IFIS short courses

Yearly Monthly Weekly Daily List
August 2025

Certified Fraud Examiner (August)

The Certified Fraud Examiner (CFE) Training Program equips participants with the essential skills to detect, deter, and prevent fraud in various industries across all sectors of an organization.
02 - 24 Aug
8:00 am - 5:00 pm
September 2025

Data Protection & Privacy Training for Hospitals & Schools

Why you must attend Hospitals health facilites handle the most sensitive type of data—patient information. A single data breach can expose medical records, violate patient trust, and lead to severe legal consequences. Yet, many hospitals still treat data protection as an afterthought rather than a core function. Medical professionals focus on saving lives. But who is protecting patient data? Many hospitals unknowingly expose confidential information through weak systems, careless handling, and lack of awareness. Compliance with data protection laws is not optional—it is a legal and ethical responsibility. This training will equip hospital administrators, IT staff, and medical practitioners with practical strategies to secure patient data, ensure compliance, and prevent costly data breaches. Key learning outcomes a) Understand data privacy and protection laws and compliance requirements specific to hospitals. b) Learn how patient data is exposed—and how to prevent breaches. c) Discover best practices for securing medical records, electronic health systems, and patient files. d) Identify common hospital data privacy risks and how to mitigate them. e) Explore strategies for secure data handling, storage, and sharing in hospitals. f) Learn how to respond to data breaches and manage risk effectively. g) Understand the role of hospital staff in ensuring patient privacy. h) Work through real-world case studies of data breaches in healthcare settings. Who should attend? a) Hospital and school administrators and management are responsible for compliance and risk. b) Doctors, nurses, medical staff, school administrators and teachers who handle patient data daily. c) IT and cybersecurity teams securing hospital data systems. d) Records and data officers manage patient files and medical records. e) Legal and compliance officers ensure hospitals meet data protection regulations. f) HR personnel handling staff and patient personal data. g) Insurance and billing officers dealing with sensitive financial and medical information. The abandoned patient file A doctor at a private hospital in Kampala left a patient file on his desk. A visitor walked in, took photos of the medical report, and shared them on social media. Within hours, the patient’s confidential HIV status was exposed to the public. The hospital faced a lawsuit, lost credibility, and paid heavy fines. This is how simple lapses cause major privacy violations. Most hospitals do not suffer from hackers—they suffer from careless handling of patient data. This training will teach you how to prevent such incidents before they happen. Secure your spot now A hospital cannot function without patient trust. If patients do not believe their information is safe, they will go elsewhere. Data protection is not just about compliance—it is about safeguarding patient dignity. Next steps: Register now to secure your seat. Limited slots available. Bring your team. Data protection is a shared responsibility. Contact us for group discounts or more details. Act now. A hospital’s greatest asset is its reputation. Protect it.
25 Sep
8:00 am - 6:00 pm
October 2025

International Cyber Security Awareness Month – October 2025

Cybersecurity is no longer an IT issue; it is a business survival issue. Hackers attack systems through users. And the weakest link in any organization is unaware employees who fall for phishing emails, use weak passwords, or unknowingly expose sensitive data.
13 - 17 Oct
8:00 am - 6:00 pm

Cyber Security Conference 2025

Theme: “Securing the Future – AI-Driven Security and Risk Management (Trends, Threats, and Tools)” Date: 16th October 2025 Venue: Speke Resort Munyonyo Fees: UGX 650,000 (Non-members) UGX 500,000 (IFIS Alumni, members and Students). To become a member, enroll on any of our courses here>> or apply for membership here, if you have any international professional certification. Why you must attend Artificial Intelligence (AI) is transforming cybersecurity. But is it securing us, or making us more vulnerable? AI-driven security tools can detect threats faster, predict attacks, and automate defenses. Yet, hackers are also using AI to launch smarter, more adaptive cyber-attacks. The race is on—organizations must stay ahead or risk being left exposed. This conference is for leaders and decision-makers who need to understand how AI is reshaping cybersecurity. It is not just another IT conference—it is where strategy meets innovation, where we discuss real-world threats, tools, and the future of risk management. Cyber threats are no longer theoretical. They are here, evolving, and targeting businesses, governments, and individuals. The question is, are you ready? Key conference highlights a) The AI advantage in cybersecurity – How AI is detecting and preventing cyber threats faster than ever. b) AI-powered cybercrime – How hackers are using AI to automate attacks and bypass security systems. c) Emerging cyber threats of 2025 and beyond – The evolving threat landscape and how to prepare for the unknown. d) AI-driven risk management – How organizations can use AI to assess, predict, and mitigate risks in real time. e) The future of cybersecurity jobs – Will AI replace cybersecurity professionals, or create new opportunities? f) Regulatory and ethical considerations – Balancing AI adoption with data privacy and compliance requirements. g) Practical AI security tools – Live demos and case studies on AI-driven security solutions. h) Expert panel discussions – Insights from top cybersecurity minds on strategy, innovation, and real-world implementation. Who should attend? a) CEOs, CFOs, and business leaders – Cybersecurity is no longer just an IT issue; it is a business survival issue. b) CISOs, IT security professionals, and cybersecurity teams – Stay ahead of AI-driven threats and defenses. c) Risk and compliance officers – Learn how AI is reshaping regulatory compliance and risk management. d) Government and law enforcement agencies – Understand how AI-driven threats impact national security. e) Banking and financial sector professionals – Protect your institution from AI-powered fraud and cyberattacks. f) Healthcare and data-driven industries – Secure patient records, intellectual property, and sensitive data. g) Academics and cybersecurity researchers – Explore AI’s role in the next generation of cybersecurity. h) Tech innovators and startups – Learn how to integrate AI-driven security into products and services. The AI-powered con artist A high-level executive in Kampala received a phone call from his “CEO” asking him to authorize an urgent payment. The voice sounded exactly like the CEO. But it wasn’t. Hackers had used AI voice-cloning technology to impersonate him. By the time the fraud was detected, UGX 22 million had already been transferred. This is not fiction. AI is changing the game, for both security and cybercrime. Spam emails now sound and look very professional. The email redflags of spelling mistakes, and poor grammar have now dissappeared. You must use AI tools to detect AI cybercriminals. Interesting times indeed! The tools that protect us are the same tools criminals are using to attack us. The only way to stay ahead is to understand these technologies—and that is what this conference is about. Secure your spot now The future of cybersecurity is AI-driven. The question is, will you be in control, or will you be a victim? Next steps: Register now, click here >> Bring your team. Cybersecurity is a collective responsibility. Contact us for sponsorship, group discounts, or more details. Take action today. AI is not waiting for you to catch up. Be part of the conversation that secures the future.
16 Oct
8:00 am - 6:00 pm
No event found!
You have been successfully Subscribed! Ops! Something went wrong, please try again.

About Us

 we specialize in bridging the gap between knowledge and application.

Recent news

  • All Post
  • Blog
  • Career Management
  • Computer Security
  • Cyber Defence
  • Cyber Incidence Response
  • Cyber Preparedness
  • Cyber Security
  • Data Privacy
  • Endpoint Security
  • Fraud Investigation and Examination
  • Fraud Management
  • IT Security Audit
  • Marketing
  • Mobile Security
  • Training
  • UX/UI Design
  • Web Development

© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd