The first-ever Cyber Bowl kicks off soon — are you ready to play and help UNC-Chapel Hill beat NC State University and Duke University?
It’s easy to play and put points on the board for Carolina — simply log into the Cyber Bowl site, hosted by NC State, with your Onyen and take a short quiz. Better yet, when you play the quiz, you’re also entered in a prize drawing. The event runs all October long.
Every October, UNC celebrates National Cybersecurity Awareness Month. Founded in 2004, Cybersecurity Awareness Month is the world’s foremost initiative promoting cybersecurity awareness and best practices. Businesses, government agencies, colleges and universities all celebrate Cybersecurity Awareness Month as part of keeping our communities cyber safe.
The Cyber Bowl kicks off October 1 and runs through October 31, engaging students, faculty and staff in cybersecurity with some friendly competition.
Log in, earn points, help UNC win
To play the Cyber Bowl, competitors will use their school IDs to log into the Cyber Bowl website, hosted by NC State University, and take a short cybersecurity quiz. The five-question quiz covers topics like passwords and phishing. Every completed quiz earns a point for the team and earns an entry to a prize drawing.
You can keep track of how Tar Heels are stacking up on the live scoreboard and at the end of the month, the team with the most points wins! The winning university will claim bragging rights as the first-ever Cyber Bowl champion.
More Cybersecurity Awareness Month events
The Cyber Bowl is just one part of UNC’s National Cybersecurity Awareness Month celebration. Join ITS and the Information Security Office at these October events.
October 14: Visit our security tent in the Pit
Swing by the security tent in the Pit on October 14, between 10 a.m. and 2 p.m. Event highlights include:
- Free food
- Hands-on lockpicking
- Swag and giveaways
- Carolina Key
- Play the Cyber Bowl
- Visit Mia, the UNC Police therapy dog
This event is co-hosted by the Information Security Office, the ITS Service Desk, School of Medicine IT and UNC Police.
October 15: Webinar with a Microsoft cybersecurity specialist
Join the Information Security Office for a free webinar, “Identity Under Siege: Navigating the Complexities” with Jonathan Fox on Tuesday, October 15, at 2 p.m. The webinar is free, but registration is required. Use onyen@email.unc.edu as your email address when you register.
The webinar will discuss the challenges of security identities, both the parts and pieces that can be implemented to secure identities from a technical standpoint and then the parts that are related to human nature.
Jonathan Fox is a senior cybersecurity consultant in the Engineering and Architecture Group at Microsoft. Before joining Microsoft, he was a senior identity engineer at MetLife.
His forte is in identity systems and the associated privileged management that comes with such control planes for an organization’s environment and associated lifecycles — whether user, application or external.
Fox is a Microsoft Certified Trainer, CompTIA certified trainer and a Cisco Certified Solutions Instructor (CCSI) teaching both associate and professional level curricula.
October 22: Live Data@Rest podcast recording
On October 22 from 1 p.m. to 2 p.m, join a live recording of the cybersecurity podcast Data@Rest. The event is free, but registration is required. Use onyen@email.unc.edu as your email address when you register.
Michael Williams of the Information Security Office and Charlie Mewshaw, cybersecurity specialists who produce and host Data@Rest will record an episode over Zoom and invite the audience to participate.
They’ll discuss embedding security mindfulness and creating a security culture and how how higher education can create that security mindset to reduce the reliance on yearly training.
They’ll be joined by fellow podcaster and cybersecurity expert Chris Romeo, a leading voice and thinker in application security, threat modeling. Romeo is the CEO of Devici and general partner at Kerr Ventures. He hosts several award-winning podcasts, Application Security Podcast, The Security Table and The Threat Modeling Podcast.