Skip to content
MA
Open to work

Hi, I'mMohammed AlYahya

Cybersecurity Leadership

A Signature Approach

FALAQ

A five-phase approach to building cybersecurity governance programs in NCA, SAMA, and CST-regulated organizations.

الفلق — the break of day

The Premise

Cybersecurity programs in Saudi organizations fail in predictable ways. They buy platforms before they understand their own assets. They write aspirational policy nobody can measure. They try to enforce every control at once. They produce KRIs that look serious but never drive decisions. They build twin copies of the same work in compliance, audit, and IT — none of them quite agreeing.

FALAQ is the approach I use to avoid those failures. Five phases, in order, each producing an artifact the next phase depends on. The order is not optional. You cannot quantify what you have not anchored. You cannot anchor what you have not inventoried.

The Five Phases

F

Foundation

Asset and data inventory before everything else.

Every NCA, SAMA, and ISO 27001 control assumes you can answer three questions about every asset: who owns it, what data does it process, and how critical is it to operations? If you cannot, every downstream control is fiction. Foundation work is unglamorous. Skip it and the rest collapses.

Artifact: A maintained asset/data inventory with owner, sensitivity tier, and refresh cadence.
A

Anchor

Short, enforceable policy with every clause tied to a control.

Policy is the contract that lets every other control hold. It must be short enough to be read, operationally enforceable — no aspirational language nobody can measure — and traceable, so every clause maps to a specific NCA control, SAMA expectation, ISO requirement, or PDPL article. Policy without traceability is paperwork; with it, policy is the spine of the program.

Artifact: An organization-wide policy set with clause-level traceability to relevant frameworks.
L

Layering

Controls deployed in sequence — not big-bang.

A common failure mode is trying to enforce all controls at once. Classification must precede handling rules. Handling rules must precede exception processes. Detection without response is theater. Layer controls in the order the dependencies require, and stage the rollout against the audit timeline so adoption can be measured before it becomes a non-conformity.

Artifact: A sequenced controls roadmap with explicit dependencies between layers.
A

Alignment

Three Lines of Defence and board reporting unified at the data layer.

If audit, compliance, and IT each maintain their own version of the same risk, you have three problems, not three perspectives. Alignment is the discipline of unifying the underlying data model so the same risk record produces views fit for the assessor, the treatment owner, and the board — without re-keying or reconciliation.

Artifact: A single source of truth for risk records, with audience-specific views.
Q

Quantification

KRIs, KPIs, and residual risk in a single workflow.

Most KRIs reported to boards are vanity metrics — large numbers detached from any decision. Quantification means embedding Key Risk Indicators (what changed), Key Performance Indicators (whether controls are working), and residual risk scoring (how much exposure remains) into the same workflow. A board paper that does not change a decision was not worth writing.

Artifact: A risk register where every record carries KRI, KPI, and residual-risk data.

KSA-Specific Principles

  • The regulator is the authority. International best practice (NIST, ISO) is necessary but not sufficient. NCA, SAMA, CST, and SDAIA define the rules of the game; everything else informs.
  • Sequence with the inspection calendar, not the project plan. NCA inspections and SAMA examinations do not move. The rollout must.
  • Arabic operational documents alongside English policy. Staff procedures are read more often in Arabic; policy templates that ignore this fail at adoption.
  • PDPL is newer than NCA. Staff data-handling habits formed under pre-PDPL norms persist. Awareness must account for the gap.
  • Hierarchy is an asset. Clear sign-off chains accelerate adoption when used deliberately, not as a bottleneck.

Anti-Patterns

Buy the platform, fix the program
Tools amplify a working program; they do not create one.
Aspirational policy
“We strive to” cannot be audited.
Big-bang rollout
Adoption fails when staff face too many new rules at once.
Board theater
KRIs that do not change decisions waste board attention.
Western framework, Saudi context
Naive importing of ISO/NIST without NCA/SAMA tailoring produces gaps.
Replace before re-engineer
Tool migrations consume years; in-place workflow design ships in months.

Maturity Rubric

LevelNameIndicator
1ReactiveCompliance work driven by audit findings; no maintained inventory.
2DefinedAsset inventory and policies exist, but drift between cycles.
3AlignedControls mapped to specific NCA/SAMA/ISO clauses; sequenced rollout.
4QuantifiedKRIs + KPIs + residual risk in single workflow; board reporting reliable.
5AdaptiveThreat-informed risk decisions; control efficacy continuously measured.

Where to Start

Most organizations I work with arrive at Level 1 or Level 2 with the budget and the will to reach Level 3 in twelve months. The order matters. Foundation first. Anchor second. Anything else done before those two collapses under audit.

Working on a KSA GRC program?

If your organization is preparing for an NCA assessment, a SAMA examination, or a PDPL rollout, I’m open to senior security leadership roles — CISO, Director, Head of Security.

Discuss a Role