{"id":8573,"date":"2025-12-27T13:01:33","date_gmt":"2025-12-27T10:01:33","guid":{"rendered":"https:\/\/empower-sa.com\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/"},"modified":"2026-01-22T13:15:47","modified_gmt":"2026-01-22T10:15:47","slug":"%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84","status":"publish","type":"post","link":"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/","title":{"rendered":"Intelligent Enterprise Risk Management: How the Three Lines of Defense Achieve Operational Security"},"content":{"rendered":"<h2><b>Intelligent Enterprise Risk Management: How the Three Lines of Defense Achieve Operational Security<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Risk management has become a decisive factor in organizations\u2019 ability to remain resilient and achieve their strategic objectives. In today\u2019s rapidly changing business environment full of complex challenges, the need has emerged for smart frameworks that transform risks from a source of threat into a tool for empowerment. This is where <\/span><b>Enterprise Risk Management (ERM)<\/b><span style=\"font-weight: 400;\"> comes into play, offering a holistic perspective and ensuring that every decision and process is linked to the protection and sustainability of the organization. Among the most effective tools in this field is the <\/span><b>Three Lines of Defense Model<\/b><span style=\"font-weight: 400;\">, an integrated framework that clearly distributes roles, enhances transparency, and forms the first shield of operational security and sound governance.<\/span><\/p>\n<h2><b>What is Enterprise Risk Management (ERM)?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Enterprise Risk Management (ERM) is a strategic approach that enables organizations to identify, assess, and address risks and opportunities at all levels. ERM goes beyond mere regulatory compliance to become an integral part of both strategic and operational decision-making. Its goal is to build a risk-aware culture, where every individual in the organization contributes consciously and responsibly to risk management. This unified framework connects risk assessments with organizational goals and daily operations, ensuring resources and efforts are directed toward the most critical risks while enhancing the ability to recover quickly from unexpected events.<\/span><\/p>\n<h2><b>The Three Lines of Defense Model: An Integrated Structure for Operational Security<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The <\/span><b>Three Lines of Defense Model<\/b><span style=\"font-weight: 400;\">, developed by the Institute of Internal Auditors (IIA), has proven its effectiveness in distributing responsibilities related to risk management and internal controls. The model enhances transparency, accountability, and comprehensive coverage of potential risks, thus strengthening operational security. It consists of three complementary lines of defense, each playing a vital role in ERM:<\/span><\/p>\n<h3><b>First Line: Risk Management at the Heart of Daily Operations<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The first line represents the frontline of risk management, encompassing all employees and operational departments that face risks in their daily activities. They are directly responsible for identifying, assessing, and monitoring risks. Being closest to workflows allows them to detect potential risks early and take initial mitigation actions. Risk management here is embedded within operations, including the implementation of preventive controls and adherence to defined policies and procedures. Tools such as risk identification templates are applied to enable early detection and reinforce operational excellence through immediate security practices like network audits and operational activity reviews.<\/span><\/p>\n<h3><b>Second Line: Specialized Oversight and Support<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The second line plays a critical role in supporting and overseeing the first line. It includes specialized risk functions such as compliance, quality, cybersecurity, and other control-related roles. This team develops frameworks, policies, and structured risk strategies at the organizational level. They monitor business units\u2019 adherence to these standards, analyze risks independently, and deliver accurate reports to senior management. Acting as a bridge between the first line and the independent third line, they ensure systematic risk management. For instance, they help analyze cyber risks through operational security best practices, preventing vulnerabilities and enabling rapid response.<\/span><\/p>\n<h3><b>Third Line: Internal Audit and Independent Assurance<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The third line provides the final layer of defense, represented by the internal audit function or other independent evaluators. Internal auditors operate independently of executive management, offering objective assessments of the effectiveness of the first and second lines. Their role is to verify that risks are being managed effectively and that internal controls are functioning as intended. Internal auditors present reports and recommendations to senior management and the board, strengthening control systems and overall risk management. This independence enhances integrity and transparency, providing an impartial \u201cthird eye\u201d that supports continuous improvement.<\/span><\/p>\n<h2><b>Integration of the Lines for Smart Operational Security<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The success of ERM does not depend solely on the existence of these three lines, but on their integration and effective communication. Together, they achieve operational security by embedding intelligence into forecasting and response processes, reducing costs, and improving efficiency.<\/span><\/p>\n<p><b>Table: Roles and Responsibilities Across the Three Lines<\/b><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Example Activities<\/b><\/td>\n<td><b>Example Activities<\/b><\/td>\n<td><b>Line of Defense<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Apply cybersecurity policies, manage operational risks in production, adhere to defined processes.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Identify and manage daily risks, implement controls, raise risk awareness.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">First Line (Operational Management)<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Develop compliance policies, analyze cyber risks, review control effectiveness.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Develop frameworks and policies, monitor and assess risks, provide guidance and support.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Second Line (Support &amp; Oversight Functions)<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Audit financial systems, review efficiency of internal controls, recommend improvements to the board.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Independently assess the first and second lines, provide objective assurance, identify weaknesses.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Third Line (Internal Audit)<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><b>Strengthening Operational Resilience: How Do the Lines Work Together?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Integrating ERM with the Three Lines of Defense offers organizations a practical framework for accountability, transparency, and resilience. This collaboration yields several benefits:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Integrated Perspective<\/b><span style=\"font-weight: 400;\">: ERM establishes organization-wide risk metrics, translating them into policies and controls enforced across all lines.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Balance and Transparency<\/b><span style=\"font-weight: 400;\">: The model ensures a mix of auditing, compliance, and technical oversight, reducing blind spots and providing reliable governance reports.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Preparedness and Recovery<\/b><span style=\"font-weight: 400;\">: With shared understanding of mitigable risks and staged acceptance of residual risks, organizations become more resilient in crises while maintaining service continuity.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Enhanced Internal Controls<\/b><span style=\"font-weight: 400;\">: The independent third line provides added trust in control systems, ensuring periodic testing and continuous improvement.<\/span><span style=\"font-weight: 400;\">\n<p><\/span><\/li>\n<\/ul>\n<h2><b>Practical Steps to Apply the Three Lines of Defense Model<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">To implement this model effectively, organizations can follow these steps:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Clarify Roles and Responsibilities<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\"> Define and document responsibilities for each line within governance policies and internal controls. This prevents overlap or gaps in accountability.<\/span><span style=\"font-weight: 400;\"><\/p>\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Build a Risk Register<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\"> Develop a comprehensive risk register to consolidate risks across all activities, prioritize mitigation, and assign responsibilities. Update regularly to reflect evolving risk environments.<\/span><span style=\"font-weight: 400;\"><\/p>\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Strengthen Training and Communication<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\"> Provide ongoing training to all employees on their role in risk management, while establishing clear communication channels among the lines to share information about risks, controls, and review outcomes.<\/span><span style=\"font-weight: 400;\"><\/p>\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Ensure Independence of Internal Audit<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\"> Guarantee that internal audit maintains independence and reports directly to the board or audit committee, ensuring objective, credible insights that strengthen governance.<\/span><span style=\"font-weight: 400;\"><\/p>\n<p><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Measure Performance and Drive Continuous Improvement<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\"> Use KPIs to measure the effectiveness of controls, incident recovery, and compliance with policies. Update the ERM framework continuously based on these evaluations to remain aligned with operational and technological changes.<\/span><span style=\"font-weight: 400;\"><\/p>\n<p><\/span><\/li>\n<\/ol>\n<h2><b>Conclusion<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Applying the Three Lines of Defense Model is not merely a control practice it is a strategic pillar reflecting institutional awareness of governance and sustainability requirements. With clear roles, integration across lines, and a commitment to continuous improvement, organizations can build safe, resilient environments capable of facing crises and seizing opportunities simultaneously. This is the true value: transforming risk management from an operational burden into an enabling force that drives institutional excellence and long-term success.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this context, <\/span><b>Empower<\/b><span style=\"font-weight: 400;\"> supports organizations by designing and activating integrated risk management and governance frameworks, aligned with international best practices and adapted to local requirements enhancing readiness and institutional sustainability.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intelligent Enterprise Risk Management: How the Three Lines of Defense Achieve Operational [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":8574,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[152],"tags":[176,178,177,179],"class_list":["post-8573","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-152","tag-176","tag-178","tag-177","tag-179"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Intelligent Enterprise Risk Management: How the Three Lines of Defense Achieve Operational Security - Empower-\u0625\u0645\u0628\u0627\u0648\u0631<\/title>\n<meta name=\"description\" content=\"How does the Three Lines of Defense model within ERM achieve operational security and resilience? By clarifying responsibilities, enhancing transparency, and strengthening institutional governance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/empower-sa.com\/en\/\u0625\u062f\u0627\u0631\u0629-\u0627\u0644\u0645\u062e\u0627\u0637\u0631-\u0627\u0644\u0645\u0624\u0633\u0633\u064a\u0629-\u0628\u0630\u0643\u0627\u0621-\u0643\u064a\u0641-\u062a\u0639\u0645\u0644\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intelligent Enterprise Risk Management: How the Three Lines of Defense Achieve Operational Security - Empower-\u0625\u0645\u0628\u0627\u0648\u0631\" \/>\n<meta property=\"og:description\" content=\"How does the Three Lines of Defense model within ERM achieve operational security and resilience? By clarifying responsibilities, enhancing transparency, and strengthening institutional governance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/empower-sa.com\/en\/\u0625\u062f\u0627\u0631\u0629-\u0627\u0644\u0645\u062e\u0627\u0637\u0631-\u0627\u0644\u0645\u0624\u0633\u0633\u064a\u0629-\u0628\u0630\u0643\u0627\u0621-\u0643\u064a\u0641-\u062a\u0639\u0645\u0644\/\" \/>\n<meta property=\"og:site_name\" content=\"Empower-\u0625\u0645\u0628\u0627\u0648\u0631\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-27T10:01:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-22T10:15:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/empower-sa.com\/wp-content\/uploads\/2025\/12\/\u0625\u062f\u0627\u0631\u0629-\u0627\u0644\u0645\u062e\u0627\u0637\u0631-\u0627\u0644\u0645\u0624\u0633\u0633\u064a\u0629-\u0628\u0630\u0643\u0627\u0621-\u0643\u064a\u0641-\u062a\u0639\u0645\u0644-\u062e\u0637\u0648\u0637-\u0627\u0644\u062f\u0641\u0627\u0639-\u0627\u0644\u062b\u0644\u0627\u062b\u0629-\u0644\u062a\u062d\u0642\u064a\u0642-\u0627\u0644\u0623\u0645\u0627\u0646-\u0627\u0644\u062a\u0634\u063a\u064a\u0644\u064a\u061f.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1195\" \/>\n\t<meta property=\"og:image:height\" content=\"896\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Empower\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@empower_ksa\" \/>\n<meta name=\"twitter:site\" content=\"@empower_ksa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Empower\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/\"},\"author\":{\"name\":\"Empower\",\"@id\":\"https:\/\/empower-sa.com\/#\/schema\/person\/2ef0aca99a7a253f3de80b1f4b2b9738\"},\"headline\":\"Intelligent Enterprise Risk Management: How the Three Lines of Defense Achieve Operational Security\",\"datePublished\":\"2025-12-27T10:01:33+00:00\",\"dateModified\":\"2026-01-22T10:15:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/\"},\"wordCount\":1149,\"publisher\":{\"@id\":\"https:\/\/empower-sa.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/empower-sa.com\/wp-content\/uploads\/2025\/12\/\u0625\u062f\u0627\u0631\u0629-\u0627\u0644\u0645\u062e\u0627\u0637\u0631-\u0627\u0644\u0645\u0624\u0633\u0633\u064a\u0629-\u0628\u0630\u0643\u0627\u0621-\u0643\u064a\u0641-\u062a\u0639\u0645\u0644-\u062e\u0637\u0648\u0637-\u0627\u0644\u062f\u0641\u0627\u0639-\u0627\u0644\u062b\u0644\u0627\u062b\u0629-\u0644\u062a\u062d\u0642\u064a\u0642-\u0627\u0644\u0623\u0645\u0627\u0646-\u0627\u0644\u062a\u0634\u063a\u064a\u0644\u064a\u061f.jpg\",\"keywords\":[\"Risk Management\",\"Risk Management\",\"Risk Management and Corporate Governance\",\"Risk Management and Corporate Governance Consulting\"],\"articleSection\":[\"Risk Management and Corporate Governance Consulting\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/\",\"url\":\"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/\",\"name\":\"Intelligent Enterprise Risk Management: How the Three Lines of Defense Achieve Operational Security - Empower-\u0625\u0645\u0628\u0627\u0648\u0631\",\"isPartOf\":{\"@id\":\"https:\/\/empower-sa.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/empower-sa.com\/wp-content\/uploads\/2025\/12\/\u0625\u062f\u0627\u0631\u0629-\u0627\u0644\u0645\u062e\u0627\u0637\u0631-\u0627\u0644\u0645\u0624\u0633\u0633\u064a\u0629-\u0628\u0630\u0643\u0627\u0621-\u0643\u064a\u0641-\u062a\u0639\u0645\u0644-\u062e\u0637\u0648\u0637-\u0627\u0644\u062f\u0641\u0627\u0639-\u0627\u0644\u062b\u0644\u0627\u062b\u0629-\u0644\u062a\u062d\u0642\u064a\u0642-\u0627\u0644\u0623\u0645\u0627\u0646-\u0627\u0644\u062a\u0634\u063a\u064a\u0644\u064a\u061f.jpg\",\"datePublished\":\"2025-12-27T10:01:33+00:00\",\"dateModified\":\"2026-01-22T10:15:47+00:00\",\"description\":\"How does the Three Lines of Defense model within ERM achieve operational security and resilience? By clarifying responsibilities, enhancing transparency, and strengthening institutional governance.\",\"breadcrumb\":{\"@id\":\"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/#primaryimage\",\"url\":\"https:\/\/empower-sa.com\/wp-content\/uploads\/2025\/12\/\u0625\u062f\u0627\u0631\u0629-\u0627\u0644\u0645\u062e\u0627\u0637\u0631-\u0627\u0644\u0645\u0624\u0633\u0633\u064a\u0629-\u0628\u0630\u0643\u0627\u0621-\u0643\u064a\u0641-\u062a\u0639\u0645\u0644-\u062e\u0637\u0648\u0637-\u0627\u0644\u062f\u0641\u0627\u0639-\u0627\u0644\u062b\u0644\u0627\u062b\u0629-\u0644\u062a\u062d\u0642\u064a\u0642-\u0627\u0644\u0623\u0645\u0627\u0646-\u0627\u0644\u062a\u0634\u063a\u064a\u0644\u064a\u061f.jpg\",\"contentUrl\":\"https:\/\/empower-sa.com\/wp-content\/uploads\/2025\/12\/\u0625\u062f\u0627\u0631\u0629-\u0627\u0644\u0645\u062e\u0627\u0637\u0631-\u0627\u0644\u0645\u0624\u0633\u0633\u064a\u0629-\u0628\u0630\u0643\u0627\u0621-\u0643\u064a\u0641-\u062a\u0639\u0645\u0644-\u062e\u0637\u0648\u0637-\u0627\u0644\u062f\u0641\u0627\u0639-\u0627\u0644\u062b\u0644\u0627\u062b\u0629-\u0644\u062a\u062d\u0642\u064a\u0642-\u0627\u0644\u0623\u0645\u0627\u0646-\u0627\u0644\u062a\u0634\u063a\u064a\u0644\u064a\u061f.jpg\",\"width\":1195,\"height\":896,\"caption\":\"\u0625\u062f\u0627\u0631\u0629 \u0627\u0644\u0645\u062e\u0627\u0637\u0631 \u0627\u0644\u0645\u0624\u0633\u0633\u064a\u0629 \u0628\u0630\u0643\u0627\u0621 \u0643\u064a\u0641 \u062a\u0639\u0645\u0644 \u062e\u0637\u0648\u0637 \u0627\u0644\u062f\u0641\u0627\u0639 \u0627\u0644\u062b\u0644\u0627\u062b\u0629 \u0644\u062a\u062d\u0642\u064a\u0642 \u0627\u0644\u0623\u0645\u0627\u0646 \u0627\u0644\u062a\u0634\u063a\u064a\u0644\u064a\u061f\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/empower-sa.com\/en\/empower\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intelligent Enterprise Risk Management: How the Three Lines of Defense Achieve Operational Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/empower-sa.com\/#website\",\"url\":\"https:\/\/empower-sa.com\/\",\"name\":\"Empower-\u0625\u0645\u0628\u0627\u0648\u0631\",\"description\":\"\u0646\u0645\u0643\u0646 \u0627\u0644\u0645\u0646\u0638\u0645\u0627\u062a\",\"publisher\":{\"@id\":\"https:\/\/empower-sa.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/empower-sa.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/empower-sa.com\/#organization\",\"name\":\"Empower-\u0625\u0645\u0628\u0627\u0648\u0631\",\"url\":\"https:\/\/empower-sa.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/empower-sa.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/empower-sa.com\/wp-content\/uploads\/2025\/02\/Empower-Logo-43-1.png\",\"contentUrl\":\"https:\/\/empower-sa.com\/wp-content\/uploads\/2025\/02\/Empower-Logo-43-1.png\",\"width\":1086,\"height\":647,\"caption\":\"Empower-\u0625\u0645\u0628\u0627\u0648\u0631\"},\"image\":{\"@id\":\"https:\/\/empower-sa.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/empower_ksa\",\"https:\/\/www.linkedin.com\/company\/empower-co-\/\",\"https:\/\/www.youtube.com\/@empowerco2217\",\"https:\/\/www.instagram.com\/empower_ksa\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/empower-sa.com\/#\/schema\/person\/2ef0aca99a7a253f3de80b1f4b2b9738\",\"name\":\"Empower\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/empower-sa.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8057048b6c2e09c6b87b13e76eae2035185ef881d3a8b34b79a16ebfd8af2c7f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8057048b6c2e09c6b87b13e76eae2035185ef881d3a8b34b79a16ebfd8af2c7f?s=96&d=mm&r=g\",\"caption\":\"Empower\"},\"url\":\"https:\/\/empower-sa.com\/en\/author\/auther\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intelligent Enterprise Risk Management: How the Three Lines of Defense Achieve Operational Security - Empower-\u0625\u0645\u0628\u0627\u0648\u0631","description":"How does the Three Lines of Defense model within ERM achieve operational security and resilience? By clarifying responsibilities, enhancing transparency, and strengthening institutional governance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/empower-sa.com\/en\/\u0625\u062f\u0627\u0631\u0629-\u0627\u0644\u0645\u062e\u0627\u0637\u0631-\u0627\u0644\u0645\u0624\u0633\u0633\u064a\u0629-\u0628\u0630\u0643\u0627\u0621-\u0643\u064a\u0641-\u062a\u0639\u0645\u0644\/","og_locale":"en_US","og_type":"article","og_title":"Intelligent Enterprise Risk Management: How the Three Lines of Defense Achieve Operational Security - Empower-\u0625\u0645\u0628\u0627\u0648\u0631","og_description":"How does the Three Lines of Defense model within ERM achieve operational security and resilience? By clarifying responsibilities, enhancing transparency, and strengthening institutional governance.","og_url":"https:\/\/empower-sa.com\/en\/\u0625\u062f\u0627\u0631\u0629-\u0627\u0644\u0645\u062e\u0627\u0637\u0631-\u0627\u0644\u0645\u0624\u0633\u0633\u064a\u0629-\u0628\u0630\u0643\u0627\u0621-\u0643\u064a\u0641-\u062a\u0639\u0645\u0644\/","og_site_name":"Empower-\u0625\u0645\u0628\u0627\u0648\u0631","article_published_time":"2025-12-27T10:01:33+00:00","article_modified_time":"2026-01-22T10:15:47+00:00","og_image":[{"width":1195,"height":896,"url":"https:\/\/empower-sa.com\/wp-content\/uploads\/2025\/12\/\u0625\u062f\u0627\u0631\u0629-\u0627\u0644\u0645\u062e\u0627\u0637\u0631-\u0627\u0644\u0645\u0624\u0633\u0633\u064a\u0629-\u0628\u0630\u0643\u0627\u0621-\u0643\u064a\u0641-\u062a\u0639\u0645\u0644-\u062e\u0637\u0648\u0637-\u0627\u0644\u062f\u0641\u0627\u0639-\u0627\u0644\u062b\u0644\u0627\u062b\u0629-\u0644\u062a\u062d\u0642\u064a\u0642-\u0627\u0644\u0623\u0645\u0627\u0646-\u0627\u0644\u062a\u0634\u063a\u064a\u0644\u064a\u061f.jpg","type":"image\/jpeg"}],"author":"Empower","twitter_card":"summary_large_image","twitter_creator":"@empower_ksa","twitter_site":"@empower_ksa","twitter_misc":{"Written by":"Empower","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/#article","isPartOf":{"@id":"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/"},"author":{"name":"Empower","@id":"https:\/\/empower-sa.com\/#\/schema\/person\/2ef0aca99a7a253f3de80b1f4b2b9738"},"headline":"Intelligent Enterprise Risk Management: How the Three Lines of Defense Achieve Operational Security","datePublished":"2025-12-27T10:01:33+00:00","dateModified":"2026-01-22T10:15:47+00:00","mainEntityOfPage":{"@id":"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/"},"wordCount":1149,"publisher":{"@id":"https:\/\/empower-sa.com\/#organization"},"image":{"@id":"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/#primaryimage"},"thumbnailUrl":"https:\/\/empower-sa.com\/wp-content\/uploads\/2025\/12\/\u0625\u062f\u0627\u0631\u0629-\u0627\u0644\u0645\u062e\u0627\u0637\u0631-\u0627\u0644\u0645\u0624\u0633\u0633\u064a\u0629-\u0628\u0630\u0643\u0627\u0621-\u0643\u064a\u0641-\u062a\u0639\u0645\u0644-\u062e\u0637\u0648\u0637-\u0627\u0644\u062f\u0641\u0627\u0639-\u0627\u0644\u062b\u0644\u0627\u062b\u0629-\u0644\u062a\u062d\u0642\u064a\u0642-\u0627\u0644\u0623\u0645\u0627\u0646-\u0627\u0644\u062a\u0634\u063a\u064a\u0644\u064a\u061f.jpg","keywords":["Risk Management","Risk Management","Risk Management and Corporate Governance","Risk Management and Corporate Governance Consulting"],"articleSection":["Risk Management and Corporate Governance Consulting"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/","url":"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/","name":"Intelligent Enterprise Risk Management: How the Three Lines of Defense Achieve Operational Security - Empower-\u0625\u0645\u0628\u0627\u0648\u0631","isPartOf":{"@id":"https:\/\/empower-sa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/#primaryimage"},"image":{"@id":"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/#primaryimage"},"thumbnailUrl":"https:\/\/empower-sa.com\/wp-content\/uploads\/2025\/12\/\u0625\u062f\u0627\u0631\u0629-\u0627\u0644\u0645\u062e\u0627\u0637\u0631-\u0627\u0644\u0645\u0624\u0633\u0633\u064a\u0629-\u0628\u0630\u0643\u0627\u0621-\u0643\u064a\u0641-\u062a\u0639\u0645\u0644-\u062e\u0637\u0648\u0637-\u0627\u0644\u062f\u0641\u0627\u0639-\u0627\u0644\u062b\u0644\u0627\u062b\u0629-\u0644\u062a\u062d\u0642\u064a\u0642-\u0627\u0644\u0623\u0645\u0627\u0646-\u0627\u0644\u062a\u0634\u063a\u064a\u0644\u064a\u061f.jpg","datePublished":"2025-12-27T10:01:33+00:00","dateModified":"2026-01-22T10:15:47+00:00","description":"How does the Three Lines of Defense model within ERM achieve operational security and resilience? By clarifying responsibilities, enhancing transparency, and strengthening institutional governance.","breadcrumb":{"@id":"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/#primaryimage","url":"https:\/\/empower-sa.com\/wp-content\/uploads\/2025\/12\/\u0625\u062f\u0627\u0631\u0629-\u0627\u0644\u0645\u062e\u0627\u0637\u0631-\u0627\u0644\u0645\u0624\u0633\u0633\u064a\u0629-\u0628\u0630\u0643\u0627\u0621-\u0643\u064a\u0641-\u062a\u0639\u0645\u0644-\u062e\u0637\u0648\u0637-\u0627\u0644\u062f\u0641\u0627\u0639-\u0627\u0644\u062b\u0644\u0627\u062b\u0629-\u0644\u062a\u062d\u0642\u064a\u0642-\u0627\u0644\u0623\u0645\u0627\u0646-\u0627\u0644\u062a\u0634\u063a\u064a\u0644\u064a\u061f.jpg","contentUrl":"https:\/\/empower-sa.com\/wp-content\/uploads\/2025\/12\/\u0625\u062f\u0627\u0631\u0629-\u0627\u0644\u0645\u062e\u0627\u0637\u0631-\u0627\u0644\u0645\u0624\u0633\u0633\u064a\u0629-\u0628\u0630\u0643\u0627\u0621-\u0643\u064a\u0641-\u062a\u0639\u0645\u0644-\u062e\u0637\u0648\u0637-\u0627\u0644\u062f\u0641\u0627\u0639-\u0627\u0644\u062b\u0644\u0627\u062b\u0629-\u0644\u062a\u062d\u0642\u064a\u0642-\u0627\u0644\u0623\u0645\u0627\u0646-\u0627\u0644\u062a\u0634\u063a\u064a\u0644\u064a\u061f.jpg","width":1195,"height":896,"caption":"\u0625\u062f\u0627\u0631\u0629 \u0627\u0644\u0645\u062e\u0627\u0637\u0631 \u0627\u0644\u0645\u0624\u0633\u0633\u064a\u0629 \u0628\u0630\u0643\u0627\u0621 \u0643\u064a\u0641 \u062a\u0639\u0645\u0644 \u062e\u0637\u0648\u0637 \u0627\u0644\u062f\u0641\u0627\u0639 \u0627\u0644\u062b\u0644\u0627\u062b\u0629 \u0644\u062a\u062d\u0642\u064a\u0642 \u0627\u0644\u0623\u0645\u0627\u0646 \u0627\u0644\u062a\u0634\u063a\u064a\u0644\u064a\u061f"},{"@type":"BreadcrumbList","@id":"https:\/\/empower-sa.com\/en\/%d8%a5%d8%af%d8%a7%d8%b1%d8%a9-%d8%a7%d9%84%d9%85%d8%ae%d8%a7%d8%b7%d8%b1-%d8%a7%d9%84%d9%85%d8%a4%d8%b3%d8%b3%d9%8a%d8%a9-%d8%a8%d8%b0%d9%83%d8%a7%d8%a1-%d9%83%d9%8a%d9%81-%d8%aa%d8%b9%d9%85%d9%84\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/empower-sa.com\/en\/empower\/"},{"@type":"ListItem","position":2,"name":"Intelligent Enterprise Risk Management: How the Three Lines of Defense Achieve Operational Security"}]},{"@type":"WebSite","@id":"https:\/\/empower-sa.com\/#website","url":"https:\/\/empower-sa.com\/","name":"Empower-\u0625\u0645\u0628\u0627\u0648\u0631","description":"\u0646\u0645\u0643\u0646 \u0627\u0644\u0645\u0646\u0638\u0645\u0627\u062a","publisher":{"@id":"https:\/\/empower-sa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/empower-sa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/empower-sa.com\/#organization","name":"Empower-\u0625\u0645\u0628\u0627\u0648\u0631","url":"https:\/\/empower-sa.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/empower-sa.com\/#\/schema\/logo\/image\/","url":"https:\/\/empower-sa.com\/wp-content\/uploads\/2025\/02\/Empower-Logo-43-1.png","contentUrl":"https:\/\/empower-sa.com\/wp-content\/uploads\/2025\/02\/Empower-Logo-43-1.png","width":1086,"height":647,"caption":"Empower-\u0625\u0645\u0628\u0627\u0648\u0631"},"image":{"@id":"https:\/\/empower-sa.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/empower_ksa","https:\/\/www.linkedin.com\/company\/empower-co-\/","https:\/\/www.youtube.com\/@empowerco2217","https:\/\/www.instagram.com\/empower_ksa\/"]},{"@type":"Person","@id":"https:\/\/empower-sa.com\/#\/schema\/person\/2ef0aca99a7a253f3de80b1f4b2b9738","name":"Empower","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/empower-sa.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8057048b6c2e09c6b87b13e76eae2035185ef881d3a8b34b79a16ebfd8af2c7f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8057048b6c2e09c6b87b13e76eae2035185ef881d3a8b34b79a16ebfd8af2c7f?s=96&d=mm&r=g","caption":"Empower"},"url":"https:\/\/empower-sa.com\/en\/author\/auther\/"}]}},"_links":{"self":[{"href":"https:\/\/empower-sa.com\/en\/wp-json\/wp\/v2\/posts\/8573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/empower-sa.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/empower-sa.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/empower-sa.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/empower-sa.com\/en\/wp-json\/wp\/v2\/comments?post=8573"}],"version-history":[{"count":2,"href":"https:\/\/empower-sa.com\/en\/wp-json\/wp\/v2\/posts\/8573\/revisions"}],"predecessor-version":[{"id":8576,"href":"https:\/\/empower-sa.com\/en\/wp-json\/wp\/v2\/posts\/8573\/revisions\/8576"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/empower-sa.com\/en\/wp-json\/wp\/v2\/media\/8574"}],"wp:attachment":[{"href":"https:\/\/empower-sa.com\/en\/wp-json\/wp\/v2\/media?parent=8573"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/empower-sa.com\/en\/wp-json\/wp\/v2\/categories?post=8573"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/empower-sa.com\/en\/wp-json\/wp\/v2\/tags?post=8573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}