{"id":631,"date":"2024-11-08T02:24:29","date_gmt":"2024-11-08T00:24:29","guid":{"rendered":"https:\/\/africacybersecure.org\/?page_id=631"},"modified":"2025-07-17T17:29:42","modified_gmt":"2025-07-17T15:29:42","slug":"directory","status":"publish","type":"page","link":"https:\/\/africacybersecure.org\/?page_id=631","title":{"rendered":"Team"},"content":{"rendered":"<style id=\"team_free_dynamic_css627\">#sptp-627 .sptp-member.sptp-list-item{border:0px solid #ddd;border-radius:0px;background-color:transparent;margin-left:0;margin-right:24px;margin-bottom:24px;padding:0px 20px 0px 0px;}#sptp-627 .sptp-member.sptp-list-item:hover{border-color:#444;}#sptp-627 .sptp-member-avatar-img{border:0px solid ;background-color:#FFFFFF;}#sptp-627 .sptp-member-avatar-img:hover{}#sptp-627 .sptp-section-title{margin-bottom:25px;}#sptp-627 .sptp-section-title span{color:#333333;}#sptp-627 .sptp-member-name .sptp-member-name-title{color:#333333;}#sptp-627 .sptp-member-profession .sptp-jop-title{color:#333333;}#sptp-627 .sptp-member-desc{color:#333333;}#sptp-627 .sptp-member-social{text-align:center;}#sptp-627 .sptp-member-social ul{text-align:center;}#sptp-627 .sptp-member-social li{margin: 0 0 4px 0 ;}#sptp-627 .swiper-wrapper.left_img_right_content{margin-left:24px;}#sptp-627 .border-bg-around-member:not(.sptp-content-on-image){border:0px solid #ddd;border-radius:0px;background-color:transparent;}#sptp-627 .border-bg-around-member:not(.sptp-content-on-image):hover{border-color:#444;}#sptp-627 .sp-team-item .sptp-member{margin:12px 12px;padding:0px 20px 0px 0px;}#sptp-627 .swiper-slide .sptp-member{padding:0px 20px 0px 0px;}#sptp-627 .sptp-list-item.sptp-member,#sptp-627.sptp-section .sptp-member{box-shadow:none;}#sptp-627 .sptp-list-item.sptp-member,#sptp-627.sptp-carousel .sptp-member{margin-left:0px ;}#sptp-627 .sptp-list-item.sptp-member:hover,#sptp-627.sptp-section .sptp-member:hover{box-shadow:none;}<\/style><div id=\"sptp-627\" class=\"sp-team sptp-section sptp-new_page\">\n\t<h2 class=\"sptp-section-title\">\n\t\t\t<span>Staff<\/span>\n\t<\/h2>\n\t\t<div class=\"sptp-list left_img_right_content\">\n\t\t\t\t<div class=\"sptp-page-loading-image\"><\/div>\n\t\t\t<div class=\"sptp-row\">\n\t\t\t\t\t\t\t\t\t<div class=\"sptp-col-lg-1 sptp-col-md-1 sptp-col-sm-1 sptp-col-xs-1\">\n\t\t\t\t\t\t<div class=\"sptp-member border-bg-around-member sptp-list-item\">\n\t<div class=\" image\"><a class='sptp-member-avatar'  href=https:\/\/africacybersecure.org\/?sptp_member=ceo-chairman-co-founder target=_blank >\n\t<span class=\"sptp-member-avatar-img sptp-square none\">\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2024\/11\/TUYISHIMIREJeanBonfils_PassportPhoto_WhiteBG-228x300.jpg\" alt=\"Staff\" width=\"228\" height=\"300\">\n\t<\/span>\n<\/a>\n<\/div><div class=\"content sptp-square\"><div class=\"sptp-member-name\">\n\t\t<h2 class='sptp-member-name-title'>TUYISHIMIRE Jean Bonfils<\/h2>\n\t<\/div>\n<div class=\"sptp-member-profession\">\n\t\t\t<h4 class=\"sptp-jop-title\">Co-founder, Chairman &amp; Chief Executive Officer<\/h4>\n\t<\/div>\n<div class=\"sptp-member-desc\">\n\t\tTUYISHIMIRE Jean Bonfils is a Co-founder, Chairman and Chief Executive Officer of Africa Cybersecurity Consortium (ACC) which is a non-profit organization with a mission to provide cybersecurity advisory, consulting services and professional empowerment across Africa. TUYISHIMIRE Jean Bonfils has been contributing to a number of cybersecurity projects including the development of IT policies, IT strategies, IT disaster recovery plan, digital risk register, automated digital asset discovery, vulnerability assessment and penetration testing, development of security products. \r\n\r\nView more details: Click on profile picture.<\/div>\n<div class=\"sptp-member-social rounded\">\n\n\t<ul>\n\t\t\t<li>\n\t\t\t<a class=\"sptp-linkedin\" href=\"https:\/\/www.linkedin.com\/in\/jeanbonfilstuyishimire\" target=\"_blank\" >\n\t\t\t\t\t\t\t\t\t<i class=\"fa fa-linkedin\"><\/i>\n\t\t\t\t\t\t\t<\/a>\n\t\t<\/li>\n\t\t\t\t\t<li>\n\t\t\t<a class=\"sptp-twitter\" href=\"https:\/\/twitter.com\/jbtuyishimire\" target=\"_blank\" >\n\t\t\t\t\t\t\t\t\t<i class=\"fa fa-twitter\"><\/i>\n\t\t\t\t\t\t\t<\/a>\n\t\t<\/li>\n\t\t\t\t<\/ul>\n\t<\/div>\n<\/div><\/div><!-- .sptp-member -->\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-631","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Team - Africa Cybersecurity Consortium<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/africacybersecure.org\/?page_id=631\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Team - Africa Cybersecurity Consortium\" \/>\n<meta property=\"og:url\" content=\"https:\/\/africacybersecure.org\/?page_id=631\" \/>\n<meta property=\"og:site_name\" content=\"Africa Cybersecurity Consortium\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-17T15:29:42+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/africacybersecure.org\/?page_id=631\",\"url\":\"https:\/\/africacybersecure.org\/?page_id=631\",\"name\":\"Team - Africa Cybersecurity Consortium\",\"isPartOf\":{\"@id\":\"https:\/\/africacybersecure.org\/#website\"},\"datePublished\":\"2024-11-08T00:24:29+00:00\",\"dateModified\":\"2025-07-17T15:29:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/africacybersecure.org\/?page_id=631#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/africacybersecure.org\/?page_id=631\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/africacybersecure.org\/?page_id=631#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/africacybersecure.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Team\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/africacybersecure.org\/#website\",\"url\":\"https:\/\/africacybersecure.org\/\",\"name\":\"Africa Cybersecurity Consortium\",\"description\":\"It is about secure cyber\",\"publisher\":{\"@id\":\"https:\/\/africacybersecure.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/africacybersecure.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/africacybersecure.org\/#organization\",\"name\":\"Africa Cybersecurity Consortium\",\"url\":\"https:\/\/africacybersecure.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/africacybersecure.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/cropped-ACC_Banner_PadWithSkyWhiteBlackColor_TransparentBG.png\",\"contentUrl\":\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/cropped-ACC_Banner_PadWithSkyWhiteBlackColor_TransparentBG.png\",\"width\":250,\"height\":62,\"caption\":\"Africa Cybersecurity Consortium\"},\"image\":{\"@id\":\"https:\/\/africacybersecure.org\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Team - Africa Cybersecurity Consortium","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/africacybersecure.org\/?page_id=631","og_locale":"en_US","og_type":"article","og_title":"Team - Africa Cybersecurity Consortium","og_url":"https:\/\/africacybersecure.org\/?page_id=631","og_site_name":"Africa Cybersecurity Consortium","article_modified_time":"2025-07-17T15:29:42+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/africacybersecure.org\/?page_id=631","url":"https:\/\/africacybersecure.org\/?page_id=631","name":"Team - Africa Cybersecurity Consortium","isPartOf":{"@id":"https:\/\/africacybersecure.org\/#website"},"datePublished":"2024-11-08T00:24:29+00:00","dateModified":"2025-07-17T15:29:42+00:00","breadcrumb":{"@id":"https:\/\/africacybersecure.org\/?page_id=631#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/africacybersecure.org\/?page_id=631"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/africacybersecure.org\/?page_id=631#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/africacybersecure.org\/"},{"@type":"ListItem","position":2,"name":"Team"}]},{"@type":"WebSite","@id":"https:\/\/africacybersecure.org\/#website","url":"https:\/\/africacybersecure.org\/","name":"Africa Cybersecurity Consortium","description":"It is about secure cyber","publisher":{"@id":"https:\/\/africacybersecure.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/africacybersecure.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/africacybersecure.org\/#organization","name":"Africa Cybersecurity Consortium","url":"https:\/\/africacybersecure.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/africacybersecure.org\/#\/schema\/logo\/image\/","url":"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/cropped-ACC_Banner_PadWithSkyWhiteBlackColor_TransparentBG.png","contentUrl":"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/cropped-ACC_Banner_PadWithSkyWhiteBlackColor_TransparentBG.png","width":250,"height":62,"caption":"Africa Cybersecurity Consortium"},"image":{"@id":"https:\/\/africacybersecure.org\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/pages\/631","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=631"}],"version-history":[{"count":6,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/pages\/631\/revisions"}],"predecessor-version":[{"id":673,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/pages\/631\/revisions\/673"}],"wp:attachment":[{"href":"https:\/\/africacybersecure.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}