UGA is addressing the challenges of cybersecurity for Georgia’s communities and businesses. UGA CyberArch, facilitated by the UGA Carl Vinson Institute of Government, helps build a broader awareness about cybersecurity threats and strengthens cyber preparation and response actions of city and county governments, K-12 school systems and rural hospitals. UGA CyberArch is expanding into the small business community through a collaboration with the UGA Small Business Development Center.
UGA CyberArch is free for participating organizations, providing a total value of approximately $60,000 to $180,000 from seven teams working over a semester.
Partner organizations remain confidential, adding another layer of security to the program.
Student interns, working in teams of four, conduct a cybersecurity risk review through a series of risk review questions, then make a site visit before creating a final report that includes recommendations to enhance the organization’s cybersecurity posture.
In addition to learning about cybersecurity best practices, UGA CyberArch interns acquire skills that may help them pursue a cybersecurity career, providing a workforce development component.
Iyanna Yapo, a student majoring in computer science, serves as a team leader for UGA CyberArch. (photo by Shannah Montgomery)
UGA CyberArch started in the Fall of 2017 as a pilot program within the Office of the Vice President for Public Service and Outreach, bringing together academic and public service faculty to develop a plan on how best to approach community cybersecurity outreach.
Student participation was added in the Spring of 2022 with eight interns. By the Fall of 2022, there were 24 interns and the program was under the UGA Institute of Government. As of the fall of 2023, the intern pool had grown to 30 interns. Interns currently come to the UGA CyberArch program from the College of Engineering, the School of Computing, the Institute for Cybersecurity and Privacy and the Terry College of Business MIS program.
Uncovering Risks: The Power of Continuous Vulnerability Management
Tuesday, Jun 18, 2024 | 11 a.m. - noon
Register
Fortifying Digital Gates: Email and Browser Defense Strategies
Wednesday, Jul 17, 2024 | 11 a.m. - noon
Register
Strengthening Your Digital Perimeter: Strategies Against Malware Threats
Wednesday, Aug 21, 2024 | 11 a.m. - noon
Register
Unlocking Lost Data: Strategies for Successful Data Recovery
Wednesday, Sep 18, 2024 | 11 a.m. - noon
Register
The Human Firewall: Enhancing Security through Awareness Training
Wednesday, Oct 16, 2024 | 11 a.m. - noon
Register
From Crisis to Control: Optimizing Incident Response
Wednesday, Nov 13, 2024 | 11 a.m. - noon
Register
Closing the Cybersecurity Loop: A Comprehensive CIS Controls Overview
Wednesday, Dec 11, 2024 | 11 a.m. - noon
Register
Securing Digital Assets: Account & Access Control Best Practices
Wednesday, May 15, 2024
Our expert speaker Sarah Day, Senior Cybersecurity Controls Engineer for the Center
for Internet Security (CIS), delves into the critical significance of CIS Control
5 (Account Management) and CIS Control 6 (Access Control Management). She explores
the best practices for creating, managing and securing user accounts while implementing
strong password policies and multi-factor authentication to ensure only authorized
access. Sarah also dives into the importance of defining and enforcing access control
policies, implementing role-based access controls (RBAC) and monitoring user access
to protect an organization's sensitive data and mitigate the risk of insider threats.
View webinar recording
Navigating Secure Configurations: Shielding Software and Enterprise Assets
Wednesday, Apr 17, 2024
Our expert speaker Joshua Franklin, Senior Security Engineer at the Center for Internet
Security (CIS), delves into the critical significance of CIS Control 4 (Secure Configuration
of Enterprise Assets and Software). He emphasizes enhancing your organization's security
posture through effective management of firewalls, session locking, and default accounts,
minimizing vulnerabilities, and fortifying access controls. Implementing Control 4
forms an integral part of a comprehensive cybersecurity strategy, reducing the risk
of security breaches and potential attack surfaces.
View webinar recording
Stay Secure: Elevating Your Data Protection
Wednesday, Mar. 20, 2024
Our expert speaker Joshua Franklin, Senior Security Engineer at the Center for Internet
Security (CIS), delves into the critical significance of CIS Control 3 (Data Protection).
He elaborates on how Control 3 ensures the safeguarding of sensitive data through
measures such as encryption, access controls, and data handling protocols. Joshua
emphasizes how implementing Control 3 forms an integral part of a comprehensive cybersecurity
strategy, fortifying defenses against data breaches and unauthorized access.
View webinar recording
Security Synergy: Mastering Asset Controls in Hardware and Software
February 21, 2024
Our expert speakers, Joshua Franklin, Senior Security Engineer at the Center for Internet
Security (CIS), and Sarah Day, Senior Cybersecurity Controls Engineer for the Center
for Internet Security (CIS), break down the importance of CIS Control 1 (Inventory
and Control of Enterprise Assets) and Control 2 (Inventory and Control of Software
Assets). They discuss how Controls 1 and 2 provide a robust foundation for cybersecurity
by establishing visibility and control over your IT assets.
View webinar recording
Decoding the CIS Controls Webinar
January 17, 2024
Our expert speaker, Joshua Franklin, Senior Security Engineer at the Center for Internet
Security (CIS), discusses general information regarding CIS controls and how they
relate to cybersecurity and how they are used.
View webinar recording
Is Your Government Cyber Aware? Webinar
This hourlong session highlighted the story of one local government’s encounter with
hackers and offered resources and guidance should something similar happen in your
community. During the session, Zach Propes, assistant county administrator in Hall County, shared
lessons from surviving a cyberattack.
View webinar recording