Home > News & Events > Webinars
C3SA updates
Home > News & Events > Webinars


  • Identifying cyber threats and risks in SSA

    28 September 2021

    Webinar overview

    Exposure to cyberspace comes with a lot of opportunities and many dangers. Very often, members of the public have challenges identifying the threatening and the risky situations they are exposed to. These are threats and risks to personal, professional, and sociocultural life. The threats imply impending harm to one’s person, reputation, and wealth; harm to a professional career, investments, and initiatives; and harm to relationships, loss of cultural heritage, as well as manipulation of social and cultural processes. This webinar aims to describe and explain main and emerging threats and risks to the lives of individual members of the public, and to suggest ways to identify an attack or a risky situation. The webinar will discuss malware, social engineering, denial of services, and intrusions; with risks ranging from, cybercrime (Fraud, privacy infringements, defacement, and vandalism) cross-border cyber-criminality, cyberterrorism, and cyberwarfare.  

    Who should attend?

    • Professionals from the government and private sector involved in data protection and governance or cybersecurity
    • Policymakers
    • Researchers
    • Cybersecurity awareness activists
    • Anyone interested in cybersecurity

    Panellist Bios

    Angela Matlapeng

    Angela Matlapeng is a self-driven and versatile ICT professional with proven experience in state-of-the-art Software Development, country code Top Level Domain (ccTLD) Administration, Cybersecurity, Internet Policy Development, and multi-stakeholder engagement. She graduated top of her class with a First Class in BSc. Honours Computer Systems Engineering from the University of Sunderland, UK, in 2015.

    Angela is currently tenured as a CIRT Analyst in the Botswana Communications Sectorial CIRT (bw COMM CIRT) housed at BOCRA. She is also the Vice Chairperson of the Africa Top Level Domains Organization (AfTLD) since June 2020 where she was first appointed to the AfTLD Board of Directors in June 2019. Ms. Matlapeng is AfTLD's liaison to AfricaCERT's Africa Anti-Abuse Working Group (Af-AAWG) which is responsible for awareness and capacity building in cybersecurity issues including the security and stability of the DNS.

     She is also an ITU Women in Cyber Mentorship Envoy, an active member of the Internet Governance Liaison Committee at the Internet Corporation for Assigned Names and Numbers - ICANN, as well as a member of the global Accessibility Special Interest Group - a11ySIG, a group which aims to make the Internet and its attendant technologies accessible to the largest audience possible, regardless of disabilities.

    Angela is a solid life-long learner determined to maintain industry relevant knowledge in new technologies, modern tools, and best practices. She also takes strong interest in digital inclusion and diversity causes. She’s a paradigm shift enthusiast who enjoys reading, outdoor activities, networking, and problem solving.

    Dr Jason R.C. Nurse

    Dr Jason R.C. Nurse is an Associate Professor in Cyber Security at the Institute of Cyber Security for Society (iCSS) at the University of Kent, UK. He is also a Visiting Academic at the University of Oxford, Visiting Fellow in Defence & Security at Cranfield University, UK, and Associate Fellow at the Royal United Services Institute for Defence and Security Studies (RUSI). Specifically, his research concentrates on investigating interdisciplinary approaches to enhance and maintain cyber security for organisations, individuals and governments. Dr Nurse has published over 100 peer-reviewed research articles and he has had his research featured in national and international media including Newsweek, BBC, Associated Press, Wall Street Journal, ComputerWeekly and The Conversation. Dr Nurse was selected as a Rising Star for his research into cybersecurity, as a part of the UK’s Engineering and Physical Sciences Research Council’s Recognising Inspirational Scientists and Engineers (RISE) awards campaign.

    Brencil Kaimba

    Brencil Kaimba is the head of product strategy and development accountable for technology and cybersecurity solutions portfolio across a diverse and multilingual East, West and South African business unit. She has worked with different stakeholders to design industry frameworks including Risk Quantification Framework and other cybersecurity solutions for African SMEs. She is a keen believer in designing local solutions that address the unique challenges facing African SMEs.

    She is the Editor in Chief of Africa Cybersecurity report, a continent wide annual report that highlights key trends and cybersecurity posture of different industries across African countries. She previously worked as a cyber risk consultant and Security Operation Centre Consultant. Brencil is a board member at ISACA Kenya Chapter and is the recipient of the 2017 ISC2 ISLA EMEA, Upcoming Cybersecurity professional and IFSEC 2021 Global influencer.

    Wuraola Kolade

    Wuraola Kolade is a Cyber Security Professional, STEM Advocate and all-round technology enthusiast. Her area of expertise cuts across Incident Handling and Response, Ethical Hacking, Forensics, open-source intelligence and Cyber Diplomacy among others. In the course of her career, she has served as a Cyber security analyst, a technical specialist, advisor, training instructor, and cyber drill facilitator amongst other duties which involve planning and implementation of security measures, advising on emerging security threats and how to manage them, involved in strategizing the creation, maintenance and delivery of cyber security awareness across critical organizations.

    Elizabeth is a Fellow of the President Barrack Obama initiated Young African Leaders Initiative (YALI), Accra Regional Leadership Centre, attesting more to her works for community, education, and advocacy through technology. She was recognized as the ‘African Woman of the Day’ in 2017 by MTVGhana in commemoration of the International Women’s Day and was also recognized as a fellow of the ALAT by Wema Bank Tech Chicks class of 2018. She was listed as one of the Top 50 Women in Cybersecurity in Africa in 2020. In 2021, she was named a Global Influencer in the IFSEC Global Awards under the “Security – One to Watch” Category.

    She represented the Cyber Security Experts Association of Nigeria (CSEAN) at the United Nations Open Ended Working Group (OEWG) Intersessional meeting at the UN Headquarters in New York where she delivered a presentation on “Cyber Threat Landscape”. She also served as a resource person at the UNIDIR’s workshop on Gender perspectives on Arms control and Disarmament in Entebbe, Uganda. She served as a member of a committee to review Nigeria’s National Cybersecurity policy and strategy (NCPS) 2015 and produce the NCPS 2021.

    Asides’ being technical on Cyber security, Elizabeth believes Cyber Security begins with the human behind the computer and has been actively involved in educating the populace on Cyber Security Ethics and digital citizenship. She remains a long-serving member of the Cyber Security Experts Association of Nigeria (CSEAN) and an ever-avid advocate and campaigner for the education of girls and women in technology and information security.

    How to attend the webinar.

    The webinar series will be held on Zoom and consist of only one session. You can click here to attend.

    Need more information?

    Contact details

  • The cybersecurity vulnerabilities of people in SSA

    27th July 2021 at 10:00 am SAST


    The cybersecurity vulnerabilities of people in SSA

    Webinar overview

    This webinar explores the cybersecurity vulnerabilities of people in SSA and makes recommendations for people and policymakers that enable frugal but effective individual cybersecurity practices.

    Sub-Saharan Africa is a place where more than a billion strong, young, and dynamic people live. It is a space where most people have some knowledge of the new technologies and the cyberspace that they enable. They know how to use them to connect to friends and family, have fun, study, work, and look for opportunities. The cyber landscape of sub-Saharan Africa is still in its infancy, with an infrastructure still in the process of being developed, unclear cybersecurity strategies, poor cybersecurity regulations and standards, inadequate cybersecurity awareness and education, and questionable cybersecurity mindsets. These are vulnerabilities at the level of a country or a region. They suggest that individual computer and internet users are particularly exposed to cyber threats and risks. However, it is not specifically clear how exposed they are and the impact of that exposure on themselves and the rest of society. This webinar aims to identify the main vulnerabilities in the device (hardware, software, and platforms) and Internet usage (behaviour and practices) of individuals in SSA. Vulnerability in this situation stems from the exposure of individuals’ personal (Home and mobile), professional (Office + School), and sociocultural (Family, friends, and societies) critical domains to prying eyes. The aim is to describe, explain and suggest remedies to main vulnerabilities.

    Who should attend?

    • Professionals involved in data protection and governance or cybersecurity.
    • Policymakers
    • Researchers
    • Anyone interested in data protection, data governance, and cybersecurity.



    Dr. Laban BaguiDr Laban Bagui: Cybersecurity Senior Researcher, C3SA UCT

    Laban is a Senior research fellow with the C3SA at the UCT Department of Information Systems. He is a social entrepreneur, development and civic technology researcher, and learning facilitator. Laban has worked for various industries including Higher Education, Internet Service Providers, Television broadcasting, and mobile software engineering. He holds a PhD in Information systems from UCT. Laban research interests include Cybersecurity policy in Africa, eParticipation, African e-Commerce entrepreneurship, and networked learning.



    The Panellists:

    Aprielle OichoeMs. Aprielle Oichoe: Cybersecurity Engineer

    Oichoe is a seasoned professional with over 12 years of experience in IT and cybersecurity with a passion for mentorship. She is the founder and Managing Director, Infosphere Limited which is an Information Security Consulting company in Kenya, the Research and special programs Director at Africa Cyber Defense Forum (ACDF) and cofounder of SheLegend, a cybersecurity mentorship initiative by Infosphere and the President and of the East Africa Women in Cyber Security (WiCyS) affiliate chapter. She holds a bachelor’s degree in Computer Science from Africa Nazarene University, a Master's degree from the University of Bradford (UK), and various certifications –CISA, ISO 27001 LI/LA, ISO 31000, ISO 22301.


    Mr. David MoepengMr. David Moepeng: Cyber Literacy Advocate

    David Moepeng is a Media Professional and a  Cyber Literacy Advocate from Botswana, where he founded and coordinates a public literacy campaign on cybersecurity under the name eBotho Cyberspace. Prior to his career in cyber literacy advocacy, Moepeng worked as a radio journalist for 16 years in Yarona FM, an urban youth-focused radio station based in the Botswana capital Gaborone, where he subsequently served as Station Manager for 3 years. During his time as a journalist, Moepeng was also involved in press freedom advocacy through his role as Secretary-General of the Botswana Editors Forum. In his current role as a Cyber Literacy Advocate, Moepeng promotes cybersecurity awareness to the general public and various sectors of society, including the media. In 2020, the eBotho Cyberspace Campaign, in collaboration with the Botswana Regulatory Authority and European Union Mission in the country, hosted a 2 -day workshop for local journalists on news reporting on cybersecurity. Moepeng is currently completing his Masters in Cyberpsychology at Nottingham Trent University in the United Kingdom.


    Dr. Bright Gameli MawudorDr. Bright Gameli Mawudor: Cybersecurity Engineer

    Cyber Security Engineer for over 10 years, Bright is a self-driven Information security enthusiast that will go all length to keep updated with the latest methodologies and help the entire community to be Information Security aware. He regularly gets involved in Information Technology forums and discussions focusing on Cyber Security. His main interest lies with System Penetration Testing, Big Data Security and Information Security awareness training through all available media. 




    Sorene AssefaMs. Sorene Assefa: Cybersecurity Analyst

    Technology Analyst - Cybersecurity & Internet-related issues at ITU. Sorene is the founder of Cyber Czar, a local cybersecurity firm that aims to protect the most vulnerable in our society by providing training and education. For her work, she was listed in Mail & Guardian’s 200 Young South Africans list for 2019 and as an ICT role model in the 2018 Inspiring Fifty list for South Africa. Her certifications include CISSP®, CISM, ISO, ITIL, COBIT, and PRINCE2



    How will the webinar work?

    The webinar series will be held on Zoom and consist of only one session. You can click here to attend.

    Need more information?

    Contact details


  • Stakeholder Engagement in Cyber Policy

    Wednesday 10th March 2021

    To enhance safety and security in cyberspace and to realise its full potential to underpin social and economic prosperity and promote a society where all actors are able to participate and contribute in a meaningful way, there is an urgent need to reinforce the importance of inclusive cyber policy making. Inclusive in a way that stakeholders from all domains (government, private and public sectors, and civil society) who are carrying responsibilities but also have to deal with the risks in the cyber domain are involved in a way that their expertise, priorities and areas of operations are tied into policy. An inclusive approach to cyber policy-making also helps to ensure that views of those that are affected and also those who are responsible for solutions are neither side-lined by securitised and threat-driven narratives, nor neglected because of a narrow understanding of top-down policymaking.

    Over the last years, efforts have been made by several organisations to involve stakeholders in cyber policy making processes, including Global Partners Digital (GPD), the Organization of American States (OAS), and the Global Cyber Security Capacity Centre (GCSCC) of University of Oxford. One example is GPD’s Guide for Policymakers on Involving Stakeholders in National Cybersecurity Strategies, which is designed to guide policymakers on how to develop, implement and review a NCS with the active and ongoing involvement of relevant stakeholders. Another example are the national cybersecurity assessments based on GCSCC’s Cybersecurity Capacity Maturity Model for Nations (CMM) which gathers data through multi-stakeholder processes and engagement, done by the GCSCC and its regional partners, the OAS, World Bank, ITU and others.
    In fact, experience from countries that have developed their national cybersecurity strategies in an inclusive way (e.g. Ghana, Sierra Leone, Belize) has shown that this approach not only enables stakeholder views to be better represented, but also helps increase buy-in from relevant stakeholders when it comes to implementing the strategy, thus ensuring a more sustainable, effective and robust response to cyber threats.


    • Kerry-Ann Barrett, Organization of American States (CICTE Cybersecurity Program)
    • Geraldine Mugumya, National Information and Technology Authority – Uganda (NITA-U)
    • Nthabiseng Pule, Cybersecurity Capacity Centre for Southern Africa (C3SA)
    • Daniela Schnidrig, Global Partners Digital
    • Cynthia Wright, MITRE Corporation
  • A take away from our 1st Webinar: The sub-Saharan African cybersecurity “para bellum”: User Data Protection and Privacy

    16 February 2021

    Data protection and privacy is in its infancy in sub-Saharan Africa. SSA is facing a powerful line up of emerging threats including data breaches, cybercrime, surveillance, industrial espionage, social engineering, cyberwar, cyber terrorism, deep fake, and other nefarious use of AI. The risks include information manipulation, loss of resources, loss of lives, loss of privacy, social unrest, and loss of sovereignty. SSA countries that have enacted data protection regulation are lacking compliance enforcement mechanisms that could have ensured that a high level of standards is being upheld in the protection of citizens data and privacy relevant to the context. The majority of SSA countries are yet to sign and ratify the Malabo convention. In addition, there remain issues of poor data infrastructure, poor data protection awareness, a lack of data protection skills, no clarity on extraterritoriality of laws, no clear data sovereignty or residency definition, no clear mechanism for the enforcement of compliance locally and abroad, and a lack of continental and other international collaboration to establish wide reaching data protection adequacy certification. These vulnerabilities suggest that SSA data subjects are unprotected, and their privacy will not be respected. Nevertheless, with the push for bilateral and multilateral agreements on adequacy mechanisms or certification for data protection quality, there is an opportunity for SSA countries to have a solid frame for the protection of their citizens’ data. That standard of data care is an opportunity for SSA countries to enjoy and to learn from. 

    Henceforth, with the online thrust of the control measures to stop the COVid-19 pandemic and the effective AfCTA expected to boost e-commerce on the continent, there would be a need for an African data infrastructure equipped with federating regulations and enjoying African skills, competencies, and innovation. There would be a need for an African or AU (African Union) data commissioner office with collaborators in members states allowing for a tighter collaboration and better harmonisation of data protection amongst member states.