Dear Managers, Let me start with a simple, real-life scenario A mid-sized financial institution I will call “Bank X” approved...
Dear Managers, Let me start with a simple, real-life scenario A mid-sized financial institution I will call “Bank X” approved...
Dear Assurance Manager, Let me pull back the curtain on a real case. A financial institution processed over 300 mobile...
Years ago, I sat across a jittery CEO of a large logistics company in Zambia. His eyes told the story...
Human error has been highlighted as a major contributing element to cybersecurity vulnerabilities for years. It is a long-standing concern...
The first thing they stole was time. For nearly two years, a group of insiders siphoned money from the bank,...
According to Gartner’s report on ‘Innovation Insight for Attack Surface Management (ASM)’, which covers the growing need faced by security...
The increasing number and sophisticated nature of cyber-crimes prevailing in industries worldwide. As governing bodies are stepping up to help...
Application monitoring just like overall network monitoring is a vital IT function for corporate organizations. From employee productivity with the...
In today’s complex environment, employees have access to corporate networks and are authenticated to corporate systems, as well as servers,...
Human error has been highlighted as a major contributing element to cybersecurity vulnerabilities for years. It is a long-standing concern...
we specialize in bridging the gap between knowledge and application.
Contact Us
Cyber Security Conference
Experiences & Testimonials
Free Downloads
Surveys
Quizzes
© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd