Renad Al Majd Group of Saudi Arabia and “AXELOS” sign a strategic partnership agreement

Renad Al Majd Saudi Arabia "RMG" signed a strategic partnership agreement with the UK project "AXELOS", to provide its clients in the Kingdom of Saudi Arabia with the best international training programs and internationally recognized certificates in IT services management and project management.

The importance of the agreement for the market in general and the Saudi market, in particular, lies in providing a number of the best training programs and methodologies used globally to develop professionals working mainly in IT services management and project management.

It is worth mentioning that the "AXELOS" project is a joint venture established in 2013 by the British Council of Ministers and Capita Company. The project develops, manages, and operates a number of the best training programs and methodologies used globally to develop professionals primarily engaged in IT services management and project management. , Works in the private, public, and volunteer sectors in more than 150 countries to improve employee skills and competence to make both individuals and organizations work more professionally and effectively.

In our keenness in Renad Al Majd Company to contribute to market development and build strategies in line with the Kingdom's vision (Vision 2030);

We are pleased to announce the signing of a partnership agreement with the "AXELOS" project to provide international training programs and internationally recognized certificates, And to provide the best technology solutions in the Arab markets.

Accordingly, it was agreed with the company "AXELOS" to provide some of its services within the Kingdom of Saudi Arabia, including:

  1. ITIL (Information Technology Infrastructure Library):

It is a set of concepts and practices for achieving high-quality IT Service Management (ITSM). It is known that companies with employees possessing advanced certificates in ITIL are pioneers in the development and implementation of IT management services.

ITIL is an internationally recognized certification in the field of information technology, which is supervised by AXELOS. The program contains a series of certificates that qualify for the degree of professionalism in the field of IT services management.

  1. Prince2 Certificate in Project Management:

PRINCE2 is the most popular professional project management certification, and reports indicate that PRINCE2 is the most powerful global project management certification, in 2013, more than 158,000 exams were taken!

  1. The PRINCE2 Agile Project Management Certification:

It is one of the latest additions to the Project Management Certification Board. As a comprehensive turnkey business solution, allowing focus on management and timely delivery, it blends the principles of Project Management (Prince2) with a flexible delivery framework (Agile).

This might sound like a somewhat strange and contradictory combination, but it can work very well together.

The Prince2 Agile certification is available at two levels: Foundation and Practitioner.

  1. Management Successful Program certificate (MSP):

The Management Successful Program (MSP) certificate enhances the ability to organize and manage large projects. It also works to develop your practical skills from designing, planning, and implementing programs for large projects. It is considered one of the strongest internationally recognized certificates in the field of program management.

AXELOS provides three levels of MSP certification, which is the MSP Foundation, the first certification that can be obtained and qualifies for entry into the field of successful program management, the MSP Practitioner Certificate, which you can obtain after obtaining the basic certification, and finally, the certification MSP Advance Practitioner is the top certification in the Axelos Program for Successful Program Management.

  1. Management of Value certificate (MoV):

A value management program helps organizations and individuals manage their projects, programs, and services consistently and efficiently. It also guides key principles, processes, techniques, and approaches for all business data.

  1. Project, Programs, Portfolios Offices Management certificate (P3O):

The Project, Programs, Portfolio Offices Management (P3O) program gives you an accredited international certificate, the possession of which reflects your interest and familiarity with the basic principles, methodologies, and methods used within the knowledge guide for a certificate. (P3O)

  1. Risk Management Certificates (M-o-R),
  1. Portfolio Management Certificates MOP.

The agreement also provides for the provision of institutional evaluation services (assessments), and the services that will be provided by Rinad Al Majd Information Technology (RMG) in partnership with AXELOS are:

The Assessment and Maturity service Model (ITIL) was developed to help organizations better manage their IT services within the ITIL framework. It also contributes to a description of the organization's level of maturity, a plan for how to improve, and the ability to maintain results and track improvement.

P3M3, also known as the "Project and Program Management Maturity Model", is a Management Maturity Model (M3) and a method for measuring an organization's ability to evaluate its projects, programs, and portfolios.

Now, within the Saudi Arabia kingdom companies and organizations, can take benefit from the institutional assessment services and capacity measurement models through Renad Al Majd Information Technology (RMG) representation of the British company AXELOS.

The general manager of Renad Al-Majd Company (RMG),  Mr.Abdul Karim bin Muhareb explained: The partnership with “AXELOS” is a very important addition to the list of companies and institutions that have placed their confidence in the company “RMG” to provide technology services in the Kingdom through his company “Renad Al Majd”, adding:

The services provided by Renad Al Majd are considered the first in the Kingdom.

Mr. Abdul Karim also added, our customers can take the exam directly to obtain the previously mentioned international certificates or register in training programs that qualify you for those certificates, and training programs will be provided by Renad Al Majd (RMG) for Information Technology in partnership with the British company (AXELOS).

And Mr. Abdul Karim: "We always strive to search for the latest technologies that enable our customers to achieve business quality using the most efficient tools, and to provide them with a unique experience that enables them to manage the business by applying best practices to enhance efficiency, effectiveness, governance, and overall quality."

 We have to notice that AXELOS project agreement, comes within a group of services and other agreements entered into by Renad Al Majd Company (RMG) to help companies .develop their business environment to comply with the requirements of the new digital world, and harmonize business with the latest digital technologies in the current technological era.

Contact us for a free consultation, we love hearing your words.

Learn about the training programs offered by (RMG).

Renad Al Majed Group (RMG) partnership with Beqaa Al Estora general trading (LLS Group) in Iraq

Renad Al Majed Group (RMG) and Beqaa Al Estora General Trading Company (LLS Group) in Iraq have signed an agreement to exchange experiences, consulting services, specialized training, and ISO standards consulting services.

Based on the strategy of Renad Al Majed Group (RMG) that focuses on expansion in Middle East countries and the desire to transfer and develop information technology in the other countries and support institutions to achieve the desired Objectives and to keep pace with digital transformation development, information technology, information security, Implementation of quality systems also training in order to achieve the  institutional excellence and desired objectives.


The signed agreement includes many Aspects as consulting, training, qualification, examination, evaluation, and adoption it in the following areas:

  • International ISO standards
  • ITSM
  • IT Governance
  • CMMI
  • Digital Skills Framework (SFIA)
  • Software Development Life Cycle (SDLC)
  • Organizational change (OCM)
  • Project Management (PMO)
  • Digital Transformation
  • The parties have the right to add any other specialties


Renad Al Majed Group (RMG) is a Saudi leader company in of information technology.

Renad Al Majed Group (RMG) has a qualified and Internationally certified team of consultants and experts, with a record of Success and achievements with a largest governmental organization and the private sector also in the Kingdom of Saudi Arabia.

The agreement included many terms and areas in which Renad Al Majed Group (RMG) and Beqaa Al Estora General Trading Company will in the following domains:

  • International ISO standards
  • IT Governance
  • CMMI
  • Digital Skills Framework (SFIA)
  • Software Development Life Cycle (SDLC)
  • Organizational change (OCM)
  • Project Management (PMO)
  • Digital Transformation


Beqaa Al Estora General Trading Company (LLS Group) is one of the leading Iraqi companies in the field of information technology and digital transformation and a Microsoft's global solutions service provider.

The Saudi-Iraqi relations have a achieved a recognized growth in many Business aspects, and the leadership in the two countries has a common desire to enhance this strategic relationship in a manner befitting the historical ties, in the interest of the two brotherly countries. Where the Iraqi Prime Minister chose the Kingdom of Saudi Arabia as the first country to visit after taking office, and the Kingdom of Saudi Arabia celebrated this extremely important visit and a desire to provide all means of success to it is what prompted us in Renad Al Majed Group (RMG) to search for the best distinguished companies in the State of Iraq Sibling to build partnerships and agreements with it and expand our activities there.

Renad Almajed Group (RMG) is approved to implement CMMI Institute model implementation projects

Renad Almajed Group (RMG) is approved to implement CMMI Institute model implementation projects

A large part of the focus of Renad Almajed Group (RMG) is on providing secure solutions. Overall reliability and quality the company has been able to meet the global quality standards and within our quest to expand the technical consulting and software engineering field we are pleased to announce that we have been accredited by the American Institute (CMMI Institute) to carry out and make the CMMI model.CMMI is a model for improving the processes within the content of the processes required to deliver high quality programming products. This model increases the level of organization performance by much improving the predictability and expansion of the project.CMMI is a framework that describes the key elements of effective business process development and service delivery to help achieve business goals related to key elements: Cost, time management, and quality improvement of products or services. This model helps an organization build, improve, measure its capabilities, and improve performance.CMMI-based process optimization provides real cost savings such as early and more efficient error detection, thereby reducing repair cost, more effective change management and risk reduction in software, product, and service development.The integrity of the Capability maturity Model integration addresses three areas of concern:
  • Product and service development - CMMI for development (CMMI-DEV)
  • Service Creation and Management - (CMMI-SVC) CMMI for Services
  • Product and Service Acquisition - (CMMI-ACQ) CMMI for Acquisition
cmmi-consulting-servicesThe benefits of organizations measuring their progress through a CMMI can be summarized as follows:
  • Determine how well an organization's operations are compared to global CMMI practices, and identify areas where improvement can be made.
  • Inform customers and external suppliers of the quality of their operations compared to CMMI.
  • Create your operations according to the internationally recognized CMM model.
  • Design, implement and operate your operations according to internationally recognized maturity levels.
  • Meet the contractual requirements of one or more clients with high quality and maturity levels.
Many examples of global companies have successfully implemented the CMMI model, and this application has had a significant positive impact, such as The Boeing Company and General Motors Company, where the success rate in projects increased from 50% before application to 90% after application and provided more Of two million dollars as a result of the early detection of errors and software vulnerabilities in Sanchez Computer, as well as Northrop Grumman obtaining an exceptional appreciation in all contracts that it implemented for its customers after applying the model.In Saudi Arabia, the National Information Center obtained the fourth level as the first entity in the Middle East to obtain this rank and the Municipality of Jeddah Governorate obtained a certificate (CMMI) - Capability Maturity Model Integration) as the first government agency in the municipal sector to achieve this certificate at the level of the Gulf Cooperation Council states .Through this accreditation, Renad Almajed Group (RMG), as a partner of the CMMI Institute, is pleased to provide the following services:
  • Integrated consulting services that help design, implement, operate and improve operations using the integrated capacity maturity model.
  • Certified training services for many training programs in the Integrated Capacity Maturity Model.
  • Assessment services based on the Integrated Capacity Maturity Model to measure levels of maturity in operations.

For Registration & Enquiries call us :


For Registration & Enquiries call us :

Renad Almajed Group (RMG) is the first consulting company to successfully implement the CYBER SECURITY

Renad Almajed Group (RMG) is the first consulting company to successfully implement the CYBER SECURITY

Renad Almajed Group (RMG) is the first Saudi consulting company that succeeded in implementing the SAMA Cyber Security Framework application project as it implemented it in the Saudi Home Loans (SHL) because of the importance and necessity of this framework to achieve the requirements of the current digital community that has high expectations with experience Flawless customers, constant availability of services and effective protection of sensitive data. The origins of information and online services are now of strategic importance for all public and private institutions, as well as for the wider community.

These services are vital to creating a vibrant digital economy. It has also become systematically important to the economy and broader national security. All this confirms the need to protect sensitive data and transactions, and thus ensure confidence in the Saudi financial sector in general.

Therefore, we find that the Saudi Arabian Monetary Agency (SAMA) is now imposing the adoption of the application of this framework on all (“member organizations”) operating in the field of loans, banks, financial services and insurance in order to identify and effectively address risks related to cyber security to maintain the protection of information assets and services via the Internet.

What is cyber security?

Cyber security is defined as a set of tools, policies, security concepts, security guarantees, guidelines, risk management approaches, procedures, training, best practices, safeguards, and technologies that can be used to protect an organization's information assets from internal and external threats.

General security objectives include:

  • Confidentiality - the information assets can only be accessed for persons authorized to access (i.e. protected from unauthorized disclosure or (cancellation) the intended leakage of sensitive data).
  • Integrity - the information assets are accurate and complete and properly processed (i.e. protected from unauthorized modification, which may include authenticity and non-repudiation).
  • Availability - information assets are flexible and accessible when required (i.e. protected from unauthorized outages).

Therefore, we find that the framework defines the principles and objectives for initiating, implementing, maintaining, monitoring and improving cyber security controls in member organizations. The framework provides cyber security controls that apply to the organization's information assets, including:

  • Electronic information.
  • Physical information.
  • Applications, programs, electronic services and databases.
  • Computers and electronic devices (such as ATMs).
  • Information storage devices (for example, hard disk, flash drive).
  • Buildings, equipment and communication networks (technical infrastructure).

The framework has a correlation with other institutional policies in related areas, such as physical security and fraud management.


Where does cyber security apply?

The framework applies to all member organizations organized by the Saudi Arabian Monetary Agency, which include the following:

  • All banks operating in the Kingdom of Saudi Arabia.
  • All insurance and/or reinsurance companies operating in the Kingdom of Saudi Arabia.
  • All finance companies operating in the Kingdom of Saudi Arabia.
  • All credit offices operating in the Kingdom of Saudi Arabia.
  • Financial market infrastructure

The most important features of cyber security

  • Responsibilities

The framework is mandated by the Saudi Arabian Monetary Agency. The monetary agency is the owner and is responsible for the periodic updating of the tire.

Member organizations are responsible for adopting and implementing the framework.

  • Explanation

The Saudi Arabian Monetary Agency SAMA, as the framework owner, is solely responsible for providing interpretations of principles, objectives, and control considerations, if necessary.

  • The target audience

The framework aims to senior and executive management, business owners, owners of information assets and those responsible for participating in defining, implementing and reviewing cyber security controls within member organizations.

  • Audit update and maintenance

The Saudi Arabian Monetary Agency will periodically review the framework to determine the effectiveness of the framework, including the effectiveness of the framework to counter emerging cyber security threats and risks. If possible, the Saudi Arabian Monetary Agency will update the framework based on the audit findings.

If a member organization considers that updating the framework is required, it must provide the required update formally to the Saudi Arabian Monetary Agency. The Saudi Arabian Monetary Agency will review the requested update, and upon approval, the framework will be modified

The frame structure has its advantages

The framework is structured around four main domains, namely

  • Cyber Security Leadership and Governance.
  • Cyber security risk management and compliance
  • Cyber security operations and technology.
  • 3rd party cyber security.

For each domain several subdomains are defined. The subdomain focuses on a specific topic of cyber security. For each subdomain, the framework provides for initial, objective and monitoring considerations

The principle summarizes the main set of required cyber security controls related to subdomain.

The target describes the purpose of the principle and what the required set of cyber security controls are expected to achieve.

Monitoring considerations reflect mandatory cyber security controls that must be taken into account. Control considerations are uniquely numbered throughout the tire. Where appropriate, consideration of control can consist of up to 4 levels.

Cyber Security Framework

Control considerations are numbered according to the following numbering system:

The figure below shows the general structure of the framework and indicates cyber security and sub-domains, including reference to the applicable section of the framework.

Self-evaluation, review and audit

Cyber Security Framework

Self-evaluation, review, and audit

Implementation of the framework in the organization will be subject to periodic self-evaluation. The organization will conduct a self-assessment based on a questionnaire. The Saudi Arabian Monetary Agency will review and review self-assessments to determine the level of compliance with the framework and the maturity level of cyber security in the organization.

Cyber Security Maturity Model

The level of cyber security maturity will be measured with the help of a predefined cyber security maturity model. The cyber security maturity model characterizes 6 maturity levels (0, 1, 2, 3, 4, 5), summarized in the table below. In order to achieve levels 3, 4 or 5, the organization must first meet all the criteria for previous maturity levels.

ExplanationDefinition and Criteria Maturity Level 
Cyber security controls are not in place. There may be
no awareness of the particular risk area or no current
plans to implement such cyber security controls.
* No documentation.
*There is No awareness or attention for certain cyber security control.
0 Non-existent
*Cyber security control design and execution varies by
department or owner.
*Cyber security control design may only partially
mitigate the identified risk and execution may be
*Cyber security controls are not or partially defined.
* Cyber security controls are performed in an inconsistent way.
* Cyber security controls are not fully defined.
1 Ad-hoc
*Repeatable cyber security controls are in place.
However, the control objectives and design are not
formally defined or approved.
* There is limited consideration for a structured review
or testing of a control.
*The execution of the cyber security control is
* based on an informal and unwritten, though standardized,
2 Repeatable
but informa
*Cyber security policies, standards and procedures are
* Compliance with cyber security documentation i.e.,
policies, standards and procedures is monitored,
preferably using a governance, risk and compliance
tool (GRC).
* key performance indicators are defined, monitored
and reported to evaluate the implementation.
*Cyber security controls are defined, approved and implemented
in a structured and formalized way.
* The implementation of cyber security controls can be
3 ctured and
Effectiveness of cyber security controls are measured
and periodically evaluated.
*key risk indicators and trend reporting are used to
determine the effectiveness of the cyber security
* Results of measurement and evaluation are used to
identify opportunities for improvement of the cyber
security controls.
*The effectiveness of the cyber security controls are periodically
assessed and improved when necessary.
* This periodic measurement, evaluations and opportunities for
improvement are documented.
4 Managed and
*The enterprise-wide cyber security program focuses
on continuous compliance, effectiveness and
improvement of the cyber security controls.
* Cyber security controls are integrated with enterprise
risk management framework and practices.
* Performance of cyber security controls are evaluated
using peer and sector data.
*Cyber security controls are subject to a continuous improvement plan.5 Adaptive

The objective of the framework is to create an effective approach to addressing cyber security and managing cyber security risks within the financial sector. To achieve an appropriate level of cyber security maturity, member organizations must operate at least at the maturity level 3 or higher as shown below.

Third Maturity Level (3)


Cyber security documents must clearly indicate "why", "what" and "how" cyber security controls should be implemented. Cyber security documents consist of cyber security policies, cyber security standards and cyber security measures.

Cyber security policy must be adopted and delegated by the organization’s council and clarify “why” cyber security is important to the organization. The policy should highlight the origins of the information that must be protected and “what” are the principles and goals of cyber security that must be developed

Based on cyber security policy, cyber security standards must be developed. These "what" standards define what cyber security controls must be implemented, such as security and system standards, separation of duties, password rules, event monitoring and backup and recovery rules. Standards support and enhance cyber security policy and should be considered as baselines of cyber security.

Step-by-step tasks and activities that staff, third parties, or WHO clients should perform in cyber security procedures are detailed. These procedures define "how" cyber security controls, tasks and activities should be implemented in the operating environment and support the protection of the organization's information assets in accordance with cyber security policy and standards.

The process is defined in the context of this framework as an organized set of activities designed to achieve the specified goal. The process may include policies, standards, guidelines, procedures, activities and work instructions, as well as any of the roles, responsibilities, tools and management controls required to reliably deliver outputs.

Actual progress in the implementation, performance, and compliance of cyber security controls should be monitored and evaluated periodically using Key Performance Indicators (KPIs).

Fourth Maturity Level (4)

To achieve the fourth level of maturity, the organization must periodically measure and evaluate the effectiveness of implemented cyber security controls. In order to measure and assess whether cyber security controls are effective, key risk indicators (KRI) must be identified. The KRI indicates an effectiveness measurement criterion and must determine whether the actual outcome of the measurement is less than or is working on or above the target base. KRIs are used to report trends and identify potential improvements.

Fifth Maturity Level (5)

The fifth level of maturity focuses on the continuous improvement of cyber security controls. Continuous improvement is achieved through continuous analysis of the goals and achievements of cyber security and the identification of structural improvements. Cyber security controls must integrate with enterprise risk management practices and be supported by real-time automated monitoring.

Business process owners should be responsible for monitoring compliance with cyber security controls, measuring the effectiveness of cyber security controls, and incorporating cyber security controls within the enterprise risk management framework. Additionally, the performance of cyber security controls must be evaluated using peer and segment data.

We are pleased to serve you by filling in the contact form

Signing a partnership agreement with the Saudi Electronic University

Signing a partnership agreement with the Saudi Electronic University

Renad Almajed Group (RMG) has entered into a strategic partnership agreement in the fields of implementing ISO quality systems with the Institute of Research and Studies, the consulting arm of the Saudi Electronic University in the Kingdom of Saudi Arabia.The Research and Studies Institute is the main representative of the administration and implementation of research, studies, advisory, scientific, research and training services provided by the Saudi Electronic University for external sectors (government and private).Renad Almajed Group (RMG) has succeeded during the past years in implementing many consulting projects in the field of quality systems (ISO) and is classified among the leading Saudi companies in the field of ISO consulting and holds many international certificates in this field.The agreement was signed by the Institute of Research and Studies, His Excellency the Dean of the Institute, Dr. Abdullah bin Suleiman bin Amer Al-Sayid, and by the Renad Almajed Group Director General, Mr. Abd Al Karim bin Abd Al Rahman bin Muhareb.Dr. Abdullah bin Suleiman bin Amer Al-Sayed stressed the aspiration of the Research and Studies Institute to expand the aspects of partnership with Renad Almajed Group (RMG) to serve both parties so that we can provide further development and exchange of experiences that will assist in conducting theoretical and applied studies and studies in various fields that The university is concerned with it in the Kingdom, knowing that this partnership will contribute to preparing, qualifying and training national cadres and developing their scientific and functional skills in many fields such as technical services management, quality, information security and business continuity.For his part, the general director of Renad Almajed Group (RMG), Mr. Abdul Karim bin Abdul Rahman bin Muhareb, said that we are looking forward to partnering with the Research and Studies Institute to increase professionalism and develop competencies in the field of applying quality systems and activating best practices in all areas that are concerned with the International Organization for Standards (risk management and occupational health and safety) And information security and business continuity, ...), and since our experience exceeds ten years in the field of implementing quality systems, we look forward to providing our consulting expertise and methods to support and support the institute.It is noteworthy that Renad Almajed Group (RMG) is a leading company in the field of information technology, consulting and specialized training in the Middle East. Having many information technology and business integration consultants with expertise and technical know-how in the various government, industrial and service sectors, Renad Almajed Group (RMG) was able by its established presence in the region with its openness to the world and its follow-up to the latest global technical changes to achieve great success for all its projects with its customers and partners with the highest efficiency and effectiveness And with the least possible risk.

RMG get accredited by International Council of E-Commerce Consultants “EC-Council”

RMG get accredited by the International Council of E-Commerce Consultants "EC-Council"

Most organizations face a number of challenges in the business world, from protecting customer results to intellectual property and sensitive information. Given these challenges, cyber security is a necessity, not a luxury.

As a culmination of our cyber security services, we have built partnerships with global cyber security providers. Renad Almajed Group (RMG) has been accredited by the world’s largest technical certification body for cyber security, the International Council of Electronic Commerce Consultants “EC- Council” as an accredited training center.

The Training Portfolio of “EC- Council” includes comprehensive courses on cyber security such as:

  • Certified Hacker Ethical
  • Supported in network defense
  • Master's CEH
  • Certified threat Intelligence Analyst (C | TIA)
  • Certified Security Analyst from the World Council of Electronic Commerce Advisors (ECSA): Penetration Testing
  • Certified Security Analyst from the World Council of E-Commerce Advisors (My work)
  • LPT (Master's) Training Program: Advanced Penetration Testing Course
  • Global Council of E-Commerce Advisors (V 2) Certified incident Processor


“Our focus is on helping our customers to keep their business safe and globally, by providing the right cyber security training, consulting, and solutions,” said Fayyad Bayan, CEO of Renad Almajed Group (RMG). The reputation of “EC- Council” in expanding the global partner network, to fully manage the certification process, starting with training accreditation, offering a consulting program, and managing the testing process worldwide.”

For more info just contact us



Facebook is working on big plans to unveil a new cryptocurrency platform with a launch slated for next year. When this platform is launched, Facebook users will be able to send Facebook’s Libra cryptocurrency to each other, and they will also be able to use it to buy online. To ensure support for its new digital currency, Facebook has invited many companies in the financial, e-commerce and technology sectors to participate.Visa, MasterCard, PayPal, and others announced their support for “Libra” currencyVisa and MasterCard, the electronic payments company PayPal as well as Uber was among many companies that have been involved in investing up to $ 10 million. All these contributors will help launch the new cryptocurrency, as Facebook seeks to provide $ 1 billion to support the new project. 

What is the impact of this new currency?

Many reports indicate that Facebook has been developing this currency for more than a year, but there is still very little information about it. It is known now that Libra will be tied to a basket of official currencies in an attempt to counter the extreme volatility which has plagued other cryptocurrencies. Facebook new currency will have an advantage over all other cryptocurrencies which is its user base that consists of billions of accounts. However, regulatory challenges in the United States and elsewhere remain a major obstacle, in addition to that concerns about using cryptocurrencies for money laundering and financing terrorist organizations.What does the future hold?Facebook has already begun to finish its work on Libra technical points, and neither Facebook nor any of its partners will be able to directly control the currency, but they may help to develop Libra’s network payments by approving transfers. Not surprisingly, Facebook seeks to ascertain the regulatory affairs of its new digital currency, because they don’t want to add another problem to their privacy dilemmas. Finally, Facebook is expected to release a detailed statement on Libra by the end of this month.



The G20 Summit is still the most prominent economic event that held in the past few days. It includes the top 20 global economic powers. In the context of the latest developments in finance and business, we can say that technology is one of the most important destinations for major investors in the world seeking to economic achievements, comfort and entertainment.Saudi representation at the summit was strong and influential, whether talking about Saudi Arabia being one of the most important investment destinations, or in the presence of Saudi Crown Prince Mohammed bin Salman where he talked about modern technologies in the world of systems, automation and the Internet of Things, and how these techniques can be used to achieve more success and progress on the technical and economic level. His highness also wondered how IoT technologies could change our perception of the present and the future, and how the Kingdom could take another step towards the future, pointing out that the IoT is a vision of something that started from the distant future, stressing the need to care about the development of such technologies and help the Kingdom in reaching the ultimate goals of Vision 2030 in line with the tremendous development of information technology in the whole world.

What is the Internet of Things (IoT)?

It is a giant network of devices connected to each other via the Internet. These devices can exchange and process information without the intervention of human hands, and they may be smartphones, electrical devices, cars, or even traffic lights.

Internet of Things applications

Using devices equipped with sensors capable of sending a huge amount of data over the network for analysis and processing will lead to revolutionary applications such as smart homes, self-driving cars, and fully automated laboratories.More broadly, IOT can be applied to urban infrastructure and services to transform them into smart cities with innovative technology solutions that contribute to improving the quality of life for citizens and visitors. These solutions will include transportation networks, electricity, water, health services, security, and many other services.

How can we use future technologies?

We can benefit enormously from the availability of such technologies in the largest financial, commercial, industrial, and agricultural systems. In short, we can take full advantage of this technology by automating everything in the world so we save a lot of time, effort, wasted financial resources, and human resources.



WhatsApp helps the Australian authorities in their investigation to trace a Belgian tourist who has been missing since May. The 18-year-old tourist disappeared on his way back to his residence on May 31, after sending several messages using WhatsApp.IT experts indicate that WhatsApp won’t be able to access the same message content, but only to the metadata. This is because the WhatsApp messaging service is encrypted, so it is difficult to assess what was included in the messages. The only thing we can use is data about the conversations that have taken place, such as knowing whom you were in contact with, and also their location if you’ve shared it with someone. Note that his device was working during that time.The young tourist’s father traveled to Australia to help look for his son and asked WhatsApp officials to do their best to locate him. He told reporters that he understood and respected the privacy policies of the app but he would like them to understand that it was about a person who might be in grave danger.Officials at WhatsApp said they were helping the authorities to provide the information they requested, explaining that they were fully sympathetic to the young man’s family, that they understood the importance of the authorities’ investigations, and that they were cooperating with them in accordance with the app’s laws and terms of service.

Renad AL Majed Group (RMG) recognize The Specialized Hospital of His Majesty King Fahd in Dammam

The Specialized Hospital of His Majesty King Fahd in Dammam – Executive Management for Operation. Four certificates from the International Organization for Standardization (ISO):

The application of these specifications is a complement to the effective role the hospital plays in enhancing the quality of health sector services in the Middle East, and in the context of its continuous efforts to provide a healthy and safe work environment that helps it to provide excellent health services to beneficiaries.Where the hospital obtained a Quality Management System certificate after a comprehensive evaluation process and based on multiple criteria to determine internal and external risks and ensure that corrective measures are taken after evaluating the quality management system and achieving operational efficiency at the level of the services provided.The Specialized Hospital of His Majesty King Fahd in Dammam – Executive Management for Operation. Four certificates from (ISO)The ISO 9001 standard is considered the most internationally famous standard in the field of quality systems management, as it provides many benefits, for example: 
  1. Increasing the quality of services and products
  2. Reducing mistakes
  3. time-saving
  4. Organizing expenses
  5. Optimal use of available resources
The hospital also obtained two certificates, one in occupational safety (ISO45001: 2018) and the other in building management (ISO 41001: 2018), which is considered one of the integrated standards that ensure a safe work environment by applying all safety requirements and ensuring the eligibility of workplaces and periodic maintenance of buildings.In light of its approval of the international standards of the Environment Management System, the hospital obtained the international accreditation certificate (ISO 14001: 2015), which helps the facilities to follow the best international standards for building a sound environmental system.This standard specifies the best way to develop an effective environmental management system while sustaining its success by providing distinguished health services.During the celebration of this occasion, the Executive Director of Specialized Hospital of His Majesty King Fahd in Dammam, Dr. Mansour bin Ahmed Tawfiq, said that this certificate is considered one of the distinguished ancient accreditations in the world, adding that there are several basic stages for obtaining certificates which include preparation, review, examination and training. He pointed out that at every stage, all procedures were evaluated and corrected, to complete the basic requirements for accreditation, also he emphasized that obtaining certificates for the executive management of the operation has several benefits, the most important of which are:
  1. Achieve the safety and satisfaction of patients, visitors and workers.
  2. Reducing accidents that may arise from the risks of the facility's safety.
  3. Improve the image of the hospital.
 And that obtaining certificates by an internationally specialized company is the first line in maintaining the standards of quality management, which passes an integrated series of follow-up, monitoring and daily scrutiny, through inspection tours, corrective reports, preventive maintenance and follow-up opinions of utility users, also the collection of information necessary to build accurate indicators by raising the quality of service.In turn, the General Director of Renad AL Majed Group (RMG) Mr. Abdulkarim Abdulrahman Binmuharib, the consulting company implementing the project, expressed his happiness at the successful completion of the project, praising the efforts made by the staff of King Fahd Specialist Hospital in Dammam and the team of Renad AL Majed Group (RMG).Specialized Hospital of His Majesty King FahdThe IRCA Certified, Lead Auditor and Executive Director of Renad AL Majed Group (RMG) Eng. Fayyad Muhammad Hani Bayan spoke about the stages of the project implementation, where he said, " A team of experts and consultants was formed under the leadership of a project manager specialized in the field of quality and who is Mr.Tareq Shehadeh. Establishing an action plan according to Prince 2 methodology, where the project was divided into six phases:
  • The first stage began with an assessment of the current situation in the executive management of employment
  • Then the second stage followed, where the policies related to quality management, support services department, maintenance management, and safety and security management were reviewed
  • In the third stage, the focus was on building a coherent quality system by setting up systematic work procedures and then applying them to the relevant departments
  • The fourth stage included training of employees on quality systems by holding four workshops attended by employees of various departments and the part of transferring knowledge to employees inside the hospital was worked as internal auditors within the scope of the hospital.
  • With the beginning of the fifth stage, the two-minute team organized the internal audit tours.
  • In the sixth stage, the Global Grants Company conducted a comprehensive audit and recommended, through its Executive Council, the granting of international accreditation certificates.
And thanks to God, Renad AL-Majed Group (RMG) received a certificate of thanks and appreciation to its employees from consultants, auditors, and project manager for her unlimited cooperation in successfully completing this mega project with high quality and on time. Useful Links:
  • Quality management system
  • ISO 9001:2015
  • ISO45001: 2018
  • ISO14001: 2015
  • ISO 41001: 2018
  • IRCA