Skip to main content

Nigeria’s State Governor Fayemi Sets History: Appoints Youngest Special Assistant In Country

Nigeria’s State Governor Fayemi Sets History: Appoints Youngest Special Assistant In Country



As part of his efforts in ensuring participatory governance and bringing government to grassroot, the Governor of Ekiti State, Dr. John Kayode Fayemi has appointed a former prominent student leader as his Special Assistant on Students’ Matters; an office which he hopes will bring about a working relationship between the Government and the Governed.
It would be recalled that Dr. Fayemi, the Ekiti State Governor, had promised to choose among three nominees presented to him, who have got impeccable antecedence and of proven integrity, during his interactive session with the Student leaders at a parley about two months ago. The governor has thus fulfilled his promise in making history, by not only creating such an office but also confirming the appointment of Adeolu Oyebode as the most preferred.
By the virtue of the appointment, Oyebode sets history by becoming the first Special Assistant on Students’ Matters in Ekiti State and also the youngest Special Assistant in Nigeria. He is in his mid twenties.
Oyebode was the Chairman of National Association of Nigerian Students (NANS) Joint Campus Committee Ondo and Ekiti States, between 2008 and 2010, a position which gave him the opportunity to negotiate on behalf of students and youths of Nigeria with Governments and institution administrators both at Local, State and National level and also a member of prominent youth organizations in Nigeria.
As at his appointment, the Ikere-Ekiti born activist is the Ekiti State Coordinator of Socialist Youth League and the director of programmes and planning of the International Youth Congress of Nigeria, the Nigerian charter of International Youth Congress (IYC) Inc. – United State of America (USA).
While reacting to the appointment and the history made, Oyebode said it was dedicated to the constituency that produced him.
“I give glory to God for the history made, as defined by you, but the fact remains that I return all accolades to that Students’ Constituency that produced me, there is every possibility that I might not have been considered for this assignment if I wasn’t produced from the students’ activism constituency and definitely, the confidence reposed on me by the students who are left on campus that made my recommendation must not also be dashed”
“I see this task as an assignment of my life; I must not fail these young ones, my principal Mr. Governor and my generation because of tomorrow”.
What do you guys think with this new development? drop your comments.

Credit: NEWS AT 247

Comments

  1. Its nt a lucrative post so d big boiz dnt wnt it..nd besides its a way to get votes frm students when the time for his re-election comes!! Its nt rocket science

    ReplyDelete

Post a Comment

Popular posts from this blog

Top 20 Most Asked Third Party Risk Questions for Vendors  These questions help organizations assess the overall risk posed by third-party vendors, covering critical areas like data protection, regulatory compliance, and incident response. Here’s a list of the Top 20 Most Asked Third-Party Risk Management (TPRM) Questions for Vendors in TPRM questionnaires: 1. What types of sensitive data do you handle for our organization? Vendors should clarify the types of data they collect, process, or store, such as personal information, financial data, or intellectual property. 2. How do you protect data at rest and in transit? This question probes into the encryption methods, protocols, and security controls in place for safeguarding data during storage and transmission. 3. Do you have a formal Information Security Program in place? Vendors should describe their overall cybersecurity framework, including policies, procedures, and governance. 4. How do you manage user access to our data and s...

10 Important Cybersecurity Practices for your Business

  10 Important Cybersecurity Practices for your Business 1. EDUCATION  It’s much easier to prevent a hack than it is to recover from a hack. Once your company’s sensitive data is stolen through a ransomware attack, recovering it is often a long and arduous process. Teaching employees about basic security, personal cybersecurity, and the prevalence of cyber threats goes a long way in stopping ransomware attacks before they can really do damage. Your employees should understand that they might be targets of malicious actors, eager to exploit any entry they can find in your company. The average cost of a cyberattack is 3.86 million and the cumulative total for global cybercrime is expected to cost $6 trillion. If you don’t pay to train your employees about cybersecurity best practices eventually you may end up paying more in the long run. High quality and free trainings for your employees are available from several government resources including Department of Homeland S...

Microsoft Warns of Data Stealing Malware That Pretends to Be Ransomware

  Thursday - Microsoft warned of a "massive email campaign" that's pushing a Java-based STRRAT malware to steal confidential data from infected systems while disguising itself as a ransomware infection. "This RAT is infamous for its ransomware-like behavior of appending the file name extension .crimson to files without actually encrypting them," the Microsoft Security Intelligence team  said  in a series of tweets. The new wave of attacks, which the company spotted last week, commences with spam emails sent from compromised email accounts with "Outgoing Payments" in the subject line, luring the recipients into opening malicious PDF documents that claim to be remittances, but in reality, connect to a rogue domain to download the STRRAT malware. Besides establishing connections to a command-and-control server during execution, the malware comes with a range of features that allow it to collect browser passwords, log keystrokes, and run remote commands an...