Our Clients

Am honored to work with the best and of trusted partners

Hear from our clients

Dennis Owor, Internal Auditor, UNRA

In his masterful style, Mustapha addressed our Internal Audit senior staff. His message and deliverance enthralled the audience. His charisma is what initially captivates you. Unlike most speakers, Mustapha is technically competent and his delivery style is superb. When you listen to Mustapha speak you lose track of time. He has a gifted ability to speak on fraud and ethics with practical examples and humor that keep you engaged.

Michael Tugyetwena, Operations Director SNV

Mustapha Mugisa is our Strategy Expert and he worked with staff to develop a strategy that was subsequently presented to the Board of Directors and Approved, He interacted as a peer and flawlessly with our most senior management & conducted staff training in major areas of governance. Am glad to endorse Mr Mustapha Mugisa ’s skills, work and ethics without reserved and would be happy to discuss details or answer any questions about his work.

Gideon F. Mukwai, Founder, Business Storytelling Academy, Singapore

When I consulted with Mr. Mugisa for new strategies to grow my business, he met and exceeded my expectations. He helped my re-positioning with strategies that have been deepened and broadened my expertise and more importantly the identification of novel client niches. I highly recommend his work.

Ismael Kibuule Kalema, Corporate Risk Advisor

Mustapha B. Mugisa you are such an inspirational trainer.... Been using your techniques for a while and you won't believe the results. Thanks

Ismael Kibuule Kalema, Corporate Risk Advisor

Mustapha B. Mugisa you are such an inspirational trainer.... Been using your techniques for a while and you won't believe the results. Thanks

Mr.Ali Jjunju ,CEO of BudduSoft Ltd

In his masterful style, Mustapha addressed our Internal Audit senior staff. His message and deliverance enthralled the audience. His charisma is what initially captivates you. Unlike most speakers, Mustapha is technically competent and his delivery style is superb. When you listen to Mustapha speak you lose track of time. He has a gifted ability to speak on fraud and ethics with practical examples and humor that keep you engaged

.

One on One with Clients

What Our Clients Say

Dear Mustapha, it was a great pleasure having you as our guest speaker on Risk Management Framework at IIA-Rwanda.Though I still have many things to learn in the area, I have been inspired and benefited a lot from your presentations. Risk management is an area I would like to develop and invest in. Just wanted to convey my greetings from Rwanda.
Juvenal HABIYAMBERE

Our Blog

#WinningMindspark
Gorret Tumusime

Why smart teams still make dumb decisions in organisations

I have learned that intelligence does not protect organisations from failure. In many cases, it accelerates it. In 1999, engineers finished the Millennium Bridge in London. On paper, it was flawless. Elegant design. Brilliant minds. World-class modelling. On opening day, the bridge began to sway, not because of poor engineering, but because people adjusted their walking unconsciously in response to movement. Each correction amplified the wobble. Intelligence created feedback loops no one anticipated. The bridge did not fail because it was weak, but because it was smart in the wrong way. That is how smart teams still make dumb decisions. Most leadership failures are not caused by ignorance. They are caused by cognitive alignment around the wrong assumptions. Teams agree quickly, they move confidently, they execute flawlessly, and they drive straight into a wall together. That is blind alignment. If your organisation keeps making decisions that look logical in meetings but collapse in reality, the problem is not execution. It is not culture. It is not resistance to change. It is the way the human brain behaves under pressure, certainty, and fatigue. And to the staff on the frontline, exhausted by yet another pivot, another restructuring, another “strategic refresh,” let me say this clearly: your confusion is not a competence problem. It is a neurological response to incoherent leadership signals. Here is the conflict leaders rarely acknowledge. Boards and executive teams live in abstraction. Strategy decks. Roadmaps. Scenarios. The breakroom lives in consequence. New targets. New tools. New bosses. The story that connects these two worlds is often missing. That narrative void is where bad decisions breed. Middle managers, caught in between, cling to sunk costs. They defend projects not because they are working, but because abandoning them would invalidate years of effort, identity, and political capital. Behavioural economics calls this loss aversion. Neuroscience calls it threat response. The organisation experiences it as stubbornness. Frontline teams experience something else: amygdala hijack. Sudden pivots trigger the brain’s threat circuitry. Uncertainty feels like danger. Cognitive bandwidth shrinks. People stop thinking strategically and start thinking defensively. They comply, not commit. They execute tasks, not intent. From the boardroom, this looks like “resistance.” From the brain’s perspective, it is survival. Smart teams are especially vulnerable to this trap. High performers trust their cognitive maps. They believe past success proves current judgment. When data conflicts with identity, the brain chooses identity. That is the incumbent’s dilemma at a neural level. Evidence is not ignored because people are stupid. It is ignored because it threatens status, coherence, and belonging. This is why transformation efforts fail quietly. Not with rebellion, but with polite compliance and private disengagement. Now let us talk science, briefly and without romance. The brain does not process strategy as logic first. It processes it as a story first. Narrative creates safety or threat. Only after that does analysis matter. When leaders communicate change as slides and slogans, the brain hears noise. When they communicate it as a coherent story of loss, risk, and future meaning, the brain recalibrates. This is where most organisations underinvest. Not in technology. In sense-making. One practical tool I use repeatedly is the Strategic Narrative Reset. It is simple, and it works. Instead of asking, “Do people understand the strategy?” ask three questions: What are we asking people to let go of? What uncertainty are we creating that we have not named? What identity are we threatening without acknowledging it? Then build a narrative that answers those questions honestly. This is not motivation. It is cognitive alignment. Pair this with what I call neuro-prototyping. Before rolling out a major decision, test it on a small group, not for performance, but for stress signals. Confusion. Defensiveness. Silence. These are data. If the prototype creates threat responses, scaling it will multiply dysfunction, not impact. Notice how low-cost this is. No consultants. No platforms. Just disciplined listening. Here is a practical experiment you can start tomorrow. Cancel one status meeting. Replace it with a 45-minute session where leaders answer only one question from staff: “What are you most unsure about right now, and why?” No fixing. No defending. Just clarity. Watch what happens. You will see fear where you assumed laziness. Fatigue where you assumed resistance. Insight where you assumed ignorance. Smart teams stop making dumb decisions when leaders stop confusing intelligence with alignment. The Millennium Bridge was fixed by adding dampers, not by lecturing pedestrians. The system was redesigned to account for human behaviour. That is the real lesson. Leadership is not about being right in isolation. It is about designing decisions that real human brains can carry without breaking. Comfort the afflicted by naming the psychological cost of constant change. Afflict the comfortable by admitting that brilliance without empathy is fragility. That is how smart teams start making wise decisions again. I remain, Mr. Strategy.

Read More »
#WinningMindspark
Gorret Tumusime

NGO fraud red flags and why cybersecurity and fraud risk assessment are now urgent in a resource-constrained context

The incident began in early 2024 within the operational accounts of an international non-governmental organisation headquartered in Kampala. Funds earmarked for water, sanitation, and health projects were diverted systematically over several months. Donor reports showed deliverables vastly out of alignment with cash outflows. At first glance, auditors thought this was a routine bookkeeping error, but a deeper trace revealed an emerging pattern. Payments to known vendors were routinely misstated, descriptions altered, and receipts fabricated. The red flags did not emerge from one misplaced figure, but from a cascade of small anomalies that, when stitched together, painted a coherent picture of deliberate diversion. This was not simple bookkeeping fraud. The scheme combined manipulation of digital accounting systems, exploitation of weak user access controls, and plausible but forged supporting documentation. A programme officer, hereafter Suspect,1 had obtained elevated permissions due to longstanding tenure. That access was used outside of normal workflows to alter vendor master records and to conceal transactions by routing them through shell accounts mimicking legitimate partners. Payment instructions originated from seemingly authentic email domains but were in fact look-alikes that differed by a single character, a classic homograph attack enabled by an absence of domain verification tools. Digital forensic analysis showed that an off-the-shelf automation script was used to generate hundreds of fraudulent invoices that passed superficial review but contained embedded metadata linking them to Suspect 1’s machine. These were not typos; they were deliberate deviations masked as routine work. The scheme started to unravel when a field audit noticed cash transfers to accounts that had never been visited by programme teams. During a routine reconciliation at the close of grants, a senior internal auditor questioned why a water pump purchase reflected a payment to a transport company. That sparked a deeper ledger trace. Concurrently, donor income recognition reports did not align with bank transaction feeds, which led the auditing team to engage external forensic accountants. They extracted email server logs, payment gateway records, and vendor bank account histories, all of which required specialised tools to interpret. It became clear that financial controls were porous, and the control environment lacked the means to detect lateral movement within the NGO’s systems. This narrative echoes the pattern of emerging cyber-enabled fraud cases in Uganda’s jurisprudence, where digital tools are misused in ways that evade traditional detection. In one 2024 civil litigation, the courts reiterated that fraud is not subject to statutory time bars from initial registration but only from the moment of discovery, a principle that shaped the investigative timeline here. The decision held that a recently discovered fraud is actionable even if the underlying acts occurred years earlier, effectively rebuffing arguments that technical limitations should bar remedy. In another 2025 decision, the judiciary emphasised that courts could adjudicate fraud claims where discovery dates are rigorously established through evidence, mandating precise forensic timelines rather than speculative inferences. The NGO’s breakdown was not an isolated bookkeeping error. It was an orchestrated scheme that exploited internal control lapses and technology vulnerabilities. The CIO had opted against multi-factor authentication and had not enabled audit logs for privileged accounts, meaning that system access by Suspect 1 went undetected for weeks. Newsfeeds, calendars, and chat logs showed unusual times for remote log-ins without trigger alerts because the control rules were simplistic. Logging in from within Kampala was considered safe. Modern threat models classify lateral access and abnormal user behaviour as high risk. Without behavioural analytics, the system treated malicious actions as routine. In a future-ready control environment, automated risk scoring would have flagged these anomalies instantly, prompting immediate investigation. In practical terms, these deficiencies are predictable. Cybersecurity frameworks assume resource constraints and build compensating controls, partitioned user access rights, network segmentation, routine privilege reviews, and mandatory second-pair approvals for financial actions above set thresholds. When those controls are absent or superficially applied, fraud replicates itself like a worm moving through an unchecked network. Legally, the failure here transcends internal policy. Under Uganda’s Computer Misuse Act and Electronic Transactions Act, wrongful access and unauthorised modification of digital records are offences. In earlier jurisprudence, courts have treated unlawful access to email or data systems as actionable even without physical damage, emphasising that the mere alteration of information with the intent to defraud suffices to trigger liability. Those precedents guide investigators here; the unauthorised changes to account records were not incidental. They were unlawful acts that formed the foundation of a civil fraud claim and potential criminal referral. How it was noticed matters. The trigger was not a routine audit tick box, it was an inconsistency between independent data sources. Donor systems reported committed costs that did not match bank confirmations. Using cross-platform reconciliation, a technique familiar to forensic practitioners, auditors extracted raw transaction sets and mapped them against actual service delivery reports. That is when the tentative hypothesis shifted to certainty. The funds were diverted electronically, and mechanical reconciliations were masking it. Investigators then turned to technology logs. DNS records showed lookup patterns that corresponded with fake vendor domains. Email headers indicated forged SPF and DKIM signatures. Payment gateway APIs revealed that the routing numbers for purported partners had never been validated. These are technical rubric points that most NGOs ignore until it is too late. Why this matters now is simple: resources are shrinking, and donors are tightening oversight. Without cybersecurity awareness and rigorous fraud risk assessment, NGOs are not merely inefficient; they are exposed. Donors and stakeholders will demand digital assurance frameworks equivalent to financial audits. Fraud risk assessments now must include system architecture reviews, access control audits, and threat modelling, not just compliance checklists. The investigative closure came when the sequence of evidence was established. System access logs, forged documentation metadata, bank routing inconsistencies, and anomalous user behaviour all pointed to a single actor. A comprehensive report was filed with the board, forensic accountants testified in a special audit committee, and corrective controls were mandated. This was not a paper scandal; it was a systemic failure to anticipate how technology could be misused. Remediation will include multi-factor authentication, real-time monitoring, vendor authentication protocols, and regular forensic readiness exercises. The lesson is strategic. In environments where digital tooling is ubiquitous, but controls are immature, fraud is not an accounting problem; it is a cybersecurity problem. It thrives in blind spots created by legacy assumptions and superficial audits. NGOs must treat fraud risk assessment as both an operational and legal imperative. A failure to do so is an invitation to repeat exactly what happened here: digital access abused, funds diverted, detection delayed, and reputational damage inflicted. The future of fraud risk management in the sector lies at the intersection of technology, law, and governance. Organisations that ignore this do so at their own peril.

Read More »
#WinningMindspark
Gorret Tumusime

Board structure for effective committee intersection and oversight tool

I have observed that many boards are inefficient because committees operate perfectly in isolation. After years of evaluating boards across financial institutions, manufacturing firms, and state entities, one pattern repeats, Audit reviews controls, Risk reviews exposure, and Credit review portfolios. Nomination and Governance reviews succession. Each reports upward. Few connect sideways. On paper, everything looks covered. Under stress, gaps appear. The Board Committee Intersection & Oversight Alignment Map is designed to expose those gaps before a crisis occurs. It forces clarity on ownership, joint accountability, escalation triggers, incentive alignment, and capability gaps. It makes visible where oversight overlaps, where it fragments, and where it quietly disappears. This is not another template but a living document to help you transform your board. It is a pressure test for board setup. Use it once, and you will see whether your committees truly integrate or merely coexist. Integration is not automatic; it must be engineered. I developed the Board committee intersection and oversight alignment map to ensure that enterprise risks are integrated across committees and aligned with strategy, capital, incentives, and capabilities. Use this tool to stop board committees from operating in silos. What does each Column entails? a)    Linked Strategic Objective. Prevents risk discussions from floating outside the strategy. b)   Financial Impact Exposure. Quantifies seriousness. Stops cosmetic reporting. c)    Primary Committee Owner. Removes ambiguity. One owner, not three spectators. d)   Required Joint Committee(s). Forces formal intersection. If blank, challenge it. e)   Reporting Cadence. Prevents “annual ritual” oversight. f)     Early Warning Indicator. Moves board from lagging to leading metrics. g)    Escalation Trigger. Defines when discussion shifts from committee to full board. h)   Board Capability Gap. Forces Nomination & Governance Committee to assess skills. i)     Incentive Link. Tests whether management rewards align with risk exposure. How do I use this during board retreats? Divide directors into cross-committee groups. a)    Assign two risks per group. b)   Force them to complete all columns. c)    Reconvene and challenge assumptions. This helps move the discussion from “who covers this?” to “who owns the consequence?” Winning boards do not just assign oversight. They engineer integration. That is the difference between structure and governance. If no intersection exists, you have a silo. Silos rarely announce themselves that exposes you under stress. If this feels familiar, commission an independent board evaluation. Integration does not happen by goodwill. It happens by design. I remain, Mr. Strategy

Read More »