• FlagEnglish
    FlagFrançais
    Flagالعربية
    FlagDutch
    FlagEnglish

التخطيط الاستراتيجي للتحول الرقمي الأهمية و الأثر

في عصر يزداد فيه الاعتماد على التقنيات الرقمية، يصبح التحول الرقمي عنصرًا محوريًا لنجاح المؤسسات.
يسرنا أن يستضيف هذا الحدث م. أشرف الطروانة، خبير متميّز في مجالي التحول الرقمي والتخطيط الاستراتيجي، يتمتع بخبرة واسعة في إدارة الابتكار وحوكمة تقنية المعلومات، حيث ساهم في صياغة استراتيجيات واعدة لمؤسسات عدة.

🔹 محاور الجلسة:
- ما هي أهمية التخطيط الاستراتيجي في التحول الرقمي؟
- كيف نربط بين الأهداف المؤسسية والتحول الرقمي بفعالية؟
- التحديات المشتركة وكيفية التغلب عليها
- أثر التحول الرقمي على الكفاءة، الإنتاجية، والابتكار
- خطوات عملية لتطبيق استراتيجية التحول الرقمي
Governing AI Responsibly: A Practical Guide to ISO/IEC 42001 14
Jan

Governing AI Responsibly: A Practical Guide to ISO/IEC 42001

As artificial intelligence becomes deeply embedded in business operations, organizations must ensure that AI systems are governed responsibly, transparently, and in line with emerging regulatory and ethical expectations. This webinar provides a practical introduction to ISO/IEC 42001, the international standard for Artificial Intelligence Management Systems (AIMS). The session will focus on how organizations can structure AI governance, manage AI-related risks, and establish controls that support trustworthy and compliant AI use. Key topics include: - Why AI governance is critical for modern organizations - Overview of ISO/IEC 42001 and its core requirements - AI risk management and governance controls - Roles, responsibilities, and accountability in AI systems - Practical steps toward implementing an AI Management System (AIMS) 🎯 Who should attend: CISOs, risk and compliance professionals, IT managers, data and AI leaders, auditors, and decision-makers involved in AI adoption and governance.

Read More
Penetration Testing Beyond Compliance: Finding Real Risk 07
Jan

Penetration Testing Beyond Compliance: Finding Real Risk

Penetration testing is often treated as a compliance requirement — but real security goes much deeper. In this session, we will explore how penetration testing can be used as a strategic security tool to identify real attack paths, prioritize risk, and strengthen defensive controls. The webinar will focus on practical insights drawn from real-world engagements, highlighting the difference between compliance-driven testing and risk-driven testing. Key topics include: - Compliance vs. real-world penetration testing - Identifying exploitable vulnerabilities and attack chains - Translating technical findings into business risk - Common misconceptions about penetration testing - Using test results to improve security posture 🎯 Who should attend: CISOs, IT managers, security professionals, auditors, and anyone responsible for protecting organizational assets.

Read More