logo

UGA CyberArch

Page Menu

Students in the UGA Cyberarch program meet with Mark Lupo with the Carl Vinson Institute of Government.

UGA is addressing the challenges of cybersecurity for Georgia’s communities and businesses. UGA CyberArch, facilitated by the UGA Carl Vinson Institute of Government, helps build a broader awareness about cybersecurity threats and strengthens cyber preparation and response actions of city and county governments, K-12 school systems and rural hospitals. UGA CyberArch is expanding into the small business community through a collaboration with the UGA Small Business Development Center

UGA CyberArch is free for participating organizations, providing a total value of approximately $60,000 to $180,000 from seven teams working over a semester. 

Partner organizations remain confidential, adding another layer of security to the program.

Student Involvement

Student interns, working in teams of four, conduct a cybersecurity risk review through a series of risk review questions, then make a site visit before creating a final report that includes recommendations to enhance the organization’s cybersecurity posture.  

In addition to learning about cybersecurity best practices, UGA CyberArch interns acquire skills that may help them pursue a cybersecurity career, providing a workforce development component. 

Iyanna Yapo, a student majoring in computer science, serves as a team leader for UGA CyberArch. (photo by Shannah Montgomery)

Iyanna Yapo, a student majoring in computer science, serves as a team leader for UGA CyberArch. (photo by Shannah Montgomery)

Program History

UGA CyberArch started in the Fall of 2017 as a pilot program within the Office of the Vice President for Public Service and Outreach, bringing together academic and public service faculty to develop a plan on how best to approach community cybersecurity outreach.

Student participation was added in the Spring of 2022 with eight interns. By the Fall of 2022, there were 24 interns and the program was under the UGA Institute of Government. As of the fall of 2023, the intern pool had grown to 30 interns. Interns currently come to the UGA CyberArch program from the College of Engineering, the School of Computing, the Institute for Cybersecurity and Privacy and the Terry College of Business MIS program.  

Webinars

Upcoming Webinars

  • Uncovering Risks: The Power of Continuous Vulnerability Management
    Tuesday, Jun 18, 2024 | 11 a.m. - noon
    Register

  • Fortifying Digital Gates: Email and Browser Defense Strategies
    Wednesday, Jul 17, 2024 | 11 a.m. - noon
    Register

  • Strengthening Your Digital Perimeter: Strategies Against Malware Threats
    Wednesday, Aug 21, 2024 | 11 a.m. - noon
    Register

  • Unlocking Lost Data: Strategies for Successful Data Recovery
    Wednesday, Sep 18, 2024 | 11 a.m. - noon
    Register

  • The Human Firewall: Enhancing Security through Awareness Training
    Wednesday, Oct 16, 2024 | 11 a.m. - noon
    Register

  • From Crisis to Control: Optimizing Incident Response
    Wednesday, Nov 13, 2024 | 11 a.m. - noon
    Register

  • Closing the Cybersecurity Loop: A Comprehensive CIS Controls Overview
    Wednesday, Dec 11, 2024 | 11 a.m. - noon
    Register

Past Webinars

  • Securing Digital Assets: Account & Access Control Best Practices
    Wednesday, May 15, 2024 

    Our expert speaker Sarah Day, Senior Cybersecurity Controls Engineer for the Center for Internet Security (CIS), delves into the critical significance of CIS Control 5 (Account Management) and CIS Control 6 (Access Control Management). She explores the best practices for creating, managing and securing user accounts while implementing strong password policies and multi-factor authentication to ensure only authorized access. Sarah also dives into the importance of defining and enforcing access control policies, implementing role-based access controls (RBAC) and monitoring user access to protect an organization's sensitive data and mitigate the risk of insider threats.
    View webinar recording

  • Navigating Secure Configurations: Shielding Software and Enterprise Assets
    Wednesday, Apr 17, 2024 

    Our expert speaker Joshua Franklin, Senior Security Engineer at the Center for Internet Security (CIS), delves into the critical significance of CIS Control 4 (Secure Configuration of Enterprise Assets and Software). He emphasizes enhancing your organization's security posture through effective management of firewalls, session locking, and default accounts, minimizing vulnerabilities, and fortifying access controls. Implementing Control 4 forms an integral part of a comprehensive cybersecurity strategy, reducing the risk of security breaches and potential attack surfaces.
    View webinar recording

  • Stay Secure: Elevating Your Data Protection
    Wednesday, Mar. 20, 2024
    Our expert speaker Joshua Franklin, Senior Security Engineer at the Center for Internet Security (CIS), delves into the critical significance of CIS Control 3 (Data Protection). He elaborates on how Control 3 ensures the safeguarding of sensitive data through measures such as encryption, access controls, and data handling protocols. Joshua emphasizes how implementing Control 3 forms an integral part of a comprehensive cybersecurity strategy, fortifying defenses against data breaches and unauthorized access.
    View webinar recording

  • Security Synergy: Mastering Asset Controls in Hardware and Software
    February 21, 2024 
    Our expert speakers, Joshua Franklin, Senior Security Engineer at the Center for Internet Security (CIS), and Sarah Day, Senior Cybersecurity Controls Engineer for the Center for Internet Security (CIS), break down the importance of CIS Control 1 (Inventory and Control of Enterprise Assets) and Control 2 (Inventory and Control of Software Assets). They discuss how Controls 1 and 2 provide a robust foundation for cybersecurity by establishing visibility and control over your IT assets.
    View webinar recording

  • Decoding the CIS Controls Webinar
    January 17, 2024
    Our expert speaker, Joshua Franklin, Senior Security Engineer at the Center for Internet Security (CIS), discusses general information regarding CIS controls and how they relate to cybersecurity and how they are used.
    View webinar recording

  • Is Your Government Cyber Aware? Webinar

    This hourlong session highlighted the story of one local government’s encounter with hackers and offered resources and guidance should something similar happen in your community. During the session, Zach Propes, assistant county administrator in Hall County, shared lessons from surviving a cyberattack. 
    View webinar recording