Cybersecurity, GRC & SecOps

NCA ECC · SAMA · PDPL · NCA BCM · Aramco CCC

Saudi Arabia operates one of the most demanding cybersecurity regulatory environments in the world. Duroob’s practice is built around helping institutions not only meet these obligations, but operationalise them so compliance becomes a continuous state rather than an annual exercise.

Capabilities

CapabilityWhat Duroob Delivers
Integrated Risk Management (IRM/GRC)Policy and compliance management, risk dashboards, audit management, vendor risk, pre-built control libraries mapped to NCA ECC, SAMA and PDPL.
Vulnerability ResponseEnd-to-end vulnerability lifecycle — scanner integration, risk-based prioritisation, patch orchestration, exception management, executive reporting.
Security Incident Response (SecOps)SOC operating model design, SIEM/SOAR integration, incident playbooks, threat intelligence enrichment, automated containment.
Cybersecurity ArchitectureNetwork and security architecture for high-assurance environments — segmentation, zero-trust, OT/IT convergence, national identity integration.
NCA ECC & SAMA AlignmentGap assessment, remediation roadmaps, ongoing compliance monitoring against NCA ECC and SAMA Cybersecurity Framework.
Business Continuity & DRNCA BCM alignment, DR architecture, RPO/RTO design, warm standby, automated failover testing, crisis runbook authoring.
PDPL Privacy ProgrammePersonal Data Protection Law programme — data classification, processing inventory, lawful basis, data subject rights workflows, breach notification, DPO operating model.

Our Security Products

PAM — Privileged Access Management

Secures, controls and monitors access to sensitive systems by privileged users — system admins, DBAs, and third-party vendors. Enforces least privilege, session recording, credential vaulting and just-in-time access.

Read more →

IAM — Identity and Access Management

Framework for managing digital identities and controlling access to enterprise resources — single sign-on, multi-factor authentication, lifecycle automation, access governance.

Read more →

Scroll to Top