St. Louis Region/Scott AFB (ISC)2 Chapter​ 

Meeting Minutes

Feb 2024

Protecting Loved Ones from Scams

Jan 2024

Safety and Security

March 2024

Apple Security

Nov 2023

Threat Modeling

20231129_MeetingMinutes.pdf

Oct 2023

SecureWorld

Sept 2023

St Louis Fusion Center

20230927_MeetingMinutes.pdf

Aug 2023

Data Center Security

20230830_MeetingMinutes.pdf

July 2023

Battery Energy Storage Systems

June 2023

Allowlisting

20230628_MeetingMinutes.pdf

May 2023

CISA CSET

20230531_MeetingMinutes.pdf

April 2023

Safety and Security

20230426_MeetingMinutes.pdf

March 2023

LastPass Breach

20230329_MeetingMinutes.pdf

February 2023

STL Fusion Center

20230222_MeetingMinutes.pdf

January 2023

AI/ML for Self Protecting Data

20230125_MeetingMinutes.pdf

November 2022

Recorded Future

20221130_MeetingMinutes.pdf

October 2022

Scanning Roundtable

20221026_MeetingMinutes.pdf

September 2022

Posture Management

20220928_MeetingMinutes.pdf

August 2022

CISA Shields Up

20220831_MeetingMinutes.pdf

July 2022

CISA Overview

20220727_MeetingMinutes.pdf
Cyber Incident Reporting.pdf
CSA Lead Assessments.pdf

June 2022

Azure and Kubernetes

20220629_MeetingMinutes.pdf

May 2022

Securing Bulk Electric System Data

20220525_MeetingMinutes.pdf

April 2022

Recent Hack Review (Adlumin)

20220427_MeetingMinutes.pdf

March 2022

Ukraine Related Threat Intelligence

20220330_MeetingMinutes.pdf

February 2022

Log4Shell Roundtable Discussion

20220223_MeetingMinutes.pdf

November

2021

Chapter Chat - Biggest Challenges

2021117_MeetingMinutes.pdf

October

2021

Steps to Earning your CISSP Certification

20211027_MeetingMinutes.pdf

September

2021

TechGuard

20210929_MeetingMinutes.pdf

July

2021

St. Louis Hiring Trends

June

2021

CyberUp

20210630_MeetingMinutes.pdf

May

2021

Data Tokenization

April

2021

Government Security Clearances

February

2021

Recent Cyber Events - What would you do as CISO?

January

2021

Chapter Planning Discussion

November

2020

Assessing Risk with Open FAIR

October

2020

FEDRAMP Accreditation

August

2020

Roundtable Discussion

July

2020

Cyber Safety and Education

June

2020

macOS Security

May

2020

Modeling Operational Technology

April

2020

Children's Online and Privacy Protection

February

2020

DHS Cybersecurity and Infrastructure Security Agency (CISA)

January

2020

Managing Your Career

November

2019

Ethics, DNS over HTTP

October

2019

Microsoft Active Security, Medical Infrastructure

Sept

2019

Machine Learning and Security

August

2019

Digital Transformation

July

2019

Operational Technology and Industrial IDS

Month

Highlights

June

2019

Digital Evidence Collection with Chesterfield Police Department

May

2019

Digital Forensics with Watermark Forensic Services

April

2019

Incident Response with SpearTip

March

2019

Midwest Cyber Center

February

2019

Vendor Risk Management

January 2019

Pen Testing an Oil Rig

December 2018

Holiday Social and Board Meeting

November 2018

Board Elections - Infoblox discussed DNS attack vectors and mitigation strategies

October 2018

CyberArk demonstrated many hacking methods


Sept 2018

Dr. Larry Ponemon presented his research at the chapter meeting during SecureWorld


August 2018

Verizon Enterprise Solutions presented the Verizon 2018 Data Breach Investigations Report. 


July 2018

Geoff Jenista presented on DHS Cyber offerings 


June 2018

Security Innovations hosted a CMD+CRTL Hackerthon  


May 2018

The many types of easily available video and audio surveillance devices on the market, and then the methodology and tools available to detect those devices 


May 2018

The many types of easily available video and audio surveillance devices on the market, and then the methodology and tools available to detect those devices 


April 2018

Christian Espinosa from Alpine Security presented on "Effective Tactics Used by Hackers & How to Avoid Being the Next Cyber Victim" 


February 2018

Joey Smith talks about challenges with securing Medical Devices.


​January 2018

Craig Reeds described the NERC CIP regulations which are used to help protect critical infrastructure within our power grid 

​November, 2017 

Election of Officers

- Bill Stanard described the CyberPatriot program for mentoring under-served children about the Security profession

- ForeScout engineer, Justin Linn, described the challenges of managing a corporate network that support IoT devices

​​October, 2017  

​RSA Senior Systems Engineer, Sean Griesheimer introduced the principles associated with Threat Hunting, and then went on to demonstrate the RSA Netwitness tool. 

​Sept 2017  

Col Cedric Leighton led a discussion regarding the obligation to protect PII and then the obligation to inform customers when a breach has occured. 

​​​Aug 2017 

Chapter membership chair Ken McFadden provided an overview of the Federal Risk and Authorization Management Program (FedRamp) program for assessing cloud products and services. 

​July 2017 

Norm Muelleman, senior security engineer and trainer for Alpine Security, discussed the Certified Ethical Certification and other related certifications from EC Council​

​June 2017 

​Jeff Snyder, Ethical Hacking Lead at Emerson Electric described his experience starting an internal penetration testing group. 

​May 2017 

Ben Auton, Director of Managed Services at SpearTip described a day in the life of an incident responder. 

​​April 2017 

​Andrew Taylor, Principle Consultant for "The New IT" explained his case for how iOS provides a superior security architecture for mobile business applications. 

​​March 2017 

​​Barak Feldman, CyberArk Director of Privilidged Account Security, described the challenges associated with protecting services and priviliged accounts, and then best practices and products that could be used. 

​Feb 2017 

​TradeHarbor CEO, Paul Heirendt discussed multi-factor authentication and in particular TradeHarbor's voice based authentication and signing system. 

​​Jan 2017  

​Brian Lourie introduced the new chapter officers and discussed other changes within the chapter.  Suzanne Magee presented how threat intelligence is used in a new class of firewalls with an emphasis on products from Bandura Systems. 

April

Earning your ISC2 Certification