Jess's Thoughts: Hi! I'm Jessica (Jess) Park, Business Development Manager for Cybersecurity at Loudoun Economic Development. Every month, we gather for the Loudoun County Cybersecurity Professionals Meetup, a cohort of the region's top cybersecurity professionals where we learn from one another, network, and discuss cybersecurity topics and trends. I'm really excited for November's speaker, Doug Miller, VP of Threat Management at Salesforce who will be discussing cyber threat actor attribution - when and why to use it. Doug brings a wealth of knowledge and experience that is invaluable to anyone in the cybersecurity field. His insights into threat management and proactive defense strategies are not only cutting-edge but also practical, offering attendees actionable steps to enhance their own security frameworks. Doug's ability to demystify complex cybersecurity challenges and present them in an engaging and understandable manner ensures that everyone, from seasoned professionals to newcomers, will leave the Meetup with a deeper understanding and new tools to tackle emerging threats.
Have questions about the cybersecurity industry in Loudoun County? Feel free to reach out!
Meet Your November Cyber Meeetup Speaker: Doug Miller
At Salesforce, Doug leads a team of experts in identifying and mitigating cybersecurity threats for Salesforce and their customer base. Throughout his career, Doug developed a deep understanding of the evolving threat landscape by building multiple security programs serving both internal defense capabilities and for commercially available services. He's successfully managed numerous high-stakes security incidents across the Defense Industrial base, Finance, Manufacturing and High-Tech.
Cyber In The News
Small Businesses Need Cybersecurity, too!
Small business owners are superheroes with a lot on their plate – customer satisfaction, managing finances and inventory, and keeping the overall business running smoothly. Cybersecurity may not be on your mind at all! In fact, small business owners may assume they will never be a target because they are "too small" for a hacker to bother with, when larger corporations with more valuable data are out there.