Webinar Detail Edit Content

ISO27701 Roadmap Webinar

ISO27701 Roadmap Webinar

In this webinar, iExperts Privacy subject matter expert will discuss the below:

  • - The road map for implementing the PIMS (Privacy information management system).
  • - The relationship between ISO 27001 and ISO 27701 parts.
  • - Discover the ISO 27701 PIMS Compliance journey.
Reading in CBE Regulations for Digital Banks 2023

Reading in CBE Regulations for Digital Banks 2023

Join our webinar to gain valuable insights into the regulatory framework governing digital banking. 

Our expert speaker will provide a comprehensive overview of the Central Bank of Egypt's regulations, ensuring you stay informed and compliant in the rapidly evolving digital banking landscape. 

Don't miss this opportunity to enhance your understanding and navigate the complexities of digital banking regulations.

Business Continuity & Disaster Recovery Webinar

Business Continuity & Disaster Recovery Webinar

- "BCP/DR is now a critical part of running a business but very few people really understand what it is and how it can be implemented. 

In this webinar, Paul Taylor, explains what it is? and what needs to be done to implement it successfully?"

Bug Bounty Methodology and Penetration Testing Webinar

Bug Bounty Methodology and Penetration Testing Webinar

- How can I do penetration testing or Bug Hunting and get acknowledgments and Bounties from big Companies like Hackerone, BugCrowd, Google, Apple, Microsoft, etc?

- What methodology should you follow to find Vulnerabilities which can be paid?

This is what we will discuss in this Session.

PCI DSS Compliant RoadMap Webinar

PCI DSS Compliant RoadMap Webinar

Exploring the steps of the PCIDSS Project is extremely important before taking the decision to certify your organization, application, or platform with PCI DSS Certification.

In this webinar we will discuss the steps of the PCI DSS implementation and audit until being compliant and certified.

Then we will discuss how to maintain your compliance in an effective and efficient way. 


Web Application Penetration Testing Webinar

Web Application Penetration Testing Webinar

Let me ask you a question ? How attackers hack different websites ? How they take over a Website or try to find various vulnerabilities in any kind of Web Application to try to exploit them or maybe damage the Website by using a specific malicious exploit ?

This will be our Topic today. We will discuss different Web Application Vulnerabilities which can let an attacker interact with your Web Application and try doing malicious things like running Javascript on your Website or damaging the Reputation of your Company.

ISO 27002 What's New?

ISO 27002 What's New?

ISO 27002 What's New? 

- ISO 27002:2022 a new update for the ISMS controls has been made a few days ago!

-We will discuss in this webinar the new updates in ISO 27002:2022 and how it will reflect on the compliance status and the new implementations in organizations.

Let’s see:

1- The new controls

2- The updates controls

3- The new sections

4- What is the reflections on the ISO 27001 ISMS


Cyber Security GRC Program Q&A Interview in Arabic

Cyber Security GRC Program Q&A Interview in Arabic

iExperts "Cyber Security GRC program Q&A Interview" discusses the meaning of GRC and it’s importance. 

Also, It Clarifies how GRC intersects with Cyber Security. In Addition to the new approach of the GRC and the Importance of GRC tools.


Big Data, AI, IoT and Cyber-Security- Pragmatic hints and tips webinar

Big Data, AI, IoT and Cyber-Security- Pragmatic hints and tips webinar

While all emerging technologies offer benefits, they are unfortunately complex to implement and operate on a day-to-day basis.

One of the biggest challenges relates to Cyber-Security. There are a host of high profile failures.

This webinar will outline some of the main challenges and offer some pragmatic solutions on how they can be addressed.
Watch the webinar ....

CSA Star Level Two Webinar

CSA Star Level Two Webinar

In this webinar we will discuss the CSA STAR level 2 certification and how to achieve this certification by implementing the CCM Cloud Control Matrix v4.0 

-The webinar will discuss the program developed by the Cloud Security Alliance to get STAR ⭐️ (Security, Trust, Assurance and Risk) Certification level 1 & 2.

How PCI Compliance Becomes Business-Enabling Webinar

How PCI Compliance Becomes Business-Enabling Webinar

- In this Webinar we're diving into the world of PCI compliance—a crucial aspect of modern business operations. While often seen as a regulatory hurdle, PCI compliance offers far-reaching benefits beyond mere adherence to standards. 

- This webinar will explore how PCI compliance not only fortifies security measures but also serves as a catalyst for business growth and customer trust. also will elaborate on how PCI-DSS v4.0 has several changes aimed at better serving the objective of enhancing security and business operations.

دليل شامل لتقرير مراجعة (SOC2) و أثره علي حماية البيانات

دليل شامل لتقرير مراجعة (SOC2) و أثره علي حماية البيانات


- سوف يدور هذا الويبينار حول تقرير تدقيق SOC 2 وأهميته في تعزيز الأمان وحماية البيانات في المؤسسات.
سيتناول ايضاً المراحل الأساسية لعملية التدقيق، كيفية الاستعداد له، وأفضل الممارسات لضمان الامتثال للمعايير الدولية. 👌
كما سيقدم لكم رؤى قيمة حول التحديات التي قد تواجهها الشركات أثناء التدقيق وسبل التغلب عليها، بالإضافة إلى أهمية تقرير SOC 2 في بناء الثقة مع العملاء والمستفيدين ✅

Streamlining GRC: Insights for Practical Project Management

Streamlining GRC: Insights for Practical Project Management

Effective project management is no longer just about timelines and deliverables—it’s about ensuring your projects align with governance, risk, and compliance (GRC) requirements.

In this session, our Projects Manager will walk you through practical strategies for integrating GRC into project management processes. You’ll learn how to:
✅ Align projects with organizational compliance and governance standards.
✅ Identify and mitigate risks early in project lifecycles.
✅ Streamline workflows to improve efficiency without compromising security and compliance.

Whether you’re managing IT, cybersecurity, or business projects, this webinar will equip you with real-world insights to manage projects more effectively in today’s risk-aware environment.

Mastering ISO27001 From Framework to Certification

Mastering ISO27001 From Framework to Certification

Discover how ISO/IEC 27001 helps organizations establish a robust Information Security Management System (ISMS).
This webinar will cover its key components, implementation steps, challenges, and benefits, along with a detailed overview of the certification process to help you achieve compliance effectively. 👌

Webinar Agenda:
- What is ISO/IEC 27001
- Key components of ISO/IEC 27001
- Implementation steps
- Benefits & Challenges
- Certification Process Overview
- Q&A and Closing


لماذا يطلب البنك المركزي المصري تقرير SOC2 ?

لماذا يطلب البنك المركزي المصري تقرير SOC2 ?

سوف نناقش في هذا الويبينار أهمية تقرير SOC 2؟
ولماذا يشترطه البنك المركزي المصري؟
سنناقش ايضاً دوره في تعزيز أمن البيانات، الامتثال للمعايير، وحماية المؤسسات من المخاطر السيبرانية.👌
لا تفوت هذه الفرصة لفهم متطلبات التقرير وتأثيره على الشركات في القطاع المالي!

Know your enemy: Using MITRE ATTACK to predict and prevent attacks

Know your enemy: Using MITRE ATTACK to predict and prevent attacks

In today’s evolving threat landscape, understanding adversary tactics is crucial for effective cybersecurity defense.
This webinar will provide an in-depth look at the MITRE ATT&CK framework and how organizations can use it to analyze threats, predict attacker behavior, and enhance security strategies.

Join us to learn practical approaches for leveraging MITRE ATT&CK in threat intelligence, incident response, and proactive defense planning to stay one step ahead of cyber threats.

Privacy & Data Protection: Navigating Global Regulations (GDPR, NCA & More)

Privacy & Data Protection: Navigating Global Regulations (GDPR, NCA & More)

In today’s rapidly evolving regulatory landscape, organizations must stay ahead of global privacy and data protection laws such as GDPR, NCA, and more.

This webinar will explore key compliance requirements, challenges, and best practices to ensure data security and regulatory adherence.

Join us to gain expert insights on safeguarding sensitive information and maintaining compliance in an ever-changing legal environment👌👌

PCI DSS vs PCI 3DS implementation Tips and Tricks

PCI DSS vs PCI 3DS implementation Tips and Tricks

Join us for an insightful webinar on the implementation of PCI DSS (Payment Card Industry Data Security Standard) and PCI 3DS (Three-Domain Secure), two essential frameworks for securing payment transactions and protecting sensitive cardholder data. This session will provide a comprehensive overview of PCI DSS requirements, including network security, vulnerability management, access controls, and compliance validation. Additionally, we will explore how PCI 3DS enhances online payment authentication, reducing fraud risks while ensuring a seamless customer experience.

Our expert speaker will discuss the latest updates in PCI compliance, common implementation challenges, and best practices for maintaining security across payment environments. You’ll gain valuable insights into the evolving regulatory landscape, the impact of PCI DSS v4.0.1, and strategies to achieve continuous compliance. Whether you’re a merchant, payment processor, or IT security professional, this webinar will equip you with the knowledge and tools needed to strengthen your payment security framework.

Repetition is the mother of skill, Consistency is the father of Confidence

Repetition is the mother of skill, Consistency is the father of Confidence

In an industry where knowledge is vast, tools evolve rapidly, and the pressure to “know everything” can be overwhelming, this presentation offers a grounded, human approach to growth in cybersecurity.

Through a blend of personal stories a powerful truth will be illustrated: that to build your career you do not need to rely on talent; you simply need to show up, repeat the right habits, and stay consistent.

This session is designed for:
- Beginners feeling overwhelmed by the sheer breadth of cybersecurity
- Mid-career professionals looking to break through to the next level
- Anyone struggling with imposter syndrome or inconsistency

Key Themes Covered:
- The difference between skill and confidence—and how to build both
- How cybersecurity careers evolve (from analyst to strategist)
- A practical approach to daily learning and skill-building
- Real-world stories that reinforce mindset and discipline
- A personal challenge to help you put the ideas into action

Risk Management & Compliance

Risk Management & Compliance

Join us for an insightful session on Risk Management & Compliance with The Experienced information privacy & security leader "Kevin Pike" where we explore how businesses can effectively identify, assess, and mitigate risks while staying compliant with industry regulations.

This webinar will provide practical frameworks, tools, and real-world examples to help your organization build resilience, improve governance, and ensure long-term success. Whether you're in cybersecurity, finance, or management, this session is tailored to equip you with the knowledge and strategies to stay ahead of potential risks.

Compliance and Security Standards for AI Systems

Compliance and Security Standards for AI Systems

With the increasing adoption of AI technologies, organizations are facing growing pressure to ensure their systems are secure, responsible, and compliant. ISO/IEC 42001, the first international standard for AI management systems, provides a structured framework for managing AI-related risks and aligning with ethical and regulatory expectations.

In this webinar, we will explore the core components of ISO/IEC 42001 and how it helps organizations establish effective compliance and security practices for AI systems.

What You’ll Learn:
- An introduction to ISO/IEC 42001 and its relevance to AI governance.
- Key compliance and security requirements outlined in the standard.
- Practical steps for implementing an AI management system.
- How organizations can build trust and transparency through standardization.

This session is ideal for professionals involved in AI development, compliance, cybersecurity, and risk management.

Disaster Recovery & Business Continuity

Disaster Recovery & Business Continuity

Organizations face growing threats from cyberattacks, system failures, and unexpected disruptions. Business continuity and disaster recovery (BC/DR) planning is no longer a luxury, it's a strategic necessity.

Join us for an expert-led session that will guide you through the fundamentals and practical strategies for creating a resilient organization capable of withstanding disruptions and recovering quickly.

What you’ll learn:

- Key differences between disaster recovery and business continuity

- How to build a comprehensive BC/DR plan

- Aligning BC/DR strategies with ISO standards (like ISO 22301)

- Real-world lessons from successful recovery efforts

- Tools and technologies to support continuity planning

This webinar is ideal for IT managers, risk officers, compliance professionals, and business leaders who want to ensure operational resilience in the face of unexpected challenges.

Agile Made Simple: For Cybersecurity, GRC, and Project Teams

Agile Made Simple: For Cybersecurity, GRC, and Project Teams

In today’s fast-paced environment, agility isn’t just for software developers—it’s essential for cybersecurity, governance, risk, compliance (GRC), and project teams too. But how do you apply Agile in structured, high-stakes environments where security, precision, and accountability matter?

Join us for this insightful session where we break down Agile into practical, easy-to-adopt concepts that work for technical and non-technical teams alike. Whether you're managing risks, overseeing security frameworks, or running complex projects, this webinar will help you unlock the true value of Agile—without the jargon or confusion.

What you’ll learn:

- The core principles of Agile and how they apply beyond software

- Real-world use cases in cybersecurity, GRC, and enterprise project teams

- How to introduce Agile practices without disrupting existing workflows

- Common pitfalls and how to avoid "fake Agile" traps

- Tools and techniques to support agility and team alignment

Information Security Management

Information Security Management

From protecting sensitive data to ensuring compliance and business continuity, organizations must have a solid Information Security Management System (ISMS) in place.

Join us for an insightful session that breaks down key principles, frameworks (like ISO/IEC 27001), and real-world best practices to help you design, implement, and maintain an effective ISMS.


- Whether you're starting your security journey or looking to strengthen existing practices, this webinar is designed to provide actionable insights for IT leaders, risk managers, and compliance professionals.

Cloud Audit Red Flags: find the high risk in cloud environments

Cloud Audit Red Flags: find the high risk in cloud environments

Cloud Audit Red Flags: Spotting High-Risk Areas & Securing Your Cloud

- Join us for an expert-led session focused on uncovering the most common red flags in cloud environments. Learn how to identify high-risk gaps during audits and implement fast, effective improvements. This webinar will provide practical tips, real-world insights, and actionable quick wins to boost your cloud security posture.

Ideal for IT managers, security professionals, and anyone navigating cloud compliance and risk.

ISO 37000 Corporate Governance vs ISO 38500 IT Governance

ISO 37000 Corporate Governance vs ISO 38500 IT Governance

ISO 37000 vs ISO 38500: Understanding Governance at Corporate & IT Levels
Join us for a focused session that explores the key differences, intersections, and practical applications of ISO 37000 (Corporate Governance) and ISO 38500 (IT Governance). Learn how these standards can complement each other in driving responsible leadership, strategic decision-making, and effective governance structures across the organization, from the boardroom to the IT department.

Whether you're in leadership, compliance, IT, or risk management, this session will offer clarity and actionable insights into aligning governance across all levels.

Use of AI in offensive cybersecurity

Use of AI in offensive cybersecurity

As artificial intelligence continues to be more bigger, so does its impact on the cybersecurity field. This session explores how AI is being leveraged in offensive cybersecurity, from automated vulnerability discovery and intelligent phishing to evasion techniques and deepfake-based social engineering.

👌 Join us as we dive into real-world applications, current trends, and the growing risks associated with AI-powered attacks. Learn what security professionals, organizations, and defenders need to understand about the offensive use of AI and how to prepare for the next generation of cyber threats.

🔍 Key takeaways:

- How AI is used in offensive security tools

- Examples of AI-driven cyberattacks

- Implications for cybersecurity defense and incident response

- Strategies to stay ahead in an AI-enhanced threat landscape

💡 This webinar is a must-attend for cybersecurity professionals, red teamers, IT leaders, and anyone curious about the future of offensive capabilities in cyberspace.