<table cellspacing="0" cellpadding="0" border="0" ><tr><td valign="top" style="font: inherit;"><DIV>Dear All,</DIV>
<DIV> </DIV>
<DIV>It might have escaped you but this week some quality workshop have been organised in Nairobi which touches on critical areas of information security.</DIV>
<DIV> </DIV>
<DIV>After the first day participants agree that alot can be learnt from some experts on this subject.</DIV>
<DIV> </DIV>
<DIV>For those who missed it the following is going on currently at Nairobi Safari Club and as they say it is not too late to join as there is alot to learn:-</DIV>
<DIV> </DIV>
<DIV> 11th - 12th August - Network Vulnerabilty Assessment Step-by-Step Approach</DIV>
<DIV> 13th - 14th August - Information Security Management</DIV>
<DIV> 15th August - Database Security and Audit</DIV>
<DIV> 16th August 7:30am to 10:00am - Breakfast Meeting Topic - </DIV>
<DIV> <FONT face="Times New Roman" size=3>Emerging Mobile Technology Security Issues: with focus on </FONT></DIV>
<DIV><FONT face="Times New Roman" size=3> Security Control". Key areas to be covered will be:-</FONT></DIV>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt"><FONT face="Times New Roman" size=3> . Threats, Vulnerability & Risks</FONT></DIV>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt"><FONT face="Times New Roman" size=3> . Security Incident Examples</FONT></DIV>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt"><FONT face="Times New Roman" size=3> . Client Vulnerability</FONT></DIV>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt"><FONT face="Times New Roman" size=3> . Rogue Access points</FONT></DIV>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt"><FONT face="Times New Roman" size=3> . Mobile Device Vulnerability</FONT></DIV>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt"><FONT face="Times New Roman" size=3> . Mobile Technology Risk Assessment</FONT></DIV>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt"><FONT face="Times New Roman" size=3> . Secure Device Configuration</FONT></DIV>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt"><FONT face="Times New Roman" size=3> . Audit Assessment Process</FONT></DIV>
<DIV> <BR>If interested to join the IT security experts please contact the undersigned<BR></DIV>
<DIV id=RTEContent>
<DIV id=RTEContent>
<DIV>
<DIV><EM>Preston Odera </EM></DIV>
<DIV><EM>Executive Director<BR>K-Ninety East Africa Limited </EM></DIV>
<DIV><EM>Kenya School for the Blind Complex</EM></DIV>
<DIV><EM>Mai Mahiu Road off Langata Road</EM></DIV>
<DIV><EM>P.O Box 3894-00100 <BR>Nairobi Kenya</EM></DIV>
<DIV><EM>Tel +254 20 608316 </EM></DIV>
<DIV><EM>Tel +254 20 3544352</EM></DIV>
<DIV><EM>Fax + 254 20 608318</EM></DIV>
<DIV><EM>Cell +254 722 771 478</EM></DIV>
<DIV><EM>Email; <A href="mailto:info@k90ea.com" target=_blank rel=nofollow>info@k90ea.<SPAN id=google-navclient-hilite style="COLOR: black; BACKGROUND-COLOR: dodgerblue">com</SPAN></A></EM></DIV></DIV></DIV></DIV></td></tr></table><br>