<html><body><div style="color:#000; background-color:#fff; font-family:bookman old style, new york, times, serif;font-size:10pt"><div><span>Critical infrastructure protection based on sound risk management was the subject of my presentation at a past AITEC conference in Nairobi. I can share the presentation with those interested.</span></div><div><br><span></span></div><div><span>As we become more and more dependent on complex interconnected infrastructure, the chances of failure increases; ditto for potetial negative impact. We need a comprehensive mapping of critical components of this infrastructure, an assessment of associated risks and finally clear mitigation steps, including rapid response mechanisms to deal with incidents when they happen.</span></div><div><br><span></span></div><div><span>The essence of business continuity comes to play here and needs to be the basis of risk assessment with respect to
availability.</span></div><div><br><span></span></div><div><span>Baadaye.<br></span></div><div> </div><div><font size="2"><span style="font-family:bookman old style, new york, times, serif;">----------------------------------------------------------------------------------------------</span><br style="font-family:bookman old style, new york, times, serif;"></font><font size="2"><span style="font-family:bookman old style, new york, times, serif;">Matunda Nyanchama, PhD, CISSP; mnyanchama@aganoconsulting.com</span><br style="font-family:bookman old style, new york, times, serif;"><span style="font-family:bookman old style, new york, times, serif;">Agano Consulting Inc.; </span><a rel="nofollow" style="font-family:bookman old style, new york, times, serif;" target="_blank" href="http://www.aganoconsulting.com">www.aganoconsulting.com</a>; </font><font class="Apple-style-span" size="2">Twitter: <a rel="nofollow" target="_blank"
href="http://twitter.com/#%21/nmatunda"><span class="yshortcuts" id="lw_1298476732_5" style="color:rgb(54, 99, 136);">nmatunda; </span></a></font><font class="Apple-style-span" size="2"><span style="text-decoration:underline;"></span>Skype: okiambe</font><font size="2"><span class="Apple-style-span" style="border-collapse:separate;color:rgb(0, 0, 0);font-family:'Book Antiqua';font-style:normal;font-variant:normal;font-weight:normal;letter-spacing:normal;line-height:normal;orphans:2;text-indent:0px;text-transform:none;white-space:normal;widows:2;word-spacing:0px;font-size:medium;"><span class="Apple-style-span" style="font-family:verdana, helvetica, sans-serif;font-size:11px;"></span></span><br style="font-family:bookman old style, new york, times, serif;"><span style="font-family:bookman old style, new york, times, serif;">----------------------------------------------------------------------------------------------</span><span
style="font-style:italic;font-family:bookman old style, new york, times, serif;"></span><span style="font-family:bookman old style, new york, times, serif;" lang="EN-CA"></span></font></div><style><!--filtered {font-family:"Book Antiqua";panose-1:2 4 6 2 5 3 5 3 3 4;}p.MsoNormal, li.MsoNormal, div.MsoNormal {margin:0in;margin-bottom:.0001pt;font-size:11.0pt;font-family:"Book Antiqua";}p {margin-right:0in;margin-left:0in;font-size:12.0pt;font-family:"Times New Roman";}filtered {margin:1.0in 1.25in 1.0in 1.25in;}div.Section1 {}--></style><i style="font-family:bookman old style, new york, times, serif;"><span style="font-size:10pt;"><br>Be prepared to face ICT Security failures & know how to respond when they happen! <br>Call: <span style="font-weight:bold;">+1-888-587-1150 </span>or <a rel="nofollow"><span style="font-weight:bold;">info@aganoconsulting.com</span></a><br> </span></i><span style="font-family:bookman old style, new york, times,
serif;">----------------------------------------------------------------------------------------------</span><span style="font-style:italic;font-family:bookman old style, new york, times, serif;"></span><span style="font-family:bookman old style, new york, times, serif;" lang="EN-CA"></span><style>filtered {font-family:"Book Antiqua";}p.MsoNormal, li.MsoNormal, div.MsoNormal {margin:0in 0in 0.0001pt;font-size:11pt;font-family:"Book Antiqua";}p {margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman";}filtered {margin:1in 1.25in;}div.Section1 {}</style><div><i style="font-family:bookman old style, new york, times, serif;"><span style="font-size:10pt;"></span></i><br><font style="font-family:bookman old style, new york, times, serif;" size="2"><span style="font-style:italic;">"A bus station is where a bus stops. A train station is where a train stops. On my desk I have a workstation…" - Anonymous</span></font><br
style="font-family:bookman old style, new york, times, serif;"><span style="font-family:bookman old style, new york, times, serif;">-----------------------------------------------------------------------------------------------</span><br style="font-family:bookman old style, new york, times, serif;"><font style="font-family:bookman old style, new york, times, serif;" size="1">This e-mail, including attachments, may be privileged and may contain confidential or proprietary information intended only for the addressee(s). Any other distribution, copying, use, or disclosure is unauthorized and strictly prohibited. If you have received this message in error, please notify the sender immediately by reply e-mail and permanently delete the message, including any attachments, without making a copy. Thank you.</font><br></div></div></body></html>