
You have a penetration testing process. You have a risk management department. You have an internal audit team. Yet you...
You have a penetration testing process. You have a risk management department. You have an internal audit team. Yet you...
A padlock on a chicken coop means nothing if the fox has the keys. In a recent cybersecurity audit, we...
Although this is a real case drawn from field experience, the names and locations have been altered to protect confidentiality....
Every entrepreneur talks about success. But no one tells you the price tags attached. Before I pivoted to strategy, risk,...
Dear Assurance Manager, Let me pull back the curtain on a real case. A financial institution processed over 300 mobile...
Dear Managers, Let me start with a simple, real-life scenario A mid-sized financial institution I will call “Bank X” approved...
Years ago, I sat across a jittery CEO of a large logistics company in Zambia. His eyes told the story...
Human error has been highlighted as a major contributing element to cybersecurity vulnerabilities for years. It is a long-standing concern...
Due to the ever-growing threat landscape in the digital ecosystem, your business must embrace cybersecurity irrespective of the size of...
The first thing they stole was time. For nearly two years, a group of insiders siphoned money from the bank,...
we specialize in bridging the gap between knowledge and application.
Contact Us
Cyber Security Conference
Experiences & Testimonials
Free Downloads
Surveys
Quizzes
© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd