CRSM TRAINING PRESENTATIONS

Find all the CRSM18 training presentations here

Threat Intelligence and Cyber Hygiene

By Daniel Kirabo
In this presentation, we learn about Threat intelligence solution tools that are designed to collect, process, and analyze all types of threat data from internal, technical, and human sources

DOWNLOAD NOW

Please provide your details

To start the download

Leveraging Technology for competitive Advantage

By Richard Byarugaba Managing Director NSSF
In this presenation, we learn why it is much harder today to address customer engagement than ever before, Dealing with Uncertainty, How prepared should you be? and Our Own Experience

DOWNLOAD NOW

Please provide your details

To start the download

Legal framework on Cybersecurity

By Jimmy Haguma
In this presentation, we learn the different Cyber laws of Uganda, Case studies, Challenges of cyber security and the Click clever startegy

DOWNLOAD NOW

Please provide your details

To start the download

Blockchain And it's Applicability

By Richard Emuye Mwiru
In this presentation, we learn about the Basics of BlockChain, Types of Blockchains, problems Blockchain can Solve and it's challenges

DOWNLOAD NOW

Please provide your details

To start the download

Business Intelligence Using Big Data Analytics

By Francis Mukembo
Stop resource Wastage in buying tools you don’t need. Which Data Analytics tools do you use and why? How PowerPivot will render most off-shelf tools obsolete

DOWNLOAD NOW

Please provide your details

To start the download

Soft Skills for Cybersecurity and Risk Management Career Success

By Hussein Isingoma
Understand why technical or hard skills are mandatory for cyber security and risk management professionals but not enough for success in both professional and personal lives

DOWNLOAD NOW

Please provide your details

To start the download

New approaches and tricks

By John Semakula
Live Forensics, Memory Forensics, Network Forensics, Incident Response & Forensics, Virtualisation & Forensics

DOWNLOAD NOW

Please provide your details

To start the download

Machine Learning and Artificial Intelligence

By Daniel Kirabo
ML and AI, a novel intro, Machine Learning 101, Artificial Intelligence Applications, ML and Cyber Security

DOWNLOAD NOW

Please provide your details

To start the download

Find all the CRSM17 training presentations here

Using Technology to Fight Fraud and Corruption

By Caroline Marion Acio
Automation of transactions; crimes are committed using automated systems. It follows that law enforcement should equally use technologically mediated means.

DOWNLOAD NOW

Please provide your details

To start the download

Cyber-resilience: Securing your network against cyber-attacks

By Daniel Kirabo
Traditional security measures are “necessary but not sufficient” for organizational survival in the emerging cyber ecosystem.

DOWNLOAD NOW

Please provide your details

To start the download

Effective Cyber Risk Assessment and Management

By Haguma Jimmy
In light of the increasing volume and sophistication of cyber threats, there is an eminent consequential cyber risk to organizational resources.

DOWNLOAD NOW

Please provide your details

To start the download

Cyber Insurance in Uganda CRSM17

By Teus Mourik, actuary
Large number of similar exposure units: The insurance policy can be provided to a large number of people that are exposed to the same risk

DOWNLOAD NOW

Please provide your details

To start the download

Our Keynote Speaker

By Joseph M. Baliddawa
The world has changed. Mobile banking, Mobile Money, Digital Money, Internet of Things and Big Data now dominate everyday discussions. The mobile apps like Whatsup are now both in the Boardroom and Bedroom. And keeping people up at night!

DOWNLOAD NOW

Please provide your details

To start the download

Certifications

Follow Us

  • Institute of Forensics & ICT Security, 4th Floor Ntinda Complex
  • Plot 33, Ntinda Road Opp St. Luke Church. P.O. Box 40292, Kampala, Uganda.
  • staff@forensicsinstitute.com
  • +256(414) 231136

© All rights reserved Institute od Forensics & ICT Security

Privacy Policy

Terms of Use | Site Map