A Collaborative Community for Cybersecurity Students
Our UNCOMN Cybersecurity Center is home to the state-of-the-art Cybersecurity Center
of Excellence Laboratory and the Cybersecurity Academic Advisory Council. The center
promotes undergraduate- and graduate-level cyber education, while serving as a venue
for collaboration between faculty, students and community members on cybersecurity
issues. The center's point of contact is Computer and Information Sciences Department
chair, James Curtis, phone 314-246-8761 or email jamescurtis89@webster.edu.
In 2023, Webster University partnered with UNCOMN, a local agency providing business-to-business management and technology consulting services. This partnership will help the next generation of cybersecurity experts by connecting Webster undergraduates with resources and nontraditional pathways to careers in cybersecurity. Through firsthand exposure to industry scenarios and the opportunity to network with current professionals, cybersecurity students at Webster will be thoroughly prepared to enter the workforce.
High-Tech Facilities
Students have the tools they need to learn to address issues concerning:
- Digital information protection
- Cyber terrorism
- Cyber fraud and theft
- Cyber intelligence and counterintelligence
- Digital forensics
- Preemptive and strategic force operation application situations
- Social engineering
- Cloud security
Cybersecurity Lab
The dedicated Cyber Lab at Webster University, opened in 2023, is located in the UNCOMN Cybersecurity Center in the East Academic Building, home of the Walker School of Business & Technology. It is available exclusively for students enrolled in cybersecurity courses, meaning you will have a dedicated place to study and seek support as you complete your studies. The tools in the Cyber Lab are designed to be dynamic and setup with the needs of cyber security students and real-world application in mind. Your experience at Webster will allow you to practice your skills and be engaged in a cirriculum that you can apply in the outside world immedietly upon entering the field.
Academic Programs
Designated Program
Additional Programs
- Cybersecurity Operations (MS)
- Cybersecurity with an Emphasis in Artificial Intelligence (MS)
- Cybersecurity with an Emphasis in Data Analytics (MS)
- Computer Science with an Emphasis in Machine Learning (BS)
- Computer Science with an Emphasis in Software Engineering (BS)
- Computer Science with an Emphasis in Data Science (BS)
- Management and Leadership (MA) with an Emphasis in Cybersecurity
- MBA with an Emphasis in Cybersecurity
- National Security Studies (MA)/Cybersecurity Operations (MS)
- Graduate Certificate in Cybersecurity Threat Detection
- Graduate Certificate in Cybersecurity Information Assurance
- Apply Now
About Webster's Cybersecurity Programs
Webster is a Member of the CAE Community
In 2019, Webster University was welcomed into the Center of Academic Excellence (CAE) Community by the National Security Agency (NSA) and the Department of Homeland Security (DHS), who designated Webster University’s undergraduate cybersecurity programs as a National Center of Academic Excellence in Cyber Defense (CAE-CD).
According to the NSA, “The goal of the program is to reduce vulnerability in our national information infrastructure. Students graduating from CAE-CD institutions are considered to have received the finest levels of formal cybersecurity education."
Transcript
[Upbeat piano music plays.]
[Images of Webster Hall and the green space in front of it.]
[Images of the Interdisciplinary Building from different angles.]
[Image of three students walking on campus in the fall with leaves on the ground and the East Academic Building in the background.]
[Jim Curtis, Director of the Cybersecurity Program and Information Technology talking toward camera sitting in a classroom with a monitor on the wall in the background with the Webster logo on it.]
[General upbeat instrumental music plays low in background.]
Text on screen: Jim Curtis, Information Technology and Cybersecurity Program Director
Jim Curtis: Our Cybersecurity program is probably the most unique program of all universities in the United States.
[Footage of a professor leaning over a student at a desk in a classroom, pointing to the laptop screen, while they are talking.]
Curtis: We range all the way from our undergraduate degree program to three different master's degree programs.
Footage of a professor at the front of a classroom writing and talking about a graphic drawn on the whiteboard.]
Text on screen: Recognized as Innovative by the National Cybersecurity Center
Curtis: Our students come in, and they truly focus on computer network fence ethical hacking different aspects of cybersecurity.
[Footage shows three students in classroom listening to the professor at the whiteboard off screen.]
[Upbeat instrumental music continues to play low in background.]
[Footage of Simone Cummings, Dean of the George Herbert Walker School of Business and Technology talking toward the camera, seated inside the East Academic Building.]
Simone Cummings: We've built this incredible team that is unbeatable security out in the field and out in the community, and that makes a difference.
Text on screen: Simone Cummings, Dean, Walker School of Business and Technology
[A professor talks in a classroom. Three students face each other talking in a classroom. One has a laptop open.]
[Image of professor talking one-on-one with a student in the classroom. Two other students are in the background sharing notes and talking.]
[Classroom with five students facing the front of the classroom. A video shot shows hands typing on a laptop at a desk in a classroom. Camera pulls back to show three students surrounding another student who is sitting and typing on a laptop in a classroom.]
[Footage of Curtis as he talks toward the camera sitting in a classroom with a monitor on the wall in the background with the Webster logo on it.]
Curtis: Our undergraduate degree program is one that is really amazing from the standpoint of how we teach the courses. We use the EC Council as our academic partner. EC council is one of the premier organizations in the United States for cybersecurity and we don't use the textbook.
[Six students are in a classroom discussing cybersecurity.]
[Three students are at the front of a classroom with a professor displaying information on a computer monitor on a table.]
[Six students in a classroom with a professor talking to four of them who are standing near the front, while the other two sit behind them. A poster hangs on the wall, saying Center for Cybersecurity. Webster University]
Curtis: We use all of their materials. We use their labs, their exercises and at the end of the program, our students have the opportunity to take the Computer Network Defense Certification test.
[Students in a classroom; all working on laptops.]
[Curtis speaks toward camera, while sitting in a classroom.]
[Cummings is shown talking toward the camera seated inside the East Academic Building.]
Cummings: What students learn in the classroom they can then apply the next day out in the field.
[Greg Malone, Global Chief Information Officer, is shown lecturing in a Cybersecurity classroom. Two large monitors are on the wall behind him with a classroom image on one and a keyboard on the other. The back of one student’s head is out of focus to the side facing Malone.]
Cummings: We are very particular about what we teach, the way that we teach.
[Student sits in a classroom working on a laptop.]
[Malone stands at the front of a classroom lecturing and pointing to a monitor on the wall that displays graphics with five students listening.]
Text on monitor: Digital Transformation Systems Behavior Culture Mindset
Cummings: We want our students to be engaged with the curriculum and we want them to be able to apply the curriculum. So it's not theoretical. Everything we do is very, very applied.
Curtis: They, also when they graduate, will receive their Department of Homeland Security and a National Security Agency certificate for attending a Center for Academic Excellence designated University.
[General upbeat instrumental music plays low in background.]
[Two students look at a laptop screen in a classroom. Three students are in a classroom with a professor during a cybersecurity class. A professor hands out some supplies to several students in a classroom. A student plugs in cords to a hard drive terminal.]
Cummings: The cool thing about our program is that we have a 100% placement of our students, so there is huge demand for our students because people know you know. The word is out. Our students are fabulous.
[Music crescendos up and finishes. Footage shows the front of Webster Hall with flags flying and the green lawn and landscaping in front of it.]
Text on screen: Webster University
“As a Computer Science student, I heard about the growth in STEM programs, including the NSA- and DHS-approved Cybersecurity program that is ranked No. 1 in the state. I figured Webster would be a fit for me both personally and academically, and it really has been!”
BS in Computer Science with an Emphasis in Cybersecurity, '24
Program Recognitions
1st in Missouri
Universities.com ranked Webster University No. 1 Best Cyber Security college in Missouri for 2024.
Cybersecurity Faculty
- James Curtis, PhD, Chair, Computer and Information Sciences Department
- Adewale Ashogbon, PhD, Visiting Assistant Professor, Information Technology Management
- Velimir Ćosić, MS, Instructor, Cybersecurity
- Jason Dill, MBA, Instructor, Cybersecurity
Geneva, Switzerland Campus
- Alexis Kauffmann, PhD
- Ray Bonnan, PhD
- Viktor Polic, PhD
- Kavé Salamatian, PhD
St. Louis Metro Campuses
- Kenneth Ackerman
- Kennedy Agutu
- George Antoniou, PhD
- Adewale Ashogbon, PhD
- Wayne Bell
- Hubert (Ted) Biggs II
- Paul Biolchini
- Del Brashares
- Catherine Button
- Peng Peng Chen, PhD
- Jacob Curtis
- James Curtis, PhD
- Mark Dalle
- Teddy Dawson, PhD
- Brian Dickerman
- Jason Dill
- Todd Dill
- Cristina Ethington
- Paul Frazer
- Lasanthi Gamage, PhD
- Steven Hale
- Jason Ham
- Barcus Jackson, PhD
- Connie Johnson, JD
- Al Keeler
- Eric Kruse
- Ronald Krutz, PhD
- Xue Li, PhD
- Julie Lowrie, JD
- Warren Mack, EdD
- Peter Maher, PhD
- Doug Menendez
- Ali Ovlia, PhD
- John Parise
- Chris Pavlack
- Bree Perdun
- Mani Ravindran
- Tonya Rivers
- Will Rivers
- Kun (Quinn) Shao
- William Smith, ABD
- John Sprague
- David Sun
- Xiaoyuan Suo, PhD
- Frank Tempia
- Kevin Thomas
- Steffany Tinnin
- Deborah Torres, EdD
- Jiangping Wang, PhD
- Bradley Wors
- Yimin Zhu
Cybersecurity Academic Advisory Council (CAAC)
Purpose
To review, assess, support and provide guidance on the Cybersecurity Programs at Webster University. The CAAC members will advise the University regarding the substance of the curriculum, effectiveness as applied to the discipline of cybersecurity, industry trends and other related aspects of the program for the purpose of continuous improvement and responsiveness to the needs of industry and government. The council members will also support an ecosystem whereby a pipeline for students to intern with regional organizations, along with supporting opportunities for students to engage in research projects with cybersecurity experts, practitioners and teams from industry and government IT organizations.
Membership
- Types of Representatives: Members are solicited from small, medium and large IT organizations representing the 16 national critical infrastructures and business types, combined with their ability to meet the purposes of the advisory council.
- Member Conflict: Members and Nominees MAY NOT be a member of Webster University's Board of Trustees.
- Membership: The membership body will be comprised of a minimum of five and a maximum of eight member organizations.
- Service Tenure: Membership tenure is three years, with a one-time renewal allowed. No member may serve for more than a total of six years. (Note: The initial cohort has half of the members on a two-year membership to ensure continuity as members rotate off the CAAC)
- Task forces and subcommittees: If the members determine there is a need to address a specific aspect of cybersecurity, special task forces or subcommittees may be established with the approval and oversight of a majority of the CAAC members. The special task force or subcommittee must articulate the purpose anf goals of the task force, a clear and finite timeline with measurable outcomes, membership on the task force and reporting structure.
Roles and Responsibilities
- Attendance at CAAC meetings (general meetings will occur every four months).
- Serve as an advocate for the University Cybersecurity programs.
- Provide support to the Cybersecurity program students through mentoring, internships, competitions and other related activities to enhance the student's Cybersecurity education and prepare them for careers in the discipline.
- Provide advice and council regarding trends & market responses to academic initiatives.
- Development of external partnerships and creation of avenues for collaboration and networking in the community for students and college representatives.
- Provide expertise and connections within individual CAAC member's professional field.
- Assist in the selection, support, and sponsorships of academic symposiums and college guest speakers, and attend events.
Role of Webster University College Representatives
- Advanced Notice of all CAAC meetings
- Host, plan and serve as the facilitator of meetings.
- Meetings should include:
- Updates on college/school enrollment
- Academic presentations
- Philanthropy activities and results for the college
- Updates on any significant alumni accomplishments.
- Provide communications to CAAC whenever needed:
- Follow-up meetings on special initiatives/task forces/subcommittees
- Time sensitive information re: college activities, events, special news of accomplishments, etc.
- Provide an avenue of social interaction, networking and collaboration. between the college and members to create a tighter sense of community
- Review the Goals of the CAAC and cybersecurity academic program at the beginning of each academic year.
Marc Ashworth, Senior Vice President and Chief Information Security Officer — First Bank
Marc Ashworth is a respected IT executive with over 30 years of experience in cyber and physical security, IT/security architecture and project management, and is an author and a public speaker. He is a board member of the St. Louis Chapter of InfraGard, co-founded the State of Cyber annual security conference, and a lifetime member of FBI Citizens Academy. Possessing security certifications in CISSP, CISM, CRISC, Security+ and other certifications, Ashworth currently oversees First Bank’s information security, fraud, physical security and the network services departments. He can be contacted at marc.ashworth@fbol.com, marc@ashworthcorp.com, or on LinkedIn.
Patrick Grimsley, Chief Information Security Officer and Chief, Information Security Division, Command, Control, Communications and Cyber Systems Directorate, U. S. Transportation Command — Scott Air Force Base, Illinois.
Patrick Grimsley serves as the USTRANSCOM senior cybersecurity advisor on key cybersecurity issues. He represents the USTRANSCOM Commander and Chief Information Officer at senior level national, DoD, and industry committees and working groups. He also oversees cybersecurity assessments of Information Technology systems and software operated on the USTRANSCOM network. Grimsley is responsible for preparing and delivering strategic communications to senior military leaders on matters relating to cybersecurity and defensive cyber operations. He develops cyber operations goals and objectives, employs cyber best practices and innovates tools and practical solutions to enhance capabilities and operational effectiveness. He began his career with the United States Air Force in 1998. He worked in contracted Information Technology support for 4 years before transitioning to federal civilian service in 2010. He holds a Bachelor of Business Administration degree from McKendree University in Lebanon, Illinois. In 2015, he became certified as Information Technology Infrastructure Library (ITIL) V3 Expert in IT Service Management, Service Strategy, Service Operation, Service Design, Service Transition, Operational Support and Analysis, Managing Across the Lifecycle; in 2016 - Certified Information Security Manager, Information Systems Audit and Control Association. He received the Joint Meritorious Civilian Service Award, and in 2018 and 2019, the NSA Rowlett Organizational Award.
Gary Harbison, Chief Information Security Officer (CISO) — Bayer
As the Chief Information Security Officer (CISO) for Bayer, a leading global agriculture company, Gary Harbison leads the Information Security Office with global responsibility for cybersecurity, privacy and business continuity management. Harbison is also a member of the IT Leadership Team helping to define and drive the company's global IT strategy. Harbison has 19 years of overall IT experience, with 17 of those focused in the information security domain. He received his bachelor's degree in Business Administration from Webster University in St. Louis. He is also an Adjunct Professor in the Cybersecurity master's program at Washington University in St. Louis.
Jeff Horton, Senior Manager — Federal Reserve Bank in St. Louis
Jeff Horton's responsibilities include developing and executing on strategic roadmaps for applications that support and manage the finances for the United States and other Federal Government Agencies. His professional expertise includes over 17 years of experience assisting multiple Fortune 500 organizations on data privacy and cybersecurity initiatives. He is a versatile technical leader, strategist and security practitioner, with exceptional interpersonal, problem-solving and communications skills. A proven thought leader in building the security governance, security culture and security capabilities for some of the world's top organizations. Horton received his bachelor's and master's degree from Webster University in St. Louis, and is currently pursuing his Juris Doctorate Law Degree. He currently holds professional security certifications that include CCSP, CISSP, CISM, ENCE and CEH.
Dan Henke, Vice President, Information Security Officer — Mercy Healthcare
Dan Henke joined Mercy in March 2013 as Vice President, Information Security Officer. He is responsible for all areas of the Mercy Information Security Program and acts as the Chief Health Insurance Portability and Accountability (HIPAA) Security Compliance Officer. Prior to joining Mercy, Henke was the Chief Information Security Officer (CISO) with Maritz Holdings, Inc., in St. Louis where he led a strong security program attaining Payment Card Industry (PCI) certification and consistently passed demanding security audits and assessments of Fortune 500 clients. He came to Mercy with over 20 years of Information Technology leadership experience and a track record of contributing to business success through technology, building strong technical teams and developing internal and external stakeholder relationships. Dan was recently named one of the "32 Hospital and Health System CISO to Know in 2018" by Becker's Hospital Review. Henke holds a bachelor's degree and MBA from St. Louis University. In addition, he is a Permanent Deacon for the Archdiocese of St. Louis and assists the pastor at Holy Infant Church in Ballwin, Missouri.
Chris Niekamp, Director of Security Operations and Deputy Chief Information Security Officer — Meridian
Chris Niekamp has spent his career in Information Technology, working as part of various teams to deliver innovative solutions for customers. With a consistent focus on collaboration and partnering with others he has worked to evolve the overall security posture of BJC, while leading highly skill people who consistently look to improve processes and leverage industry-leading technology.
As the Director of Security Operations and Deputy Chief Information Security Officer, Niekamp is responsible for the Security Operations Center, Architecture, Access, Engineering, Security Project Portfolio and Strategy teams for BJC Healthcare, and acting on behalf of the BJC Healthcare CISO in certain delegated capacities. As the Director of Security Operations and Deputy CISO, he advocates for BJC’s total information security needs and is responsible for the development and delivery of the operational components of Information Security around incident response, technology roadmaps, support and maintenance of security technology, providing guidance to IT and other organizations within BJC, and the execution of projects key to the mission of Information Security at BJC. Niekamp holds a Bachelor of Science in Administrative Management from Missouri State University in Springfield, Missouri.
Pat Origliasso, Managing Director, Information Security and IT — Spire
As Managing Director of Information Security and IT for Spire, Pat Origliasso is responsible for leading the cybersecurity team in protecting Spire’s employees, assets and data, while managing cyber-related risks and defending against threats to the organization. He leads the implementation of federal regulatory requirements placed on critical pipeline operators while also providing leadership within the application development, infrastructure and support teams at Spire.
Origliasso joined Spire in 2019 after serving in various information security roles with Enterprise Holdings for nearly 20 years, ultimately responsible for the development of strategic roadmaps and operational performance for multiple teams in the Security Operations division.
He holds two bachelor’s degrees from Lindenwood University in Computer Science and Mathematics and a master’s degree from Lindenwood in Business Administration. In the community, he is an advisory board member for the Joshua Chamberlain Society and a member of the Webster University Cybersecurity Academic Advisory Council.
Shrikant Ramachandran, Global Vice President and Chief Information Officer — Mallinckrodt Pharmaceuticals
As Global Vice President and Chief Information Officer of Mallinckrodt Pharmaceuticals, Shrikant Ramachandran has global responsibility for the company's Information Technology. He assumes responsibility for partnering with the various divisions, regions, local markets and global support functions to deliver appropriate IT systems. Ramachandran also directs all IT activities, including applications, infrastructure and projects in North Americas, Europe and Asia, with the regional head of ITs reporting directly to him. He has extensive global IT experience from the pharmaceutical and medical device industries, which includes time living and working in Asia, Australasia, Europe and the U.S. Prior to joining Mallinckrodt, he was the Global VP and CIO for Synthes and was also responsible for the integration and merger of Depuy Synthes, a Johnson & Johnson family of companies. Previously, Ramachandran held the position of Consulting Director at Deloitte working with several Fortune 500 clients in North America, Europe and Asia. Prior to Deloitte, he worked with CapGemini, IBM and SGS Thomson Microelectronics. He holds a bachelor's degree in Mechanical Engineering from Bangalore University, India, a Masters of Engineering from Canterbury University, New Zealand, and an MBA from Smeal School of Business at Penn State University, U.S.
Cybersecurity Resources
Protecting computer systems and networks from information disclosure, theft of or damage, as well as disruption or misdirection of services is a major concern in today's environment.
Learn about Webster University's Privacy Governance and security awareness Program
Discover more resources that will help complement your academic progress in Cybersecurity.