Posted on


WAZIHUB launches its first IoT Prototyping competition to support IoT enthusiasts learn and bring to life innovative prototypes with the help of our trainers and the WAZIUP technology (software and hardwares).

The competition is implemented in 6 African countries in collaboration with distinguished tech hubs, partners of the project: @iLabAfrica-Strathmore University in Kenya, Kumasi Hive in Ghana, SONATEL in Senegal, The MakerSpace Foundation in South Africa, Hive Colab in Uganda and DTBi in Tanzania.

“WAZIHUB vision is to foster IoT deployment in Africa, engaging startups and entrepreneurs for rapid prototyping with the Open Source low-cost WAZIUP IoT LoRa technologies” Says Abdur Rahim, WAZIHUB Project Coordinator.

This innovation competition, first of its kind in sub-saharan Africa, is open to all IoT enthusiasts who want to build a prototype of their invention and develop a scalable business model. WAZIHUB aims to help makers build working prototypes and stand a chance to win monetary prizes.

A WAZIUP IoT kit will be given to each team selected for the competition and a 1000 € award will be given to the top 3 innovative prototypes. Female team lead and members are highly encouraged! Applications are open until 30th of April for Developers, Engineers or Startups. You can propose your idea in the following areas:
● Agriculture and Farming
● Logistics and Transportation
● Industry 4.0
● Environment and Energy
● Smart city and Home

Given the world situation due to the Covid-19, WAZIHUB will support 1 project with a concrete impact on this global pandemic.

To apply, click here: https://wazihub.com/challenge/

The WAZIHUB project aims at enabling startups & entrepreneurs to innovate and build low- cost, end to end IoT prototypes using the WAZIUP and Fiware technology. Fully funded by the European Union for 3 years, it is the continuation of the WAZIUP project also funded by the EU whose main objective was to empower affordable and open IoT solution adoption in Africa.

Kumasi Hive – Ghana: Kumasi Hive is a multi-space Technology Innovation Hub which provides a platform for rapid Prototyping of ideas, supporting local Innovations & impact start-up and promoting entrepreneurship.

@ILabAfrica – Kenya: @iLabAfrica is a Centre of Excellence in ICT Innovation and Development at Strathmore University. @iLabAfrica facilitates a thriving technological, entrepreneurial and innovative ecosystem in Nairobi, where developers, technologists, designers, makers, social entrepreneurs and changemakers co-exist. http://www.ilabafrica.ac.ke

Sonatel – Senegal: Sonatel (Société Nationale des Télécommunications du Sénégal ) is the principal telecommunications provider in Senegal. Sonatel is involved in Open innovation from 2013 by many platforms (Emerginov, Fiware, Opal,…) and open APIs (USSD,SMS, Billing and Mobile Money) to help the local ecosystem monetize their services. https://sonatel.sn
The MakerSpace – South Africa: The MakerSpace Foundation provides access to MakerSpace tools and technology, training and skills development, accelerator and incubation for start-ups. https://themakerspace.co.za

Hive Colab – Uganda: Uganda’s premier co-working space and tech incubator for fast-growing startups revolutionizing Uganda’s digital economies. https://hivecolab.org

DTBi – Tanzania: The Dar Teknohama Business Incubator (DTBi) is a Not-For-Profit Company run as a business registered in Tanzania. DTBi is a Tech Incubator in the country that promotes the growth of ICT technology-based emerging companies, Start-ups and those with innovative ideas contributing to job creation (including youth and women) and enhanced economic health of the nation.


How Teens’ Innovation keeps Elephants at Bay

Posted on

A photo of the Ndovucare device. It consists of a GSM card, a motion detector, a warning light and a siren and can detect an elephant at a radius of 180 metres. It offers a solution to human-wildlife conflict. PHOTO | LUCY MKANYIKA | NATION MEDIA GROUP 


There are many ways to keep elephants from destroying crops or attacking people. Erecting electric fences around national parks and game reserves is one. But how much would it cost to fence the expansive fence in Tsavo National Park?

The use of bees and pepper has also been tried and tested. And in some areas, villagers bang drums to turn away the animals, which are averse to noise. But how many beehives would have to be placed around the Tsavo to keep farms and farmers safe?

Luckily, there is a new innovation that could prove as effective. Known as Animal Sandra (Anisan), the technology was invented at Kajire Girls in Voi, Taita Taveta County, in 2018. The innovation was invented by four students who participated in the ‘Women In Tech’ Competition by Standard Chartered and @iBizAfrica- Strathmore University. The ‘Women in Tech’ is an initiative targeting women led start-ups leveraging on technology as a key drive to innovation in business in Kenya and across Africa.

Sandra Maryanne, Joyce Matoto, Nancy Wairimu and Macrina Antonia were motivated to come up with the idea because they had experienced human-wildlife conflict in their home area, which borders the Tsavo. Learning was frequently interrupted and many were the days students reported to school late and left early to avoid encountering elephants along the way. Their parents grow crops on the fringes of the park, which attracted the animals.

In many instances, farmers have had to kill elephants to save their crops but, once in a while, a hapless villager falls victim to an attack.

So how were such conflicts to be resolved?


Human –Wildlife Conflict

The quest for an answer led the four friends to think of an idea that could reduce human-wildlife conflict.

“We want both humans and wildlife to co-exist and this will lead to a peaceful community and good performance in school,” Sandra said in an interview with The Edge.

In its nascent stage, the four students named their innovation the “Ndovu Care Project”. Their hope was that the innovation would help keep elephants away from crop fields and community areas and in the end provide a permanent solution to perennial conflict between man and beast.

Guided by their teacher Ezra Abuga, they submitted their innovation for the Start-Up Africa Diamond Challenge competition for the most innovative technological invention.

The competition was held in Elgeyo-Marakwet County and the girls won the first prize. As a result, they qualified for a global challenge to represent Kenya at the University of Delaware in the US after defeating 85 other projects presented by secondary schools from across the country.

They then submitted their innovation to the “Women in tech” competition and were short listed among the top 10 start ups companies among 180 applicants to compete for the KES 1 million in seed funding for their businesses.  Through the competition they were able to relieve training, mentorship and coaching over a period of 6 months to grow their skills and expand their business.

Motor – Detectors

When Sandra, now 18, completed her secondary education in 2019, she continued making improvements on the portable device, which consists of a GSM card, a motion detector, a warning light and a siren.

The gadget can detect an elephant at a radius of 180 metres, after which it sends alerts to the Kenya Wildlife Service (KWS) as well as villagers, preparing them to act before the animals start destroying crops or making their way to habited areas.

The warning text messages are sent to individuals whose phones are linked to the GSM card.

“The sensors are capable of detecting the presence of an elephant and immediately alert people by setting off flash lights and a siren, besides sending warning messages to KWS and villagers’ phones,” said Sandra, after whom Anisan is named.

The gadget, which is solar-powered, is hoisted on masts at strategic points where the sensors can detect the movement of elephants.

The device has been subjected to numerous experiments by different organizations and institutions to test whether it can work. “Recently it was mounted at Rukinga Ranch so we are waiting for the results of that experiment,” said Sandra.

“This device will minimize poaching and deaths of elephants and residents respectively. The economy and nutrition of communities will also improve because crop destruction will be a thing of the past,” she said.


@iBizAfrica, Strathmore University
@iBizAfrica is the business incubator of Strathmore University, a leading private University in Kenya. The incubator provides a nurturing environment that builds on the potential of the youth to develop innovative solutions and businesses that work for the common good in society. @iBizAfrica provides training, advisory, mentorship, coaching,
networking opportunities, access to seed capital and investors, and state-of-the-art facilities. We prepare startups to be investor-ready and launch into market through our custom incubation and acceleration programs.

Standard Chartered
We are a leading international banking group, with a presence in more than 60 of the world’s most dynamic markets.
Our purpose is to drive commerce and prosperity through our unique diversity, and our heritage and values are expressed in our brand promise, Here for good. Standard Chartered PLC is listed on the London and Hong Kong Stock Exchanges as well as the Bombay and National Stock Exchanges in India.

This is one of the innovations featured in The Edge, a quarterly magazine published in Business Daily.  


Coronavirus: 10 Cybersecurity Safety Tips While Working from Home

Posted on

Coronavirus Outbreak Laboratory Research

Amid the Covid-19 (Coronavirus[1]) pandemic, there has been a disruption in normal business operations across all industries. As a result, employees are working from home to avoid spreading or catching the virus.

Some employees are working from home for the first time and other businesses are opting for this kind of arrangement to enable business continuity while meeting their employees’ safety as well. However, it is a prime time for cyber-attackers to target businesses as more employees work from home. The attacks can be in the form of malicious software (malware) targeting their personal computers (PC) or phishing emails to intercept sensitive communication such as authorization of payments.

At @iLabAfrica- Strathmore University Cybersecurity Operations Center (SOC), we are continuously helping our clients minimize all forms of cyberattacks during this Covid-19 pandemic. We are committed to protecting their digital assets and network from cyberattacks. We draw insights from our daily operations to help you protect your network and PC while working from home during this Covid-19 pandemic. Below are ten safety tips you can employ while working from home.


1. Change Your Default Wi-Fi Passwords


Bth portable and home Wi-Fi routers come with a default Wi-Fi passwords. Most of the default passwords are easily predictable and can put you at risk when you have other unwanted users (Attackers) using your network. When attackers have access to your private network, they can steal your personal information or misdirect your traffic through an attack known as Man-in-the-middle (MitM) in networks.

Choosing a good password involves something that is easier to remember and hard for an attacker to guess. For instance, DX^&AJ(A_+2020 is an example of a bad password because it seems hard to guess but not easy to remember. A good password is something like, YouShouldRemberThisPassword_2020, easy to remember and hard to guess.



2. Do Regular Backups


Ensure to make a copy of any critical projects you are working on. In any case, of hardware failure, device loss or a ransomware attack, you can be confident that all your critical data is safe. Failure to do this can lead to the disruption of your daily operations.

If you are using a backup service like Google Drive[2], OneDrive[3] or Dropbox[4], make sure you have file synchronizing off. Save your data manually using these services every noon and evening. This is to protect your backup from corruption in case your PC gets a malware infection.

3. Update your Software and Operating System


Using old outdated software or an unpatched Operating System (OS) opens the door for attackers into your PC. Attackers exploit these kinds of weaknesses in your PC to gain access to your PC. Ensure you have installed all critical updates available for your PC and all the software that you are using.

Do not install pirated software or OS on your PC. If you cannot afford the Software or OS you wish to install, consider checking for an Open-Source alternative (you can make use of Alternativeto[5]) as Pirated software and OS are usually bundled with malware.

4. Use a Password Manager


Now you know how a good password looks like. However, maintaining all the passwords you create for each website you visit can be a daunting task. This is why you will be tempted to reuse a good password, which is a bad idea.

To avoid password reuse, you can utilize a password manager, which will generate and maintain all the passwords you require. You will only need to remember a single master password to access the password wallet or vault. Most of the current password managers can also integrate with your browser to make website authentication easy. You can have a look at 1Password[6], LastPass[7], Dashlane[8], and Keeper[9].

5.  Enforce 2FA on your Accounts


2FA stands for Two Factor Authentication. This is a security measure that ensures authentication to your personal accounts like email and online banking are not only relying on passwords but also another layer of authentication that tries to prove the owner is accessing the account.

Most commonly used online services have an option to add your phone number or email address for a One Time Password (OTP). You receive the OTP as a text message or an email each time you successfully login to your account. You will have to enter the OTP just after the password to access features in your personal account.

6. Watch out for Phishing Attacks


A phishing attack involves an attacker who tries to trick a victim into doing things that will help in achieving a cyberattack. Working from home involves the use of collaborative technologies and heavy reliance on communication tools like email and phone. Cyber attackers are aware of the current shift in business operations. They are taking advantage of unsuspecting users.

The attack is usually in the form of emails, SMS or phone calls that seem to be from a reputable source. To be safe, do not click links in what seems to be a malicious email or providing information to random people (or someone you have just known via email). Your employer should define the Standard Operating Procedures (SOPs) during this period of the Covid-91 pandemic.

You should have a way to verify your workmates and most importantly, remember to restrict critical operations like payments and authorization of funds to only a few persons in the company. This is not the time for your customers to change their bank accounts.

7. Avoid Using Public Network for Critical Operations


When working from home you might find yourself exposed to free Wi-Fi networks, hotels, and other similar public networks. You can never be sure who else is using the same network; you might have a malicious user connected or even as the provider of the network. This can lead to a Man-in-the-Middle (MitM) attack.

To be safe, restrict all critical operations like business transactions and email access to your own private network that you can control. For instance, create a mobile phone hotspot while in the public for your critical operations. Ensure you do not use a default password on your hotspot.

The same applies when you need to print confidential documents like pay-slips, business agreements, tender documents, etc. Please do not carry out such activities in a Cyber Cafe. Buy a cheap printer for home use or talk to your organization to facilitate one during this period of the pandemic.

8. Don’t Leave Sensitive Data on USB Disks


While in the office, you have file-sharing services that are available at a click of a button. You can move a file from your office network to your PC in an organized way. This is not the same when you are working from home. You will need to print a file that is on your laptop by physically copying it on a removable drive then plugging it in on your home PC.

Moving sensitive files from one PC to another using a removable drive like a USB puts you in a vulnerable position whenever you lose the USB. Minimize this activity to one special USB that you can wipe now and then after using it or make use of trusted services like Dropbox, Google Drive, and OneDrive.

If there is a dire need to have offline copies of the sensitive files on your USB, make sure you encrypt the files whenever you store them on your disk. I recommend using a tool like VeraCrypt[10] or EncryptStick[11].


9. Don’t Leave your Digital Device Unattended while in Public


Whenever you are working while in a public place or facility, make sure to secure your digital devices like phones, tablets, and laptops. If any of these devices get lost, it puts you and your organization at risk. Minimizing the impact in such cases involves you having passwords enabled in all your devices and enabling remote wipe options on the devices.

Digital products from Apple and Samsung have features that enable the device to wipe off any data on the disk after a number of failed login attempts. In addition, they provide remote device control, which can help you find your lost device. I recommend Cerberus[12] Phone Security (Antitheft) service for such operations.

Always enable full disk encryption on your laptops and phones. This helps minimize data exposure in an event of device theft. More so, this will limit an attacker accessing your organization if the VPN is in use or reading sensitive emails.

10. Keep your work separate from your personal activities


Working from home means more freedom on your hands. It requires being ethical, highly committed to your work and creating a manageable work routine with breaks in between. You will be using your work PC or your home PC if your organization does not provide one. Avoid mixing your personal activities with official activities.

Treat your online workspace as the way you would work in your office. Do not have inappropriate music playing in the background, accessing inappropriate content, and multiple email Gmail account tabs, etc. These kinds of activities can open doors for attackers to infiltrate your organization or simply cause you embarrassment when you use the wrong email for sensitive business communication.

These are the basic measures to protect you and your company while working from home. We hope you will stay safe and adhere to these tips to increase the security of your operations. @iLabAfrica-Strathmore University, takes pride in protecting businesses from cyberattacks and providing resources that help businesses reduce risks as we grow together.

If you would like to receive more cybersecurity newsletters from us, write to ilabafrica@strathmore.edu or visit www.ilabafrica.ac.ke .

Writer: Mr. John (Troon) Ombagi


Security Operations Center (SOC) Technical Lead
@iLabAfrica, Strathmore University




About @iLabAfrica Centre

@iLabAfrica is a Centre of Excellence in ICT Innovation and Development at Strathmore University. The centre spearheads Research and Innovation in Information Communication Technology for the Development (ICT4D) of ecosystems towards the attainment of the United Nations Sustainable Development Goals (SDGs) and to contribute toward Kenya’s Vision 2030. The research centre is involved in interdisciplinary research, students’ engagement and has partnered with over 800 institutions (Universities, NGOs, foundations and government) worldwide and other funding agencies. For more information, please visit www.ilabafrica.ac.ke


About ACPM IT Consulting Ltd

ACPM IT Consulting Ltd. is an international consulting company focusing on IT security• Founded in 2015 by accomplished information security experts in Budapest, Hungary• ACPM is based in Budapest with representative offices and partners in Kenya, South Africa, Austria, United Arab Emirates, China, Rwanda and Malaysia.• The ACPM  team of cybersecurity- and information technology experts provide highly sophisticated IT security and IT auditing services to global corporations, financial entities and government organizations.


About BCK

BCK Kenya Limited is a leading provider of ICT services in East Africa based in Nairobi.It’s an end-to-end digital solutions partner, providing the most advanced customer centered Information and Communications Technology to organizations of all sizes and needs. BCK provides Digital Engineered and Integration Services, Automation of Core operations, Engineered Interactive solutions (UI/UXI), Applied Intelligence and Analytics (BI), Mobile Application Development, connecting the workforce to networks anytime to improve productivity Integrate, educate and implement Security solutions with operations from devices and equipment to software and services, Big Data Consulting for Data Architecture, Integration, and Exploration. Their clients range from Public Sector, County Governments, Non-Governmental Organisations (NGOs) and those in the Financial Sector.


[1] https://www.who.int/emergencies/diseases/novel-coronavirus-2019

[2] https://www.google.com/drive/

[3] https://onedrive.live.com/

[4] https://www.dropbox.com/

[5] https://alternativeto.net/software/open-source-software-directory/

[6] https://1password.com/

[7] https://www.lastpass.com/

[8] https://www.dashlane.com/

[9] https://www.keepersecurity.com/

[10] https://www.veracrypt.fr/en/Home.html

[11] https://www.encsecurity.com/solutions.php#datavault

[12] https://www.cerberusapp.com/

ICT and Tech empowerment for the Autistic

Posted on


. Life changing impact for the people with Autism through IT training.

. Meet Michael Muniko, a beneficiary of the Autism Tech Program, now an absorbed intern at @iLabAfrica-Strathmore University.

@iLabAfrica offers a unique training program for young adults with Autism and other learning disabilities and seeks to equip them with IT skills. The program hopes to make a significant contribution towards solving the problem of access to meaningful employment opportunities by offering a four-month intensive training on IT skills.

Meet Michael Muniko, a beneficiary of the August-September 2019, Autism Tech Program. Growing up, Michael always had a love for computers, games and cartoons. His sister came across an online enrollment for the Autism Tech Program and she helped him apply for the 2019 September intake.

Through the Autism Tech Program, the @iLabAfrica staff work towards creating an environment whereby individuals can be employed based on their areas of strength. The program aims to train its candidates on topics in IT that would provide them with a competitive edge in the market.

Having completed the program in 2019 Michael applied for an internship position @iLabAfrica in the IT department where he is assisting with web and poster designs.

The program seeks to harness the strengths of people with high functioning autism with learning disabilities by training them on Software testing, Java programming, Microsoft Office Suite training, Game development, Mobile development, soft skills training among other areas.

The program seeks to create an environment whereby these individuals can be employed based on their areas of strength and by creating awareness about the positive qualities of people with Autism and other learning disabilities, leading to less discrimination and greater inclusion in the workplace. It also aims towards helping them live independently through social skills training and encourage employers to employ them in their organizations.

Michael also revealed that since he has completed his secondary school education, he aspires to join Strathmore University and pursue a bachelor’s degree in Computer Science. He mentioned that he is happy to be absorbed by @iLabAfrica-Strathmore University and that he is learning and being assigned daily tasks by his supervisors. He also shared with us a couple of his best designs, over the time he has been in @iLabAfrica-Strathmore University.

Obama official hd wallpaper (1)                 michael work

“People with family or friends that face similar challenges as I should be more patient with them, love and care for them and give them opportunities to nurture their skills and potential, bullying them is wrong.” he said.

The end goal of the training program is to reduce dependency on aid, charity and government subsidy to meet the needs of individuals on the spectrum and transforming persons with disabilities from tax revenue consumers to tax revenue contributors. The Autism program has intakes twice a year with approximately eight candidates per intake and it runs for a period of four months.

Since its inception, the Autism Tech Training Program has partnered with several institutions. It seeks to reach out to more young adults on the Autism Spectrum. The next intake is scheduled for April 2020.

To Know more about the programclick here

Equipping employees with the right skills – The Safaricom Digital Academy.

Posted on Updated on


The cyber security team @iLabAfrica-Strathmore University will train 19 employees from Safaricom as part of cohort two in this years Digital Academy program.

The program is aimed at equipping employees from different departments with the right skills and expertise to solve cyber security problems.

Initially launched in 2019, the academy is aimed at increasing workplace productivity through capacity building particularly in the digital space.

With rapid and dynamic changes in technology, the business environment is quickly changing while changing the way employees work. This arguably increases the demand for digital skills in order to keep up with its ever-growing needs.

The World Economic Forum estimates emerging technologies will create 133 million new jobs by 2022. With this prediction, employees will need to re-skill in order to adopt to new ways of working.
In an effort to bridge the digital skills gap, Safaricom, through its digital academy seeks to empower 90 employees up from 60 employees last year.

The six month program @iLabAfrica-Strathmore University  will focus on Technology Automation, Cloud Computing, Cyber Security among others.

Using a blended approach, the program will consist of on the job training, mentorship and class work.

“We have been building radio networks, selling voice, data and Fintech services for the past 18 years. We have developed the best skills in this part of the world. This guarantees tomorrow will be different in a world driven by AI, 5G and Digital. As leaders, we have a responsibility to create bridges to a meaningful future for our employees and avoid dead end careers driven by the obsolescence of some of our legacy technology.” Said Thibaud Rerolle, the Chief Technology Officer of Vodafon Turkey during last year’s Digital Academy launch.

19 employees out of the 90 will receive training on on Information systems audit, Cyber and Data laws, IoT and Programming for security among other units to be offered.



Posted on Updated on

1.7 Cervical Cancer Awareness_thumbnail_0

According to WHO,(2018) cervical cancer is the fourth most frequent cancer in women with an estimated  570,000 new cases in 2018 representing 6.6% of all female cancers. Approximately, 90% of deaths from cervical cancer occur in low and middle income countries. However, these mortality rates from cervical cancer globally could be reduced through a comprehensive approach that includes prevention, early diagnosis, effective screening and treatment programs.

The incidence of cervical cancer is 53 per 100,000 women in sub-Saharan Africa. Cervical cancer is caused by sexually –acquired infection with Human Papillomavirus (HPV). Vaccination against HPV is given to young girls of age 9-13 years old which is combined with regular screening in women over age 30 for precancerous lesions.

Through collaboration with the IBM research lab –Nairobi, @iLabAfrica has embarked on a journey to develop and implement technologies. The research center helps the Ministry of Health (MOH) in Kenya to monitor, treat, and prevent cervical cancer.  The vision of this work is to enable evidence-based decisions to tackle head on issues of disparate, incomplete and inaccurate data.  This is done through computing and use of science analytics to detect cervical cancer.

In Kenya, it is estimated that only 3.2% of women aged 18-69 years have been screened in any 3 years period. This is according to Information Centre on HPV and cervical cancer 2010. Various tests have been recommended as screening methods in Kenya. They include Visual Aspection with Acetic Acid (VIA), Visual Inspection with Lugol’s iodine (VILI) and convectional Pap smear and HPV testing.

Emmanuel Kweyu, the deputy Director @iLabAfrica-Strathmore University has led a team of ten in a successful implementation of an Open Source Laboratory Information System (LIS) in public health hospital laboratories in Kenya. This set up is aimed at providing affordable and sustainable laboratory information system for developing countries

The IBM Research project has implemented a program that levels access and commitment of University students to their respective communities. This is done to raise awareness of cervical cancer, as well as to collect valuable data and insights into the demographics and awareness of the Big Data. This is the buzzword of the digital age, and often it is intertwined with electronic health records. It refers to enormous amounts of data which is collected, processed, and used for analytics.

When analyzed by data experts, this information has multiple benefits, such as:

Reducing healthcare costs

This uses standardized information and communication technologies that are efficient and therefore tend to reduce cost.

Avoiding preventable deaths

With early detections through the use of screening technology, the disease is captured at an early stage where if right treatment is given, the chances of survival are increased.

Improving quality of life

With use of technology to store data on patients’ information, the health practioners are in a position to respond quickly due to the past treatments and diagnosis the patient has given. This improves the general quality of the health care given in Kenya.

The application of mobile computing and communication technology is rapidly expanding in the fields of health care and public health. This systematic review summarizes the evidence for the effectiveness of mobile technology interventions for improving health and health service outcomes (M-health) around the world.  For example in the healthcare sector, data is collected and stored in huge amounts of data every single second. The cloud system is effective for storage because of its expandability and safe storage solutions.

The Cloud then uses hardware and software to deliver services across the internet.  With this healthcare professionals and patients are both able to access certain data and use applications from any internet-enabled device – anywhere in the world cervical cancer across the country. In order to effectively incorporate the cloud system, education in higher learning institutions needs to be heightened.

Writer: Emmanuel Kweyu- Deputy Director and Head of eHealth @iLabAfrica -Strathmore University


Women in Tech Town Hall Series

Posted on

1583741151722_women in tech 3.jpg


@iBizAfrica-Strathmore University would like to invite you to the first edition of the Women in Tech Town Hall series to be held this Friday, 13th March 2020 at iBizAfrica open space (5th Floor Student Centre) from 4.00 p.m. to 6.00 p.m. This collaboration has been created to support female owned and led businesses to build lifelong, sustainable & relevant connections within the startup ecosystem. This is also an avenue to enhance co-creation of solutions and continuous development in entrepreneurship.

The town hall seeks to open dialogue and have candid conversations among fellow female founders, cybersecurity experts, government and key industry supporters of women in tech. The session dubbed “Protect to Connect” aims to present tools and options on how to incorporate cyber security technology in their businesses.

Areas of discussion will include the General Data Protection Regulation (GDPR), Kenya Data Protection Bill and technical aspects such as use of payment platforms, managing consumer data etc. critical to businesses functioning in the modern age of the internet and the advent of cutting edge technologies.
The event will draw insights from leading tech companies that have navigated the complexities of managing and protecting consumer data as well as addressing emerging cyber threats.

We invite you to join us as part of the Town hall Panel discussing, the main topic, “Building Consumer Trust through Cybersecurity and Compliance”

Kindly register via this link Women in Tech Town Hall Series

In case of any queries, please reach out to adminibiz@strathmore.edu