Tshimologong and ACSA partner for security challenge

February 2018 News & Events, Access Control & Identity Management

The Airports Company of South Africa (ACSA) and Wits University’s Tshimologong Digital Innovation Precinct have partnered to launch a security access management hackathon. Aimed at streamlining the company’s security access, The ACSA Access Management Challenge hopes to find a unique and impactful security solution utilising a Single-Sign-On (SSO) approach.

Itumeleng Dhlamini, community manager, Tshimologong Digital Innovation Precinct, says that the hub welcomes the collaborative project with ACSA and is excited to work with a host of budding IT gurus to find an appropriate access management solution: “ACSA is a world-class airports management organisation running a wide range of systems within each of its operations. The issue of managing access to these systems is a major challenge and resulted in ACSA approaching Tshimologong to not only find a solution, but to use the challenge as a means to identify and build new generation IT skills.”

Kutlwano Mtyeku, ACSA Group manager: brand marketing and communications, says that the issue of user identification is critical within ACSA: “We are no different to any other large organisation that uses a multitude of systems and has hundreds of users. It is imperative to link user identity, either to meet security protocols or to match the system to the user profile. It would prove challenging to utilise a system that requires a user ID and password, which is why ACSA wants to consider various SSO options.”

The initial hackathon briefing session takes place on 23 January 2018 at Tshimologong Digital Innovation Precinct in Braamfontein. The process will work as follows:

• Briefing session: Interested participants are invited to attend the briefing session at Wits University’s Tshimologong Digital Innovation Precinct in Braamfontein, Johannesburg. Each person will be given additional information by the ACSA and Tshimologong teams.

• Submit an entry: Once participants have attended the briefing session and are clear about the challenge and the expectations, they will be required to complete an entry form and upload a two-minute video clip describing their idea.

• Boot camp and hackathon session: The top 50 entrants will be invited to participate in a three-day boot camp and hackathon. They will be guided through the process of developing a conceptual prototype and a business model canvas. At the end of the hackathon, each entrant will present a 10-minute pitch to a panel of expert judges. The 10 top ideas will be selected.

• Pre-incubation: The top 10 entrants will be given a six-week membership to the Tshimologong Precinct pre-incubation programme. They will each be assigned a mentor and given access to a range of facilities, expert advisors and resources. They will use this time to develop a working prototype and will refine their business model canvas.

• Demo day: Each of the top 10 entrants will demonstrate their prototype and pitch their idea to a panel of judges. Three winners will be selected.

• Incubation: All three winners will receive an additional seven-month membership to the Tshimologong Precinct incubation programme.

To enter or find out more about the ACSA Challenge, visit http://www.tshimologong.joburg/acsa/





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
From the editor's desk: Interesting times
Technews Publishing News & Events
We certainly live in interesting times. From delaying the budget speech because the ANC doesn’t see any reason why VAT shouldn’t be increased by 2%, to crime fighters being set up and prosecuted in ...

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Bosch sells product business to Triton
Bosch Building Technologies News & Events Products & Solutions Facilities & Building Management
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The division is set to focus on systems integration business in the future.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
The human element remains the cornerstone of success
News & Events
Gallagher Security, has unveiled its Security Industry Trends Report 2025, offering insights into the rapid evolution of security systems and the broader role they play in business operations worldwide.

Read more...
New firearms training modules from ITA
News & Events Security Services & Risk Management
The International Firearm Training Academy has launched two new firearms training modules to support career development in the firearms industry: the Maintenance Fitter and the Firearms Custodian modules.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...