“Uncle, Uncle, Uncle… Godfrey agenze.” “Sorry, Bernabas. The young man has left us.” Those words from Godfrey’s fiancé and his doctor, the Liver Specialist doctor respectively still echo in my mind. They have refused to fade. They replay each time I close my eyes; sharp, cold, unrelenting. I hear them when I walk into the office, when I glance at his desk, when I imagine his calm knock on my door, saying, “Bernabas, we need to review the new proposal.” At 1:46 a.m. on Thursday, 16th October 2025, my world came to a standstill. My nephew; my son in every…
What makes a great auditor?
In every boardroom, the conversation about risk often starts with spreadsheets, control matrices, and audit checklists. Yet, in reality, risk left spreadsheets a long time ago. It lives in the strategic decisions your organization makes every single day. It lives in who makes those decisions, when they are made, and how they are influenced by blind spots that often go unnoticed, until it’s too late. The greatest threat to an organization today is not a hacker lurking on the dark web, waiting for the perfect moment to strike. It’s not necessarily a sophisticated malware or a ransomware syndicate. The real…
Cybersecurity & Risk Management Conference 2025, it’s Finally Here!
The countdown is over! The much-anticipated Cybersecurity & Risk Management Conference 2025, under the theme: Securing the Future – AI-Driven Security and Risk Management, is set to take place tomorrow, 16th October 2025, at Speke Resort Munyonyo, Kampala. This landmark event brings together cybersecurity experts, business leaders, policymakers, and risk professionals for a day of deep insights, strategic discussions, and practical solutions to modern cyber threats. Organized by the Institute of Forensics & ICT Security (IFIS), the training arm of Summit Consulting Ltd., in collaboration with the Institute of Corporate Governance Uganda (ICGU), this annual conference provides a unique platform to…
Cyber Hygiene is Not an IT Issue but a Culture Issue
Imagine walking into a hospital. The walls are clean, the staff is dressed in neat uniforms, and everything looks perfect on the surface, but behind the scenes, one nurse decides to skip washing her hands “just this once.” Maybe she’s tired, or in a hurry, or thinks nothing will happen. What follows is devastating: an infection spreads to patients and colleagues alike. Those who never broke protocol still suffer the consequences of one person’s negligence. This is exactly how cybersecurity works. One weak link, one careless act, can expose the entire organization to risks that no amount of sophisticated technology…
The biggest uninsured risk is your own IT team
It began, as most tragedies do, with trust. In a local insurance company, the head of IT had been there for eight years. Loyal, quiet, and efficient. The kind of man who never raised his voice or suspicion. Yet beneath the hum of the servers he managed, a quiet betrayal brewed. Insurance firms love to talk about coverage, floods, fires, and car crashes, but the greatest uninsured risk sits inside their own offices: their IT teams. When fraud happens, people look outward, to hackers, ransomware, or “Russian IPs.” The truth? Eight out of ten breaches in the insurance industry start…
Security starts with you
As we enter Week 2 of Cybersecurity Awareness Month 2025, one truth remains clear: cybersecurity is everyone’s responsibility. Whether you are a student attending lectures online, a CEO managing strategic decisions, a board member shaping governance, or someone simply scrolling through social media, your online actions matter. Cyber threats are becoming more sophisticated, targeted, and relentless. From ransomware attacks crippling institutions to phishing scams that trick individuals into surrendering sensitive data, the digital threat landscape is evolving faster than ever before. This week, our focus is to equip individuals, leaders, and families with actionable cybersecurity knowledge that can make the…