Overview








Advisory & Transformation
- Cyber Maturity Assessments
- Develop Strategy & Roadmap
- Governance & Operating Model
- Cyber Risk Governance
- Information Security Policy and Processes
- Cybersecurity Architecture Blueprints and Implementation Assistance

Technical Security Testing
- Advance Ethical Hacking and Penetration Testing
- Compromise Assessment
- Application Security Testing
- Social Engineering Testing
- Network Penetration Testing
- Wireless Penetration Testing
- Source Code Review
- API Security Testing
- Technical Configuration Reviews

Incident Response & Investigations

- Hunt for Active Attacks
- Stop a Breach and Perform Analysis
- Execute Crisis Management
- Recover Business Operations
- Response Readiness Assessment
- Post Incident Root Cause Analysis
Regulatory
- Cybersecurity Framework (CSF)- SAMA
- Essential Cybersecurity Controls – NCA ECC
- Members Technical Requirements Tadawul
- Business Continuity Management (BCM) framework – SAMA
- Cybersecurity guidelines for Capital Market Institutions- CMA
- Cybersecurity Regulatory Framework (CRF) – CITC
- National Data Governance Interim Regulations – NDMO

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Optio, neque qui velit. Magni dolorum quidem ipsam eligendi, totam, facilis laudantium cum accusamus ullam voluptatibus commodi numquam, error, est. Ea, consequatur.
Lorem ipsum dolor sit amet, consectetur adipisicing elit. Optio, neque qui velit. Magni dolorum quidem ipsam eligendi, totam, facilis laudantium cum accusamus ullam voluptatibus commodi numquam, error, est. Ea, consequatur. Lorem ipsum dolor sit amet, consectetur adipisicing elit. Optio, neque qui velit.
Lorem ipsum dolor sit amet, consectetur adipisicing elit. Optio, neque qui velit. Magni dolorum quidem ipsam eligendi, totam, facilis laudantium cum accusamus ullam
Overview








Advisory & Transformation
- Cyber Maturity Assessments
- Develop Strategy & Roadmap
- Governance & Operating Model
- Cyber Risk Governance
- Information Security Policy and Processes
- Cybersecurity Architecture Blueprints and Implementation Assistance

Technical Security Testing
- Advance Ethical Hacking and Penetration Testing
- Compromise Assessment
- Application Security Testing
- Social Engineering Testing
- Network Penetration Testing
- Wireless Penetration Testing
- Source Code Review
- API Security Testing
- Technical Configuration Reviews

Incident Response & Investigations

- Hunt for Active Attacks
- Stop a Breach and Perform Analysis
- Execute Crisis Management
- Recover Business Operations
- Response Readiness Assessment
- Post Incident Root Cause Analysis
Regulatory
- Cybersecurity Framework (CSF)- SAMA
- Essential Cybersecurity Controls – NCA ECC
- Members Technical Requirements Tadawul
- Business Continuity Management (BCM) framework – SAMA
- Cybersecurity guidelines for Capital Market Institutions- CMA
- Cybersecurity Regulatory Framework (CRF) – CITC
- National Data Governance Interim Regulations – NDMO

Lorem ipsum dolor sit amet, consectetur adipisicing elit. Optio, neque qui velit. Magni dolorum quidem ipsam eligendi, totam, facilis laudantium cum accusamus ullam voluptatibus commodi numquam, error, est. Ea, consequatur.
Lorem ipsum dolor sit amet, consectetur adipisicing elit. Optio, neque qui velit. Magni dolorum quidem ipsam eligendi, totam, facilis laudantium cum accusamus ullam voluptatibus commodi numquam, error, est. Ea, consequatur. Lorem ipsum dolor sit amet, consectetur adipisicing elit. Optio, neque qui velit.
Lorem ipsum dolor sit amet, consectetur adipisicing elit. Optio, neque qui velit. Magni dolorum quidem ipsam eligendi, totam, facilis laudantium cum accusamus ullam
- Internal Audit
- Enterprise risk management
- Cybersecurity
- Audit & Assurance
- Zakat & Tax
- Business Continuity Management
- Fixed Asset Management
- Financial & Business Advisory
Global expertise with local faces

We have great
achievements to show
250+
350+
17+
9000+
80+
100+
100+
17+
Why Choose Ecovis




