• FlagEnglish
    FlagFrançais
    Flagالعربية
    FlagDutch
    FlagEnglish

Cybersecurity Effectiveness Management

In this session, our speaker "Mohamed Atef" a cybersecurity leader with over 20 years of experience across IT, OT (ICS/SCADA), and AI systems will explore how to define, track, and interpret Key Performance Indicators (KPIs) that reflect real security maturity and drive continuous improvement.

🔹 Key Takeaways:

- The importance of measuring cybersecurity effectiveness
- How to identify and define the right KPIs for your organization
- Linking cybersecurity KPIs to GRC frameworks and business goals
- Practical examples and lessons learned from real-world implementations
- Common pitfalls and how to avoid them

🌟 Whether you’re part of a GRC team, security operations, or leadership, this session will provide actionable insights for enhancing your organization’s cybersecurity management and compliance posture.
Governing AI Responsibly: A Practical Guide to ISO/IEC 42001 14
Jan

Governing AI Responsibly: A Practical Guide to ISO/IEC 42001

As artificial intelligence becomes deeply embedded in business operations, organizations must ensure that AI systems are governed responsibly, transparently, and in line with emerging regulatory and ethical expectations. This webinar provides a practical introduction to ISO/IEC 42001, the international standard for Artificial Intelligence Management Systems (AIMS). The session will focus on how organizations can structure AI governance, manage AI-related risks, and establish controls that support trustworthy and compliant AI use. Key topics include: - Why AI governance is critical for modern organizations - Overview of ISO/IEC 42001 and its core requirements - AI risk management and governance controls - Roles, responsibilities, and accountability in AI systems - Practical steps toward implementing an AI Management System (AIMS) 🎯 Who should attend: CISOs, risk and compliance professionals, IT managers, data and AI leaders, auditors, and decision-makers involved in AI adoption and governance.

Read More
Penetration Testing Beyond Compliance: Finding Real Risk 07
Jan

Penetration Testing Beyond Compliance: Finding Real Risk

Penetration testing is often treated as a compliance requirement — but real security goes much deeper. In this session, we will explore how penetration testing can be used as a strategic security tool to identify real attack paths, prioritize risk, and strengthen defensive controls. The webinar will focus on practical insights drawn from real-world engagements, highlighting the difference between compliance-driven testing and risk-driven testing. Key topics include: - Compliance vs. real-world penetration testing - Identifying exploitable vulnerabilities and attack chains - Translating technical findings into business risk - Common misconceptions about penetration testing - Using test results to improve security posture 🎯 Who should attend: CISOs, IT managers, security professionals, auditors, and anyone responsible for protecting organizational assets.

Read More