Job Title: Co-Director of the Cybersecurity Capacity Centre for Southern Africa at the University of Cape Town
Description: My name is Enrico Calandro. Over the last ten years, my professional career has been research-driven. I have conducted Internet policy and regulation research across the African continent to facilitate evidence-based and informed policy making for improved access, use and application of ICTs in Africa and beyond. Besides research, I conduct capacity building with policy makers and representatives from civil society organisations to improve their skills and knowledge of digital policy for the growth and development of the African continent. Currently, I am the Co-Director of the Cybersecurity Capacity Centre for Southern Africa at the University of Cape Town, a research and training programme on cyber capacity. In June 2018, I was appointed as a Member of the Advisory Board of the Global Forum on Cyber Expertise, and since December 2019, I am a member of the Expert Advisory Panel of the Global Cybersecurity Capacity Centre at Oxford. I hold a Ph.D. in Business Administration specialising in telecommunications policy, from the Graduate School of Business, University of Cape Town. I am a recipient of the Open Technology Fund fellowship on Information controls, the Amy Mahan scholarship award for the advancement of ICT policy in Africa, and the UNDESA fellowship for international cooperation.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.