Contents
Day 1
* Keynote
* Stream 1 - Electronic Commerce
* Stream 2 (am) - Distributed Applications
* Stream 2 (pm) - Current Threats
* Stream 3 (am) - Being an Effective Security Manager
* Stream 3 (pm) - Business Risk Management
* Stream 4 (am) - COmputer Crime
* Stream 4 (pm) - Legal Issues
Day 2
* Keynote
* Stream 1 (am) - Windows NT Debate
* Stream 1 (pm) - The Evolving Internet
* Stream 2 (am) - Network Security
* Stream 2 (pm) - Cryptology
* Stream 3 (am) - Security Management
* Stream 3 (pm) - Directors' Briefing
* Stream 4 (am) - Business Continuity
* Stream 4 (pm) - Year 2000
Day 3
* Keynote
* Stream 1 (am) - Corporate Case Studies
* Stream 1 (pm) - Intranets
* Stream 2 (am) - Firewalls
* Stream 2 (pm) - Technology Strategy
* Stream 3 (am) - Information Warfae
* Stream 3 (pm) - Security Awareness
* Stream 4 - Malicious Software
* Closing Address