
Last year, during a routine advisory assignment, I walked into a SACCO that believed it had strong cybersecurity. The board...

Last year, during a routine advisory assignment, I walked into a SACCO that believed it had strong cybersecurity. The board...

The early morning storm. On 12th September 2023, a sudden downpour turned Kampala Road into a river. While taxi drivers...

Dear Assurance Manager, Let me pull back the curtain on a real case. A financial institution processed over 300 mobile...

March 2025, Western Uganda. An accountant at a private university sat nervously across from our team at Summit Consulting Ltd....

Setting: A dusty, humming office in Lira District. A procurement officer leans over her computer and clicks “Shift + Delete.”...

It all starts with a compromise It always begins with a password. In June 2024, a procurement officer at a...

One Wednesday morning in August 2024, the Finance Director of a top-tier insurance company in the region clicked an email...

AI vs AI: Fighting Fraud with the Same Weapon Fraudsters Use Scene: Ntinda, Kampala. March 2025. A junior accountant receives...

On the sticky floor of a dimly lit bar in Kabalagala, Suspect 1 sealed the deal with a casual handshake....

The first thing Stella noticed was the silence. It wasn’t the usual kind, the quiet hum of people settling into...
we specialize in bridging the gap between knowledge and application.

© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd