◆
AIS Platform
KSA-Native AI
🧠
AI Agents
Monitor and launch all 21 autonomous agents
⚡
Full Engagement Run
Run all agents for one client automatically
⬡
Overview
Your compliance dashboard and key metrics
📁
Client Projects
Manage audit and consulting engagements
⬆
Upload Documents
Upload evidence files for AI analysis
📋
Documents & Reports
All generated workpapers and saved outputs
◆
Quick Tools
Generate one document at a time — workpapers, RCM, reports
🧭
All Tools
Browse and search all 43+ compliance tools
💬
Hakim حكيم
Your AI advisor — ask about regulations, tools, or get guided help
📅
Calendar
Compliance deadlines and auto-reminders
⚡
Automations
Chain multiple tools into automated workflows
🔗
Integrations
Connect Slack, email, and government portals
🌐
Client Access
Share reports securely with your clients
⚙
Settings
Workspace, team, and account preferences
⏻
Sign out
NCA Cybersecurity Maturity Assessment
KSA · AI-Native
🔐
NCA Cybersecurity Maturity Assessment
NCA ECC · Governance · Defense · Resilience · Cloud · ICS
عربي
0%
0/22
📊 Maturity Report
🏛️
Cybersecurity Governance
0/5
Cybersecurity strategy approved by board
CISO role established with clear mandate
Cybersecurity policies and procedures documented
Cybersecurity risk register maintained
Annual cybersecurity awareness training conducted
🛡️
Cybersecurity Defense
0/5
Network segmentation and firewall controls
Endpoint detection and response (EDR) deployed
Multi-factor authentication (MFA) enforced
Vulnerability management program active
Security Information and Event Management (SIEM)
🔄
Cybersecurity Resilience
0/4
Incident response plan tested annually
Business continuity plan includes cyber scenarios
Backup and recovery procedures validated
Disaster recovery site operational
☁️
Third Party & Cloud Security
0/4
Third-party cybersecurity risk assessments
Cloud security controls per NCA CCC
Vendor access management and monitoring
Data classification and protection in cloud
⚙️
ICS/OT Security
0/4
OT/ICS network isolated from IT network
ICS-specific security monitoring in place
SCADA system hardening applied
ICS incident response procedures defined
💬
Need guidance?
Ask Hakim — your KSA advisor
⬡
Home
◆
Tools
🤖
Agents
📋
Reports
⚙
More