SECTOR / 08 Industry

Cybersecurity, NCA-aligned by default.

Managed defence, compliance, and offensive testing for the Kingdom's regulated entities and critical-infrastructure operators. Built around the NCA's ECC-2 framework, SAMA's CSF, and PDPL — with a Saudi-onshore team that can sit inside the SOC, the audit, and the boardroom in the same week.

Frameworks covered
NCA · SAMA · PDPL
SOC posture
24×7in-Kingdom
Median MTTD
< 12minutes
Onshore engineers
Saudi-cleared
الأمنCYBERSECURITY · KSA
STEWARDSNCA · SAMA · SDAIA · NCSC
OPERATING MODELManaged + advisory
POSTUREECC-2 · SAMA CSF · PDPL
WORKFORCESaudization-first
01 / The brief

What cyber actually demands in the Kingdom.

Six pressures we hear from CISOs, NCA programme leads, and regulated-entity boards on every first call.

01 /

NCA ECC-2 enforcement

The Essential Cybersecurity Controls (ECC-2:2024) extend mandatory compliance to all government entities and critical-national-infrastructure operators. Compliance is no longer aspirational — gap analyses, remediation, and recurring assessments are budget line items.

→ ECC-2 across 5 domains
02 /

SAMA CSF velocity

The Saudi Central Bank publishes new circulars on a quarterly cadence — Open Banking, counter-fraud, ESG, AI monitoring — and expects implementation, not interpretation. CSF maturity Level 3 is the floor, not the ceiling.

→ Maturity Level 3+ mandated
03 /

PDPL accountability

The Personal Data Protection Law is fully enforceable. DPO appointments, DPIAs, cross-border transfer controls, and breach notification are now operational — and SDAIA is enforcing them, not just publishing them.

→ DPO · DPIA · SCC live
04 /

OT / ICS convergence

Energy, water, transport, and giga-project facilities are merging IT and operational technology faster than the security models can keep up. OTCC compliance, ICS monitoring, and air-gap-aware defences are scarce on the supply side.

→ OTCC + IEC 62443
05 /

Saudization of the SOC

ECC-2 expects cybersecurity roles to be filled by qualified Saudi nationals. The talent pipeline is real but compressed — operators need partners that can hire, train, and transfer ownership, not just bill an expat bench.

→ Build-to-transfer model
06 /

Sovereign cloud security

National data, classified workloads, and regulated services move into sovereign and in-Kingdom cloud. CCC compliance, zero-trust segmentation, and key-management posture have to be designed in — they cannot be bolted on after migration.

→ NCA CCC · in-Kingdom keys
02 / Service mapping

How our service lines land in cyber.

Six disciplines, sector-tuned around NCA frameworks and the operational shape of a Saudi regulated entity.

03 / Flagship deployments

Where it has actually shipped.

Two engagements that anchor the practice. Names redacted under MNDA — the regulator and the operator know the work.

CASE / 01 · REGULATED FINANCE

SAMA-aligned managed SOC

Tier-1 financial entity · in-Kingdom · multi-year

Co-managed SOC running alongside the bank's existing SIEM, with detection-engineering tuned to SAMA CSF controls and AI-assisted triage cutting analyst load by a meaningful margin. Annual maturity uplift reported into the SAMA portal.

24×7SOC POSTURE
+1.4CSF MATURITY UPLIFT
−42%ANALYST TRIAGE TIME
0P1 BREACHES
CASE / 02 · CRITICAL INFRASTRUCTURE

OT / ICS security uplift

Energy-sector operator · OTCC programme · live

An OTCC-aligned assessment, monitoring fabric, and incident-response retainer for a critical-infrastructure facility. Includes the Saudi-cleared analyst bench, the IEC 62443 architecture, and a knowledge-transfer programme so the operator owns the SOC by year three.

62443ARCHITECTURE
3-yrBUILD-TO-TRANSFER
OTCCCONTROLS COVERED
0OT DOWNTIME
04 / Stewards & posture

Frameworks we operate inside.

NCA ECC-2:2024
NCA CCC
NCA OTCC
NCA CSCC
SAMA CSF
SAMA FEER
PDPL
SDAIA
NDMO Classification
ISO 27001
IEC 62443 (OT)
CREST-aligned
05 / Ecosystem

Who we work alongside.

Authorities, sovereign infrastructure, and the platforms we integrate with across the Kingdom's cyber landscape.

AuthorityNCA
AuthoritySAMA
AuthoritySDAIA · PDPL
AuthorityNDMO
Sovereign Cloudstc cloud
HyperscalerGoogle Dammam
IdentityMicrosoft Entra
DetectionCrowdStrike · Microsoft Sentinel
06 / FAQ

Common questions.

Are you a registered NCA service provider?

Yes — registration on the NCA's Haseen portal is a prerequisite for serving any government entity or CNI operator, and we maintain it as a condition of practice. We can show the registration on first call.

How do you handle Saudization?

Saudization-first. Our cybersecurity engineering bench is built around qualified Saudi professionals, with a structured knowledge-transfer programme on every engagement so the operator's own team owns the controls by the end of the contract.

Do you replace our existing SIEM / SOC?

No. We co-manage and tune what is already in place — Sentinel, QRadar, Splunk, CrowdStrike, or whichever stack is already paid for — and add detection engineering, agentic triage, and 24×7 coverage on top of it.

Where does the data live?

In-Kingdom by default. SOC telemetry, logs, and case data land in sovereign or operator-owned regions, never in foreign-cloud regions. PDPL and NDMO posture is written, not implied, on every contract.

Can you run a FEER red team?

Yes. We run threat-intelligence-led red teams aligned to the SAMA FEER framework, with CREST-aligned methodology and findings written for the audit committee — not just the SOC backlog.

What's the engagement shape?

Multi-year managed engagements with a Saudi-onshore team, plus point advisory programmes (ECC-2 gap analysis, SAMA CSF assessment, PDPL readiness) for entities that prefer to start with a single deliverable.

Cyber is a Saudi software problem.

الأمن السيبراني مسألة برمجية سعودية.

Sixty-minute working session with our cyber lead and a detection-engineering principal. Bring the audit finding, the regulator letter, or the SOC backlog. We'll come back with a one-page operating-model proposal you can take into the executive committee.