Learn about grid computing with Oracle 10g. Hear directly from Oracle experts, customers, and partners. Learn how each step on the grid road map will lower costs, improve business performance, and ensure a solid return on investment as you go. Featured presentations include:

IT Consolidation
Business Integration and Optimization
Responsive Software Architecture

Oracle African Operations is holding a roadshow in Africa in four countries at the end of January:

Nairobi – 26th January THE SERENA 08h30 - 15h00
Kampala – 27th January The Sheraton 08h30 - 13h00
Dar Es Salaam – 28th January ROYAL PALM 08h30 - 17h00
Gabarone – 30th January Gaborone International Conference Centre Grand Palm 08h30 - 17h00


School of Oriental & African Studies,
niversity of London 27-28 January 2004

DAY ONE, 27 January 2004

KEYNOTE: The future ain’t what it used to be
Karl Feilder, President & CEO, Red-M, UK

In today’s wireless world, all it takes is a single PC and anyone within radio range can reach right into the heart of your network and help themselves to whatever they want. It begins with unauthorized users casually connecting to your network, graduates to intentional hacking and ends with theft of your confidential corporate data. Is your organization at risk? Yes, it certainly is, in common with organizations all over the world. So how do you secure and control your network in this new wireless world?

Karl W Feilder, President and CEO of Red-M, the world’s leading wireless security specialist, will cut through the hype surrounding the issues and show you how to take a calm and intelligent approach to modern-day network security.

An overview of Africa's IT security challenge
Russell Southwood, CEO of Balancing Act, UK and Editor of News Update e-letter

Applying international security standards in the African context
Titi Afolabi, Group Security/Fraud Director, Security Breach Management, UK & TISS-IT, Nigeria BSc, MSc IT Security, CFE, CISM, CDRM, Member of the Expert Witness Society

Information security governance in an e-enabled world
· Current & Future challenges
· E-enabling threats and opportunities
· ISO/IEC 17799 Standard

Why have an information security governance framework?
Vernon Poole, Security Consultant, Sapphire Technologies, UK & Chairman IS Strategy Forum, British Computer Society

DAY TWO, 28 January 2004

Implementing Open Source security tools
Paul Sumption, Webmaster, AITEC Africa, UK

WORKSHOP: Crisis Management Strategies
Titi Afolabi
- Crisis Management - Terminology

Corporate positioning culture,
- Business Continuity (Process, Plans)
- Disaster Recovery (Recovery Procedures, Testing Plans and Execution)
- Software, training and education
- Recognized bodies ˆ DR, BCP, CM

Titi has gained her expertise in IT Security and Fraud Management through academic qualifications and professional experience across multiple industries within Europe, the US and Africa. She has held positions such as Group Security Manager, Security Governance strategist, and of late she is the Group IT Security/Fraud Director for Security Breach Management in the UK and holds the same position for TISS-IT Nigeria Ltd.

Qualification: Titi was one the first candidates to attempt the MSc IT Security and passed successfully as a result of this she was head-hunted to the United States to assist business leaders and policy-makers.

Titi currently holds prestigious designations from across various business governance organizations such as ISACA where she was awarded the CISM Certification. She is a CFE Certified Fraud Examiner, has an MSc in IT Security, a BA in Industrial Systems Business Management, CDRM Certified Disaster Recovery Management and she is also a Member of the Expert Witness Society.

VENUE DETAILS: Room B202 on the second floor of the Brunel Gallery Building, Thornhaugh St, London WC1H OXG. (Tel: +44-(0)207-898-4917)