 / 1
 * Facebook
 * Twitter
 * Pinterest



 * Home
 * About Us
   * About Us
   * Our Team
 * Services
   * Cyber Security GRC and Regulatory Compliance
   * Cyber Security Audit and Risk Assurance
   * Vulnerability and Threat Assessment
   * Business Continuity Consulting
   * CISO as a Service
   * Cyber Security Skill Outsourcing
 * Training
   * Become Cyber Security Professional
   * Become a CISO
   * Cyber Security Awareness Training
   * Cyber Risk Training for Top Management
 * Blogs