<html><body><div style="color:#000; background-color:#fff; font-family:bookman old style, new york, times, serif;font-size:12pt"><div><span>Friends,</span></div><div><br><span></span></div><div><span>I am sure that the authorities are addressing this matter to the best of their knowledge and efforts. And I am sure that this issue presents the GoK and the Kenyan private sector a chance to learn for, as they say, what doesn't kill you makes you stronger.</span></div><div><br><span></span></div><div><span>Thinking aloud, here is how to gain the strength/resilience</span></div><div><br><span></span></div><div><span>- Information protection be declared and understood to be a strategic imperative; one cannot run an effective knowledge economy without proper information protection framework and practices. Each ministry, department, private sector, etc needs to understand this and act in concert.<br></span></div><div><span><br></span></div><div><span>- Design,
clarify and communicate an information governance, risk and compliance framework; complete with a thorough no fault compliance regime.<br></span></div><div><span><br></span></div><div><span>- Establish an information protection leadership with commensurate powers needed to realize the strategic imperative of information; this leadership must not be subservient to IT but be independent in a similar manner that audit is. Leadership in turn will develop an information protection organization with needed skills, organization and processes. </span></div><div><br><span></span></div><div><span>- Develop and implement an ongoing information protection awareness regime for the nation; this would be segmented to ensure that appropriate knowledge is communicated to target audiences. (Did you know that one can actually collect business-related information (proposals, strategic plans, presentations, etc.) of a number of businesses at Internet cafes? All one
needs is recover much of these from the temp folders; one can also harvest a lot fo personal information (ID card-related, etc.) from the same cafes ... implication for identity theft are humongous.)<br></span></div><div><span><br></span></div><div><span>- Invest heavily in information protections skills development: require/coax academic institutions to make information risk management training a priority ...</span></div><div><br><span></span></div><div><span>Baadaye.<br></span></div><div><br><span></span></div><div><span><br></span></div><div> </div><div><font size="2"><span style="font-family:bookman old style, new york, times, serif;">----------------------------------------------------------------------------------------------</span><br style="font-family:bookman old style, new york, times, serif;"></font><font size="2"><span style="font-family:bookman old style, new york, times, serif;">Matunda Nyanchama, PhD, CISSP;
mnyanchama@aganoconsulting.com</span><br style="font-family:bookman old style, new york, times, serif;"><span style="font-family:bookman old style, new york, times, serif;">Agano Consulting Inc.; </span><a rel="nofollow" style="font-family:bookman old style, new york, times, serif;" target="_blank" href="http://www.aganoconsulting.com">www.aganoconsulting.com</a>; </font><font class="Apple-style-span" size="2">Twitter: <a rel="nofollow" target="_blank" href="http://twitter.com/#%21/nmatunda"><span class="yshortcuts" id="lw_1298476732_5" style="color:rgb(54, 99, 136);">nmatunda; </span></a></font><font class="Apple-style-span" size="2"><span style="text-decoration:underline;"></span>Skype: okiambe</font><font size="2"><span class="Apple-style-span" style="border-collapse:separate;color:rgb(0, 0, 0);font-family:'Book
Antiqua';font-style:normal;font-variant:normal;font-weight:normal;letter-spacing:normal;line-height:normal;orphans:2;text-indent:0px;text-transform:none;white-space:normal;widows:2;word-spacing:0px;font-size:medium;"><span class="Apple-style-span" style="font-family:verdana, helvetica, sans-serif;font-size:11px;"></span></span><br style="font-family:bookman old style, new york, times, serif;"><span style="font-family:bookman old style, new york, times, serif;">----------------------------------------------------------------------------------------------</span><span style="font-style:italic;font-family:bookman old style, new york, times, serif;"></span><span style="font-family:bookman old style, new york, times, serif;" lang="EN-CA"></span></font></div><style><!--filtered {font-family:"Book Antiqua";panose-1:2 4 6 2 5 3 5 3 3 4;}p.MsoNormal, li.MsoNormal, div.MsoNormal {margin:0in;margin-bottom:.0001pt;font-size:11.0pt;font-family:"Book Antiqua";}p
{margin-right:0in;margin-left:0in;font-size:12.0pt;font-family:"Times New Roman";}filtered {margin:1.0in 1.25in 1.0in 1.25in;}div.Section1 {}--></style><i style="font-family:bookman old style, new york, times, serif;"><span style="font-size:10pt;"><br>Be prepared to face ICT Security failures & know how to respond when they happen! <br>Call: <span style="font-weight:bold;">+1-888-587-1150 </span>or <a rel="nofollow"><span style="font-weight:bold;">info@aganoconsulting.com</span></a><br> </span></i><span style="font-family:bookman old style, new york, times, serif;">----------------------------------------------------------------------------------------------</span><span style="font-style:italic;font-family:bookman old style, new york, times, serif;"></span><span style="font-family:bookman old style, new york, times, serif;" lang="EN-CA"></span><style>filtered {font-family:"Book Antiqua";}p.MsoNormal, li.MsoNormal, div.MsoNormal {margin:0in 0in
0.0001pt;font-size:11pt;font-family:"Book Antiqua";}p {margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman";}filtered {margin:1in 1.25in;}div.Section1 {}</style><div><i style="font-family:bookman old style, new york, times, serif;"><span style="font-size:10pt;"></span></i><br><font style="font-family:bookman old style, new york, times, serif;" size="2"><span style="font-style:italic;">"A bus station is where a bus stops. A train station is where a train stops. On my desk I have a workstation…" - Anonymous</span></font><br style="font-family:bookman old style, new york, times, serif;"><span style="font-family:bookman old style, new york, times, serif;">-----------------------------------------------------------------------------------------------</span><br style="font-family:bookman old style, new york, times, serif;"><font style="font-family:bookman old style, new york, times, serif;" size="1">This e-mail, including
attachments, may be privileged and may contain confidential or proprietary information intended only for the addressee(s). Any other distribution, copying, use, or disclosure is unauthorized and strictly prohibited. If you have received this message in error, please notify the sender immediately by reply e-mail and permanently delete the message, including any attachments, without making a copy. Thank you.</font><br></div></div></body></html>