<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal"><span style="font-family: 'Times New Roman', serif; color: black; "><span class="Apple-style-span" style="font-size: large;">Dear Listers,</span><span class="Apple-style-span" style="font-size: large;"></span></span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal"><span style="font-family: 'Times New Roman', serif; color: black; "><span class="Apple-style-span" style="font-size: large;">The 2nd Annual Information Communication Technology & Network
Security Conference (Secure ICT 2010) will be held on Sept 8-9, 2010 at the
PanAfric Hotel in Nairobi, Kenya.</span></span><span style="font-family: 'Times New Roman', serif; "><span class="Apple-style-span" style="font-size: large;"></span></span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal"><span style="font-family: 'Times New Roman', serif; color: black; "><span class="Apple-style-span" style="font-size: large;">Secure ICT 2010 is a "must attend" event for those tasked with
protecting personal or confidential information in a rapidly changing
technological environment. The security of ICT infrastructure is of critical
importance.</span></span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal"><span style="font-family: 'Times New Roman', serif; color: black; "><span class="Apple-style-span" style="font-size: large;">This year's conference sessions address new and continuing threats to
information security as well as responses to the increasing risk of security
breaches and data exfiltration, identity theft, cyber terrorism and more. The
conference will provide information security professionals and managers with
the most up-to-date information, tools, trends, legislation, and strategies for
addressing information security issues. Plan to meet with your colleagues from
around the region, the nation and the world in Nairobi to learn from recognized
experts at Secure ICT 2010.</span><span class="Apple-style-span" style="font-size: large;"></span></span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal"><span style="font-family: 'Times New Roman', serif; color: black; "><span class="Apple-style-span" style="font-size: large;">Conference participants are invited to submit proposals for the
conference presentation.</span><span class="Apple-style-span" style="font-size: large;"></span></span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal"><span style="font-family: 'Times New Roman', serif; color: black; "><span class="Apple-style-span" style="font-size: large;">For more information about the conference,
visit�<a href="http://secureict.co.ke/">http://secureict.co.ke/</a>, To submit a proposal visit
<a href="http://secureict.co.ke/proposals.aspx">http://secureict.co.ke/proposals.aspx</a></span><span class="Apple-style-span" style="font-size: large;"></span></span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal"><font class="Apple-style-span" face="'Times New Roman', serif"><span class="Apple-style-span" style="font-size: large;"><br></span></font></p><p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal"><span style="font-family: 'Times New Roman', serif; color: black; "><span class="Apple-style-span" style="font-size: large;">Evans</span></span></p>