Webinar Detail Edit Content

ISO27701 Roadmap Webinar

ISO27701 Roadmap Webinar

In this webinar, iExperts Privacy subject matter expert will discuss the below:

  • - The road map for implementing the PIMS (Privacy information management system).
  • - The relationship between ISO 27001 and ISO 27701 parts.
  • - Discover the ISO 27701 PIMS Compliance journey.
Reading in CBE Regulations for Digital Banks 2023

Reading in CBE Regulations for Digital Banks 2023

Join our webinar to gain valuable insights into the regulatory framework governing digital banking. 

Our expert speaker will provide a comprehensive overview of the Central Bank of Egypt's regulations, ensuring you stay informed and compliant in the rapidly evolving digital banking landscape. 

Don't miss this opportunity to enhance your understanding and navigate the complexities of digital banking regulations.

Business Continuity & Disaster Recovery Webinar

Business Continuity & Disaster Recovery Webinar

- "BCP/DR is now a critical part of running a business but very few people really understand what it is and how it can be implemented. 

In this webinar, Paul Taylor, explains what it is? and what needs to be done to implement it successfully?"

Bug Bounty Methodology and Penetration Testing Webinar

Bug Bounty Methodology and Penetration Testing Webinar

- How can I do penetration testing or Bug Hunting and get acknowledgments and Bounties from big Companies like Hackerone, BugCrowd, Google, Apple, Microsoft, etc?

- What methodology should you follow to find Vulnerabilities which can be paid?

This is what we will discuss in this Session.

PCI DSS Compliant RoadMap Webinar

PCI DSS Compliant RoadMap Webinar

Exploring the steps of the PCIDSS Project is extremely important before taking the decision to certify your organization, application, or platform with PCI DSS Certification.

In this webinar we will discuss the steps of the PCI DSS implementation and audit until being compliant and certified.

Then we will discuss how to maintain your compliance in an effective and efficient way. 


Web Application Penetration Testing Webinar

Web Application Penetration Testing Webinar

Let me ask you a question ? How attackers hack different websites ? How they take over a Website or try to find various vulnerabilities in any kind of Web Application to try to exploit them or maybe damage the Website by using a specific malicious exploit ?

This will be our Topic today. We will discuss different Web Application Vulnerabilities which can let an attacker interact with your Web Application and try doing malicious things like running Javascript on your Website or damaging the Reputation of your Company.

ISO 27002 What's New?

ISO 27002 What's New?

ISO 27002 What's New? 

- ISO 27002:2022 a new update for the ISMS controls has been made a few days ago!

-We will discuss in this webinar the new updates in ISO 27002:2022 and how it will reflect on the compliance status and the new implementations in organizations.

Let’s see:

1- The new controls

2- The updates controls

3- The new sections

4- What is the reflections on the ISO 27001 ISMS


Cyber Security GRC Program Q&A Interview in Arabic

Cyber Security GRC Program Q&A Interview in Arabic

iExperts "Cyber Security GRC program Q&A Interview" discusses the meaning of GRC and it’s importance. 

Also, It Clarifies how GRC intersects with Cyber Security. In Addition to the new approach of the GRC and the Importance of GRC tools.


Big Data, AI, IoT and Cyber-Security- Pragmatic hints and tips webinar

Big Data, AI, IoT and Cyber-Security- Pragmatic hints and tips webinar

While all emerging technologies offer benefits, they are unfortunately complex to implement and operate on a day-to-day basis.

One of the biggest challenges relates to Cyber-Security. There are a host of high profile failures.

This webinar will outline some of the main challenges and offer some pragmatic solutions on how they can be addressed.
Watch the webinar ....

CSA Star Level Two Webinar

CSA Star Level Two Webinar

In this webinar we will discuss the CSA STAR level 2 certification and how to achieve this certification by implementing the CCM Cloud Control Matrix v4.0 

-The webinar will discuss the program developed by the Cloud Security Alliance to get STAR ⭐️ (Security, Trust, Assurance and Risk) Certification level 1 & 2.

How PCI Compliance Becomes Business-Enabling Webinar

How PCI Compliance Becomes Business-Enabling Webinar

- In this Webinar we're diving into the world of PCI compliance—a crucial aspect of modern business operations. While often seen as a regulatory hurdle, PCI compliance offers far-reaching benefits beyond mere adherence to standards. 

- This webinar will explore how PCI compliance not only fortifies security measures but also serves as a catalyst for business growth and customer trust. also will elaborate on how PCI-DSS v4.0 has several changes aimed at better serving the objective of enhancing security and business operations.

دليل شامل لتقرير مراجعة (SOC2) و أثره علي حماية البيانات

دليل شامل لتقرير مراجعة (SOC2) و أثره علي حماية البيانات


- سوف يدور هذا الويبينار حول تقرير تدقيق SOC 2 وأهميته في تعزيز الأمان وحماية البيانات في المؤسسات.
سيتناول ايضاً المراحل الأساسية لعملية التدقيق، كيفية الاستعداد له، وأفضل الممارسات لضمان الامتثال للمعايير الدولية. 👌
كما سيقدم لكم رؤى قيمة حول التحديات التي قد تواجهها الشركات أثناء التدقيق وسبل التغلب عليها، بالإضافة إلى أهمية تقرير SOC 2 في بناء الثقة مع العملاء والمستفيدين ✅

Streamlining GRC: Insights for Practical Project Management

Streamlining GRC: Insights for Practical Project Management

Effective project management is no longer just about timelines and deliverables—it’s about ensuring your projects align with governance, risk, and compliance (GRC) requirements.

In this session, our Projects Manager will walk you through practical strategies for integrating GRC into project management processes. You’ll learn how to:
✅ Align projects with organizational compliance and governance standards.
✅ Identify and mitigate risks early in project lifecycles.
✅ Streamline workflows to improve efficiency without compromising security and compliance.

Whether you’re managing IT, cybersecurity, or business projects, this webinar will equip you with real-world insights to manage projects more effectively in today’s risk-aware environment.

Mastering ISO27001 From Framework to Certification

Mastering ISO27001 From Framework to Certification

Discover how ISO/IEC 27001 helps organizations establish a robust Information Security Management System (ISMS).
This webinar will cover its key components, implementation steps, challenges, and benefits, along with a detailed overview of the certification process to help you achieve compliance effectively. 👌

Webinar Agenda:
- What is ISO/IEC 27001
- Key components of ISO/IEC 27001
- Implementation steps
- Benefits & Challenges
- Certification Process Overview
- Q&A and Closing


لماذا يطلب البنك المركزي المصري تقرير SOC2 ?

لماذا يطلب البنك المركزي المصري تقرير SOC2 ?

سوف نناقش في هذا الويبينار أهمية تقرير SOC 2؟
ولماذا يشترطه البنك المركزي المصري؟
سنناقش ايضاً دوره في تعزيز أمن البيانات، الامتثال للمعايير، وحماية المؤسسات من المخاطر السيبرانية.👌
لا تفوت هذه الفرصة لفهم متطلبات التقرير وتأثيره على الشركات في القطاع المالي!

Know your enemy: Using MITRE ATTACK to predict and prevent attacks

Know your enemy: Using MITRE ATTACK to predict and prevent attacks

In today’s evolving threat landscape, understanding adversary tactics is crucial for effective cybersecurity defense.
This webinar will provide an in-depth look at the MITRE ATT&CK framework and how organizations can use it to analyze threats, predict attacker behavior, and enhance security strategies.

Join us to learn practical approaches for leveraging MITRE ATT&CK in threat intelligence, incident response, and proactive defense planning to stay one step ahead of cyber threats.

Privacy & Data Protection: Navigating Global Regulations (GDPR, NCA & More)

Privacy & Data Protection: Navigating Global Regulations (GDPR, NCA & More)

In today’s rapidly evolving regulatory landscape, organizations must stay ahead of global privacy and data protection laws such as GDPR, NCA, and more.

This webinar will explore key compliance requirements, challenges, and best practices to ensure data security and regulatory adherence.

Join us to gain expert insights on safeguarding sensitive information and maintaining compliance in an ever-changing legal environment👌👌

PCI DSS vs PCI 3DS implementation Tips and Tricks

PCI DSS vs PCI 3DS implementation Tips and Tricks

Join us for an insightful webinar on the implementation of PCI DSS (Payment Card Industry Data Security Standard) and PCI 3DS (Three-Domain Secure), two essential frameworks for securing payment transactions and protecting sensitive cardholder data. This session will provide a comprehensive overview of PCI DSS requirements, including network security, vulnerability management, access controls, and compliance validation. Additionally, we will explore how PCI 3DS enhances online payment authentication, reducing fraud risks while ensuring a seamless customer experience.

Our expert speaker will discuss the latest updates in PCI compliance, common implementation challenges, and best practices for maintaining security across payment environments. You’ll gain valuable insights into the evolving regulatory landscape, the impact of PCI DSS v4.0.1, and strategies to achieve continuous compliance. Whether you’re a merchant, payment processor, or IT security professional, this webinar will equip you with the knowledge and tools needed to strengthen your payment security framework.

Repetition is the mother of skill, Consistency is the father of Confidence

Repetition is the mother of skill, Consistency is the father of Confidence

In an industry where knowledge is vast, tools evolve rapidly, and the pressure to “know everything” can be overwhelming, this presentation offers a grounded, human approach to growth in cybersecurity.

Through a blend of personal stories a powerful truth will be illustrated: that to build your career you do not need to rely on talent; you simply need to show up, repeat the right habits, and stay consistent.

This session is designed for:
- Beginners feeling overwhelmed by the sheer breadth of cybersecurity
- Mid-career professionals looking to break through to the next level
- Anyone struggling with imposter syndrome or inconsistency

Key Themes Covered:
- The difference between skill and confidence—and how to build both
- How cybersecurity careers evolve (from analyst to strategist)
- A practical approach to daily learning and skill-building
- Real-world stories that reinforce mindset and discipline
- A personal challenge to help you put the ideas into action