Sixth Annual Tee off for Technology raises funds for 12th Man Football and Cheer Camp

Share on facebook
Share on google
Share on twitter
Share on linkedin
UDT (UDT) hosted the Sixth Annual Tee off for Technology on Friday, May 19 at the Biltmore Hotel. All funds raised by the golf tournament benefitted the 12th Man Football and Cheer Camp. The 12th Man Football and Cheer Camp is a one-day community camp that gives differently-abled children the opportunity to participate in sports. Coaches from football and cheerleading teams put this camp together at no cost to the participants. The football camp teaches participants to run drills, including blocking, kicking and catching the ball, and how to play defense. The cheerleading camp features an all-day workshop to learn a routine using pompoms and signs. Originally started in South Florida, the camp has grown, with the latest camp being hosted in Greenville, South Carolina. Apart from golf, the tournament featured a photo booth, raffles, and a hole-in-one challenge for a brand-new car from Range Rover! Guests enjoyed the beautiful landscapes at the Biltmore Hotel in Coral Gables, and beer samples from a local brewery, Biscayne Bay Brewing Company. UDT would like to thank the sponsors of this event for their generous contributions. This year, UDT is excited to announce that they raised $11,660 towards the camp. UDT is a proud supporter of this camp and looks forward to this event every year. For more information on upcoming events, follow us on Facebook.

Focus time, money, and effort on what really matters

Let’s build success together. 

More to explore

SOC Solutions

The 9 Main Benefits of SOC Solutions

The Security and Operations Center (SOC) is where the cybersecurity strategy of a business is coordinated and implemented. It is composed of the three building blocks of people, processes and technology that go hand in hand to manage and enhance the organization’s security posture.

Multi-Factor Authentication

Seven Benefits of Multi-Factor Authentication

Hackers are using increasingly sophisticated tactics to gain data access. Email phishing, keylogging, brute force attacks and social engineering are among the variety of ways to gain access credentials.

Just one more step

Please fill out the following form,