Every entrepreneur talks about success. But no one tells you the price tags attached. Before I pivoted to strategy, risk,...
Every entrepreneur talks about success. But no one tells you the price tags attached. Before I pivoted to strategy, risk,...
Dear Assurance Manager, Let me pull back the curtain on a real case. A financial institution processed over 300 mobile...
Dear Managers, Let me start with a simple, real-life scenario A mid-sized financial institution I will call “Bank X” approved...
Years ago, I sat across a jittery CEO of a large logistics company in Zambia. His eyes told the story...
Human error has been highlighted as a major contributing element to cybersecurity vulnerabilities for years. It is a long-standing concern...
In January 2023, we received a phone call from the CEO of a well-known logistics company. His voice carried the...
How Omundo stole money using ATM cards that were not his This case is about a man who tricked the...
Pornography is a silent pandemic. It claims one victim at a time. Thanks to the Internet, the problem is very...
The first thing they stole was time. For nearly two years, a group of insiders siphoned money from the bank,...
Smart devices are convenient, but they are also a hacker’s paradise. Your smart TV, speaker, and even refrigerator are potential...
we specialize in bridging the gap between knowledge and application.
Contact Us
Cyber Security Conference
Experiences & Testimonials
Free Downloads
Surveys
Quizzes
© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd