Rooftop Speaker Series

Saint Louis University Center for Supply Chain Management

Rooftop Speakers Series


Conversations on Innovation, Technology & Supply Chain
Managing Risk, Security & Reputation
Thursday November 10, 2016
Schlay Tap Room (2100 Locust St.)
4:30pm – 6:30pm
Entry is free, RSVP is required.

Come join us and our distinguished group of experts as we explore risk management, cyber security, and market survival in our globally competitive supply chain environments.  Topics will move freely from regulatory practices and IT issues to proactive operational strategies and growth solutions.  This highly interactive and impactful panel discussion will take place in a setting conducive to continuous discourse. We look forward to you joining the conversation!
Panelist Include:
Roel Vestjens, EVP & President – Broadcast Solutions, Belden Inc.
JoAnne Levy, Vice President, Systems Operations, Mercy Health
Dalip Raheja, Presiden & CEO, the MPower Group
Beth Rusert, Senior Vice President & Partner, Standing Partnership
Tony, Bryan, Executive Director, Midwest Cyber Center
David Hakanson, Vice President, CIO & Chief Innovation Officer, Saint Louis University


For questions or more information, please contact Cindy Minor,


Register here:

Mastercard Saint Louis Cybersecurity Conference




The STLCyberCon-2016 is a cybersecurity conference for students, researchers, practitioners, and job seekers. It is sponsored by MasterCard. It features presentations, panel discussions, and keynotes by distinguished speakers. The conference is free and open to the community.


Engaging Keynote Addresses by Cybersecurity Leaders

8:00 am – 9:00 am – Registration and Continental Breakfast
9:00 am – 9:45 am – Morning Keynote
9:55 am – 10:40 am – Panel Session – Security Analytics
9:55 am – 10:40 am – Panel – Entry Level Skills for Cybersecurity Jobs
10:50 am – 11:20 am – Mike Gibbons
10:50 am – 11:20 am – Dr. Bo Luo
11:30 am – 12:00 pm – Tony Masgio
12:00 pm – 12:45 pm – Lunch Keynote
12:00 pm – 3:00 pm – Job Fair
12:55 pm – 1:25 pm – Kurt Aubuchon
Register Now for this free event:

PluggedIN to Cyber Careers

T-REX Presents: PluggedIN to Cyber Careers

GATEWAY 2 CYBERCITY Emerging Trends Symposium

Gateway 2 CyberCity


0730 – Attendee Check-In: Breakfast Buffet Served

0820 – Grand DE: Welcome Message

0830 – Grand DE: Legal Risks & Potential Pitfalls of the Cloud – Peter Vogel, Chair, Internet, eCommerce & Technology Partner, Gardere Wynne Sewell, LLP

0915 – Networking Break

0945 – Breakout Sessions

  • 0945 – Grand B: Cyber Fraud Hunt Operations of Chinese and Russian Criminals – James Schnoebelen, VP, Security Services, SpearTip
  • 0945 – Grand C: How to Prepare for Cybersecurity in 2020 – Lamont Orange, CISO, Vista Equity Partners and Ryan Frillman, Director of Information Security & Compliance Spire
  • 0945 – Grand F: Rethinking Security: Focus on Data First – Michael Mettenheimer, VP Strategy & Security Solutions, Oracle
  • 0945 – Grand G: Breakout Session – John Kistler, Owner, J&B Technologies, LTD

1030 – Networking Break

1100 – Breakout Sessions

  • 1100 – Grand B: Breakout Session – Jeffrey Wright, VP & CISO, Allstate
  • 1100 – Grand C: Strengthening Mission Partners with Military, Government and Industry – Michael Roling, State CISO, State of Missouri, Colonel Roger Vrooman, Commander, 688th Cyberspace Operations Group, Scott AFB, and Brian Jeffords, IT Director, Boeing Information Technology
  • 1100 – Grand F: Preparing Cyber Warriors: How Academia is Embracing Cybersecurity – Jim Curtis, Assistant Professor in Cybersecurity, Webster University
  • 1100 – Grand G: The Increasing Cyber Threats to Big Data Analytics & Cloud Security – Robert Lamear, CEO, US Cybervault

1145 – House Smoked BBQ Lunch Buffet Served

1225 – Grand DE: Keynote Introduction

1230 – Grand DE: A Survey of Car Hacking – Dr. Charlie Miller, Sr. Security Engineer, Uber Advanced Technologies Center

1330 – Networking Break

1400 – Breakout Sessions

  • 1400 – Grand B: Assume Breach: Now what? A practical guide to changing your security program and organizational – Mike Makowka, Information Systems Security Principal, Flowserve
  • 1400 – Grand C: How to Make Threat Intelligence Work for You – Chris Sawall, Director, Cyber Threat Intelligence, Monsanto, Joe Susai, Director, Enterprise Information Risk & Cybersecurity, SSM, and Kevin Hardcastle, CISO, Washington University
  • 1400 – Grand G: The Start of Something Big for the Region – CyberSTL – Tony Bryan, Executive Director, Midwest Cyber Center, Jay Delong, Technology Accelerator, SixThirty CYBER, and Patricia Hagen, Executive Director, T-REX

1445 – Networking Break

1500 – Breakout Sessions

  • 1500 – Grand C: Blockchain – What CISOs & IT Security Leaders Need to Know – Brent Bettis, Senior Director, Global Information Security & IT Strategy, Peabody Energy Corporation, Mike Gibbons, CISO, Edwards Jones, and Joey Smith, CISO, Schnuck Markets
  • 1500 – Grand F: Defending against Cyber Warfare, Insider Threats, and Cyber Fraud – David Major, Founder, CI Centre, Craig Byrkit, Threat and Vulnerability Department Leader, Edward Jones, Tim Reboulet, Special Agent, US Secret Service, and Jarret Kolthoff, President/CEO, SpearTip
  • 1500 – Grand G: GEOINT Cyber Security Mission – Mark Munsell, NGA

1545 – Networking Break

1555 – Grand DE: Keynote Introduction

1600 – Grand DE: Keynote Presentation – Benjamin Akande, President, Westminster College

1645 – Grand DE: Closing Remarks

1650 – Networking Reception


Register Here:



Cyber Security: Hackday 2016



Friday, November 4th

Learn more about Maryville’s Cyber Security Degree at a FUN INTERACTIVE DAY:

  • Participate in hacking activities (ethical, of course!)
    • We’ll showcase how cyber is extending Maryville’s Digital World iPad1:1 program by giving you hands-on reconnaissance and scanning opportunities via the iPad
  • Cyber Security Program Presentation
    • Learn about the Cyber Security program including topics such as offense/defense concentrations, drone usage, corporate partnerships and exciting career outcomes.
  • Cyber Security Professionals Panel
    • Hear from Cyber practitioners and business leaders in a panel session and find out about the numerous internship and full-time career paths you can take as a Cyber Security professional.
  • Campus Tour & Scavenger Hunt
    • You will take a campus tour that will highlight the technical innovations including the NEW CYBER FUSION CENTER, which is staffed by our students and provides free cyber security services to charities, non-for-profits and schools.  You will also take part in a scavenger hunt to find rogue wireless access points around campus.
  • Lunch w/Cyber Security Students
    • Eat lunch with our current Cyber Security students and gain a unique perspective on the cyber program and hear about their current internship/full-time job experiences.


Register at


St. Louis OWASP – Capture The Flag Event



Are you ready to hack? Coming up on October 20th, 6pm at T-REX St. Louis OWASP will be hosting a FREE Capture the Flag competition open to all skill levels (and ages).

SPACE IS LIMITED. If you reserve a space, reserve early!

Prizes will be awarded. You will be required to connect to a custom VPN provided by Symantec.

What is provided:

Food & Beverages


Comfortable space from which to hack.
What you need:

Your own laptop/pc

Tools (Kali Linux recommended)

The ability to have fun.

1st prize- CanaKit Raspberry Pi

2nd prize- WiFi Pineapple “nano basic” model

3rd prize- Lockpicking set


Register here now!


Our Sponsors:

Scott Air Force Base Cyber Banquet 2016


The Commander, 375th Air Mobility Wing
Colonel Laura L. Lenderman
cordially invites you to the

Scott Air Force Base Cyber Banquet

in celebration of National Cyber Security Awareness Month

With Guest Speaker
The Commander, United States Transportation Command,
General Darren W. McDew, USAF

on Thursday
the sixth of October
Social at five thirty in the evening
Dinner at six o’clock in the evening
Scott Event Center

Cost per person: $30

Course One:
Mixed Greens Salad

Course Two:
Seared Beef Tenderloin with Duchess Potatoes

Swordfish with Roasted Red Pepper Couscous and Asparagus

Olive Oil and Garlic Fettuccini Filled Portabella Mushroom

Sundried Tomato, Basil, and Mozzarella Stuffed Chicken

Cheesecake or Pecan Pie

R.s.v.p. by 30 September 2016
POC: 1st Lt Deandre Davis
Alt POC: 1st Lt Raun Merritt
RSVP Here:
Military: Service Dress
Civilian: Business Suit

Hack-tober Competition

Come join us as we kick off National Cyber Security Awareness Month (NCSAM) with a FREE Capture the Flag (CTF) event! 375th Communications Group and Midwest Cyber Center of Excellence is hosting a CTF event open to the public for all ages. Register teams of 1-4. Bring your personal laptop with charging device and we will supply the rest. The CTF will be held at Scott AFB, Building 859 in the Multi-Purpose Room Oct. 1st from 8am – 3:30pm. Anyone needing a visitor pass to get on base, please read the details below for more information.

Capture the Flag is an event during which students, teachers, and professionals come together to compete against one another in an effort to test and expand cyber-security skills and awareness. Participants will be challenged with cyber-security related puzzles from categories like network exploitation, cyber forensics, cryptography, and cyber trivia. Each challenge hides a unique string called a ‘flag’ and participants will receive points for each captured flag. The participant with the most points wins!

Categories: Cryptography, Network Exploitation, Packet Analysis, Programming, Reverse Engineering, Steganography, and Hacker Trivia.

Premier Knowledge Solutions will also hold demonstrations for their 3D printer. Bring your children to watch how an item is actually created! There will be an instructor there to answer any questions. Premier Knowledge Solutions is also generous enough to provide laptops for children to test out and explore what a day as a Cybersecurity Professional looks like through the free program: NSA Day of Cyber.

National Cyber Security Awareness Month (NCSAM) – celebrated every October – was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. With recent legislation and support from the White House, cybersecurity is continuously a popular topic of discussion and rightfully so. More specifically, there is even stronger focus on consumers and their cyber safety. Everyone at every age is a consumer, and thus this year each theme will focus on the consumer and his/her needs regarding cybersecurity and safety.

*** Make sure to register and provide the following information if you need a visitor pass ***

Anyone 16 and over will need a visitor pass and provide a state or federal ID. In order to register for a visitor pass, you will need to provide the State of Drivers License Issued, Driver License Number as well as your date of birth during registration. The only personnel that will require an escort are those that have an ID that is non-compliant with the Real ID Act. Starting on 15 Sept 2016, the non-compliant states are Missouri, Minnesota, Washington (State), and American Samoa. If Any of the guests have an ID from one of those areas they will need a sponsor with them at all times while on the installation.

Below are acceptable forms of identification for identity proofing for access to Scott AFB if you do not have an Enhanced Driver’s License:
– United States Passport or Passport Card, not expired
– Driver’s License or other state photo ID card issued by DMV or equivalent, IAW REAL ID enforcement schedule
– An ID card issued by Federal, State or local government agencies with the all the required REAL ID Act information
– Personal Identification Verification (PIV) card issued by Federal Government
– Veterans health Identification Card issued by U.S. Department of Veterans Affairs
– Interoperable (PIV-I) cards issued by No-Federal Government entities
– Certificate of Naturalization/ Certificate of Citizenship (form N-550)
– Permanent Resident Card/Alien Registration Receipt Card (Form I-551)
– DHS “Trusted Traveler” Cards (Global Entry, NEXUS, SENTRI, FAST)
– Border Crossing Card (Form DSP-150)
– An employment authorization document that contains a photograph (Form I-766)
– U.S. Coast Guard Merchant Mariner Cards Credentials
– U.S. Certificate of Naturalization or Certificate of Citizenship (Form N-550) and U.S. Permanent Resident Card (Form I-551)
– U.S. Refugee travel document or other travel document or evidence of immigration status issued by DHS containing a photograph
– A Foreign Government Issued Passport





MWCCOE HackSpace Competition

Midwest Cyber Center of Excellence (MWCCOE) is hosting a CyberPatriot recruitment event, MWCCOE HackSpace Competition, to get middle/high school students excited towards STEM programs and to encourage children to participate in this year’s CyberPatriot IX competition. CyberPatriot is the National Youth Cyber Education Program. At the center of CyberPatriot is the National Youth Cyber Defense Competition. The competition puts teams of high school and middle school students in the position of newly hired IT professionals tasked with managing the network of a small company. In the rounds of competition, teams are given a set of virtual images that represent operating systems and are tasked with finding cybersecurity vulnerabilities within the images and hardening the system while maintaining critical services in a six-hour period.  Teams compete for the top placement within their state and region, and the top teams in the nation earn all-expenses paid trips to Baltimore, MD for the National Finals Competition where they can earn national recognition and scholarship money.

Our recruitment event, MWCCOE HackSpace Competition, will be a smaller version of the upcoming CyberPatriot competition. Military Cyber Professionals Association – St. Louis Chapter (MCPA) will be running the games. Volunteer cyber advisors from 375th Command Squadron at Scott AFB and Security Advisor Alliance (SAA) will help the children participate in the games to answer any technical questions. Students will come together to  compete against one another in an effort to test and expand cybersecurity skills and awareness. Participants will be challenged with cybersecurity related puzzles from categories like network exploitation, cyber forensics, cryptography, and cyber trivia. Each challenge hides a unique string called a ‘flag’ and participants will receive points for each captured flag. This competition is geared towards 6-12 grade students with little to no cybersecurity experience and is aimed at improving the student’s cybersecurity knowledge.

MWCCOE HackSpace competition will be in the Anheuser-Busch Academic Center, Room 2245 at Maryville University. Awards and prizes will follow immediately after. Event is free for all students. Register  teams of 4 now!

Anyone who isn’t able to form a team of 4, but still wants to participate can! Register yourself and we’ll put you on a team. Any student who’s interested in participating will be able to.


Thank You Security Advisor Alliance (SAA) for sponsoring this event!



download               MWCCOE Official Logo no White Space                cyberpatriot

Smithton 2016 AFA CyberCamp

The Smithton 2016 AFA CyberCamp is designed to be executed over five days. It includes instruction modules, access to accompanying demonstration software, and access to novice Windows 7 and novice Ubuntu competition images on the approved camp’s scheduled competition day.

In 2009, the Air Force Association (AFA) created the CyberPatriot National Youth Cyber Education Program to inspire students toward careers in cybersecurity or other science, technology, engineering, and mathematics (STEM) disciplines critical to our nation’s future.​

Through the AFA CyberCamp program, schools and educational organizations can order a curriculum kit consisting of five four-hour instruction modules, accompanying instructor’s guides, student workbooks, demonstration software, and competition software that will teach students important skills in cyber safety and cybersecurity. Local organizations and volunteer instructors can execute the 20- hour curriculum set as a weeklong summer program supplemented by guest speakers and additional group activities. The camp’s 20-hour curriculum has been designed to be completed over five days (Monday through Friday), with the fifth day serving as a “mini-cyber competition day.”

The AFA CyberCamp Kit curriculum is organized as follows:

  • Module 1: Introduction to the CyberPatriot National Youth Cyber Defense Competition, cybersecurity career opportunities, cyber ethics, online safety, how computers work, and cyber threats
  • Module 2 : Cybersecurity principles, virtual machines, basic Windows security policies and tools, and account management
    • Students follow along on the provided Windows 7 demonstration image
  • Module 3: Windows file protections, auditing and monitoring, introduction to Server 2008 and introduction to Linux
    • Students follow along on the provided Windows 7 demonstration image
  • Module 4: Ubuntu terminology and concepts, basic graphical user interface security, basic command line security, and intermediate Ubuntu security
    • Students follow along on the provided Ubuntu demonstration image
  • Module 5: Mock CyberPatriot competition
    • Students compete on the provided Windows 7 and Ubuntu competition images

For more information about 2016 AFA CyberCamp click here.