
You have a penetration testing process. You have a risk management department. You have an internal audit team. Yet you...
You have a penetration testing process. You have a risk management department. You have an internal audit team. Yet you...
A padlock on a chicken coop means nothing if the fox has the keys. In a recent cybersecurity audit, we...
A monkey tied to a tree still thinks it is free. That is the modern internet user clicking “I Agree”...
Most people think hackers wear hoodies and speak in code. That’s Hollywood nonsense. Real hackers don’t need to break your...
The incident On the morning of 3rd March 2024, a mid-sized logistics company based in Mombasa, Kenya went dark. All...
Although this is a real case drawn from field experience, the names and locations have been altered to protect confidentiality....
Every entrepreneur talks about success. But no one tells you the price tags attached. Before I pivoted to strategy, risk,...
Due to the ever-growing threat landscape in the digital ecosystem, your business must embrace cybersecurity irrespective of the size of...
In the overcrowded world of cybersecurity certifications, everyone is chasing acronyms you know several. They look good on a LinkedIn...
Dear Executive Team, Cybersecurity doesn’t have to mean writing a blank check. The conventional wisdom screams for bloated Security Operations...
we specialize in bridging the gap between knowledge and application.
Contact Us
Cyber Security Conference
Experiences & Testimonials
Free Downloads
Surveys
Quizzes
© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd