• What We Do
    Advise
    • Cyber Strategy, Governance & Risk
      • Strategy & Target Operating Model
      • Enterprise Risk Management
      • GRC Framework, Tooling & Automation
      • vCISO & Trusted Advisory
      • Business Continuity & Resilience
      • Third Party & Supply Chain Risk
    • Regulatory & Compliance Management
      • Posture & Maturity Assessments
      • Regulatory Assurance Program
      • ISO & International Standards Enablement
    • Security Testing & Evaluation
      • Red Teaming
      • Vulnerability Assessment & Penetration Testing
      • Purple Teaming
      • Source Code Reviews/DevSecOps
    • Cyber Academy
      • Learning Needs Analysis
      • Cyber Awareness & Training
      • Cyber Crisis Simulation
      • Phishing Campaigns
    • UAE Comply.360
    • Cyber Escape Room
    • Cyber Cloud
      • Cloud Security Posture Assessment
      • Cloud Service Provider Selection Advisory
      • Cloud Security Testing
      • Cloud Compliance Assessment
    • Data Privacy
      • Data Privacy Maturity & Risk Assessment
      • Privacy Program & Governance Design
      • Regulatory & Cross-Border Compliance Advisory
      • Privacy Awareness & Training
    • AI
      • AI Governance Program Design & Implementation
      • AI Use Case & Risk Tiering (System Impact Assessments)
      • Responsible AI Advisory & Training
      • AI Security Assessment
    • OT
      • OT Risk and Compliance Review and Assessment
      • OT Architecture Assessment
      • OT Gap & Maturity Assessment
    • Physical
      • Security Design
      • Security Consultation & Compliance
      • Security Audit
      • Security Upgrades & Integration
      • Security Training
    Protect
    • Enterprise Security Architecture & Transformation
    • Identity & Access Management
    • End User Security
    • Data Security
    • Application Security
    • Network & Insfrastructure Security
    • Cyber Cloud – Protect
      • Cloud Security Architecture and Design
      • Cloud Cyber Transformation
      • Cloud Security Tools Implementation
    • Data Privacy – Protect
      • Privacy Controls & Engineering
      • Data Security Posture Management
    • AI – Protect
      • Secure AI Architecture & Engineering
      • AI Firewalls
      • Secure Data for AI
    • OT – Protect
      • OT Security Architecture Design
      • OT Security Solution Deployment, Integration & Testing
      • OT Network Segmentation & Defensible Architecture
    • Physical – Protect
      • Security for all Market Verticals
      • Cyber Physical Security Convergence
      • Command Control Room
    Operate
    • Cyber Resilience Services
      • Managed eXtended Detection & Response (MXDR)
      • Digital Forensics, Incident Response (DFIR) & Threat Hunting
      • Predictive Threat Intelligence
      • CTEM Cyber Threat Exposure Management
      • Cyber and Disaster Recovery
    • Cyber Operations Services
      • Identity & Access Management
      • End User Security
      • Data Security
      • Application Security
      • Network & Infrastructure Security
      • Vulnerability Remediation-as-a-Service
      • NOC/ITSM
    • Resonance
    • MOVIS-DVR
    • VANTAGE-LPR
    • Nawa-NGC2
    • DFIR & CTEM Bundle
    • Cyber Cloud – Operate
      • Cloud Security Monitoring
      • Cloud Security Managed Services
      • Cloud Compliance Maintenance
    • Privacy – Operate
      • Data Privacy Compliance Monitoring & Reporting
      • Data Privacy Operations as a Service
    • AI – Protect
      • AI Security Posture Monitoring & Management
      • AI Compliance Monitoring
    • Physical – Operate
      • System Installation, Commissioning & Maintenance
      • Security Control Rooms for Multi Site Monitoring
      • Technical Surveillance Countermeasures (TSCM)
      • Physical Screening & EOD Containment
      • Rapid Deployment Security
      • Video Analytics & Advanced AI
      • Security Product Development R&D
  • Insights
    Reports
    & Whitepapers

    Latest Reports & Whitepapers

    Digital Forensics & Incident Response (DFIR)

    MORE

    Securing the GCC’s Digital Future

    MORE

    Detecting web shells with network monitoring tools

    MORE
    All Reports & Whitepapers
    Blogs

    Latest Blogs

    Bridging the gap: Integrating secure code review into the DevSecOps

    MORE

    Security Performance Measurement: From compliance to confidence – Part 2

    MORE

    Security Performance Measurement: From compliance to confidence – Part 1

    MORE
    All Blogs
    Media

    Latest Media

    Test News

    MORE
    All Media
    Events

    Latest Events

    Test Event

    MORE

    CPX Cyber Bytes

    MORE
    All Events
    Threat
    Advisories

    Latest Threat Advisories

    Weekly Digest | 28th April – 2nd May

    MORE

    Weekly Digest | 21st April – 25th April

    MORE

    Weekly Digest | 14th April – 18th April

    MORE
    All Threat Advisories
  • Who We Are
    About Us

    Anticipating
    future security challenges,
    we deliver innovation
    and resilience through talent,
    technology, and trust.

    Learn more about CPX's story
    Leadership

    Hadi ANWAR
    CEO of CPX

    Securing the future demands
    leadership shaped by
    experience, foresight,
    and unwavering
    commitment.

    Get to Know Our Leadership
    Certifications

    We adhere to the
    highest industry
    certification standards
    to ensure trust, resilience,
    and compliance.

    See our certifications
    Partners

    we focus on
    building strong alliances
    with key local
    and international players
    to shape a secure future.

    Meet our proud partners
    Careers

    Interested in joining
    one of the fastest-growing
    companies in the UAE?

    Check The Opportunities
Contact Us
  • Industries
  • Insights
  • Partners
  • Media
  • Company
  • Contact Us
  • Careers
  • Industries
  • Insights
  • Partners
  • Media
  • Company
  • Contact Us
  • Careers
Get in touch!

4th floor, Z23
Mohamed Bin Zayed City
Abu Dhabi, United Arab Emirates

contactus@cpx.net

©CPX 2026. All rights reserved. Privacy policy | Terms of use

Search