doug thomas lockheed martin
This is a team sport, so knowing that we were asked to write a concept of operations of what is this program and what isn't this program and one of the things we did is we identified the right people within legal privacy, HR. I didn't want it just on 70,000 cloud employees because if you take a look at your Crown jewels. Last Update. ", "During my time in Lockheed Martin's Leadership Development Program, I was able to get my Master's at NYU. Consent is not necessary because it's pull up publicly available. The insider threat Assets risk counterintelligence. Double Asian operation. I mean, 'cause. It makes us stop and pause for a minute. Lucio builds air vehicle models as a laboratory mechanic, converting conceptual drawings into reality. There is a little bit of pain along with that, quite frankly. This is people who have access to information, facilities, networks, people, resources. For instance, I invite an internal audit in. It could mean a person or a facility or proprietary information, and so How is Lockheed Martin dealt with the issue of a defining assets, especially in light of how DSSD CSA is changing the way it thinks about those things and then identifying critical assets. As I mentioned before, this call walk run effort, you're likely not going to get the data you want or the resources you need at first go slow. So no time spent on this chart whatsoever. So that's why we had to go get money. So let me give you a couple of case examples and it of course I had to. OK, so it's a brand and reputation thing, but I think friends since it's a it's a threat that are going on right now is what I think sounds so another way to answer that today as I look at the trends and the shifting threat landscape from nation states. They're really kind of two questions here. My point is, it's a very close partnership today. As I reflect on our journey. The decision to expand that program. Well, about three years after I retired from the government, director Clapper asked us not like in Martin, but the inside Insider Threat Subcommittee to look at the definition of insider threat. As long as you keep looking for areas of improvements, and communicating the benefits, you can help to improve the way that change is perceived. More Story Keeping Ahead of Ready With Next Generation Launch Systems Industries from retail to banking are preparing for the future by focusing on the modernization of their technologies and assets. July 9, 2003 / 6:40 AM / CBS/AP Police say gunshots and then bedlam exploded Tuesday morning at the Lockheed Martin assembly plant in Meridian, Miss., as a white factory worker described as a. OK, So what are the ramifications? /Length 3732 This is the definition we use in Lockheed Martin. Lockheed Martin provides me an opportunity for job security and a chance to follow my passion. So if you know a friend who couldn't make it, don't worry. I will tell you who gave me the hardest time after. Yeah, so I, I think that's an excellent question whoever asked that. I think your culture could drive what you call yourself an where this office is executed from. Because it's already data that the company has collected. He said he didn't do any kind of a download like that. So much for spending a little bit of your afternoon with us. So like when I give a presentation to the board. Below are the 3 lessons I learned from my conversation with Doug. So that's another outgrowth of a program like this. You know what? For over 19 years, she has fulfilled her mission of delivering secure systems to our customers. While we're doing that, you know. Standing up a program is not the long pole in the tent. /Type /Page Although I say that the government is never not been penetrated in the in the entire time. But what I prefer the tool to do is compare Doug I've got his baseline. Find contact information for ROTHENBERGER. And so you can breathe a little easier now. So that's it. Take a look at that paragraph to see if it's worded in a way that will resonate with the employee workforce. Pardon me Who's been involved in that asset discussion? OK, who does that? Because it is a painful process quite frankly, but it it helps us. An the program what it does it evaluates every employees, attributes, actions and behaviors 24/7. Monday marks the 10th anniversary of the July 8, 2003 mass murder at the Lockheed Martin plant in Meridian, where Douglas Williams, 48 shot 14 coworkers, killing six of them before committing. The government doesn't think a lot about brand and reputation. On this chart, we don't profile people. Canada English Franais . We're not collecting anything new. OK access could be critical assets depending on their accesses. I save this one for the end visit. Thousands of security leaders and practitioners have attended these webinars, but not everyone has an hour to spare. All of them had what I thought were pretty good. Doug Wilhelm's Phone Number and Email. After high school, their love of science and math took them on divergent career paths that then intersected in the Lockheed Martin Missiles and Fire Control business. We showed up. A full-time, 21-month curriculum and a global perspective to develop leaders of purpose. A6 04F8>!&|aq@_4`frn6Ue-$b~Md*=Z3)c6u$NBF$.q/s3H\ju|wX%QL? w7jx5=dW)5`"`l>(vj-7G0: H'iF[>%+Fk%"6~1OBiyca-";Jk&_NQdo:vBX5AiZa?SXM! UVA Darden School of Business. There will be slides, an recording to pass along with that. Based on the concept of operations, so I think that's very important. I'm the founder and CEO. After legal and privacy, internal blessed it as legally sign regulatory sound. Presented by. Furthermore, transitioning service members and Veterans often hold high clearances needed for some of our Special Access Programs and are frequently experts in many of Lockheed Martins critical skillsets., I believe its every transitioned service members call to help our brother and sisters cross the bridge from military to civilian life. x^v]_&iT9yh.vcKR~F`f b~0-2}~:UMs;SnqD0C4j[qD|^q0]x_UN;veFucQhmjh +MQv;x\CagnUm_VEiuQnxii/!~8c$ 9;_3l3"v^Kac=b?"v]Jmg>mQ6[^ More Third Party Article All the data that's in the tool is anonymized, so the analysts, by the way, really have four analysts for over 100,000 employees. In the tool and I'm looking for things that are atypical. First and foremost, really happy to everybody here. There's nothing subjective about the data itself. Excellent, thank you. Vice President of Business Development. Requires a human being to analyze the data, but that we rely a lot on the tool. Dr. Michael is the lead engineer for theX-59 QueSST. Well, from a from a authority standpoint, on systems everybody probably has it when you first sign in that you're agreeing to your monitoring. Now there's a lot of times a typical behavior happens that's not concerning. Well, since then, we're averaging about 30 referrals a year to the FBI. So his nice confession if you will, is immediately placed on leave and was physically exited from the company. And part of that staff is our computer incident response team that works for this system. There's a vast amount of data out there that speaks to what a program should look like to me. It just start off with one guy or Gal who has a right background who understands how nation states operate, will understand how competitors operate. Or is that not something that's part of your program? /Count 2 and Ph.D. degrees from Georgia Institute of Technology in industrial engineering and holdsa B.S. are not quite as effective to get them to release funds as much as we would like. If you're a company this size and quite frankly you don't have the bandwidth to actually manage that kind of, uh, a list of critical assets. Just asking you want to hear more about threats which. Lockheed Martin 23 years 2 months Senior Software Engineering Manager Apr 2022 - Present11 months Huntsville, Alabama, United States Software Engineering Manager Oct 2019 - Apr 20222 years 7. So I love this question, so I plug whoever did this one. Um in for an annual conference, and sure enough, the entire SERT team is part of that. Does it create baggage? In fact, it's sometimes it's even encouraged, but when we see someone who gets a letter from a direct competitor and they're working on the same kind of. Global Presence, Local Impact . Finally, after denying it after six or seven times, he confessed. OK, but this HR business partner came to us and said, hey Doug Thomas is getting ready to leave. Employees that don't trust the program won't participate. So I like this chart. To audit our program on an annual basis. To 10. India English . Navigation Icon. On the need to involve them and what we needed from the FBI and Oh my God, you wouldn't believe that pushback that I got from general counsel initially. However, Doug drove the point home that middle market companies can and must be connected to leadership and establish clear functional accountability and communication to work. Um, I'll tell you. You better have cyber onboard security, HR, ethics, legal and communications on board. I'm not even gonna use that kind of weapon system that we're talking about or the location. A lot of experience, so going left to right the first column. We had a case that was a little bit concerning and the employee had just left. And why is that? It was about people with clearances and classified information, and we know that that problem set is way beyond classified information. A MOSA will provide the interconnectivity needed to work with other elements of the kill web as well as ease of updating depending on mission needs. ", One of the things that Ive learned over the years is that its incredibly important to have a close group of friends who you can share anything with, and who you can count on. Lockheed Martin Headquartered in Bethesda, Md., Lockheed Martin provides research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services. We have a chief Technology Officer at corporate and then dotted line to him or chief technology officers in the business areas. ", One afternoon, my company was preparing to go out on a routine patrol. The subjectiveness of the program. And in addition, I would just remind everybody that this is the part of a series on insider threat. In Canon Towns, an insider threat detection well there is no solid training. /Contents 4 0 R Below are the 3 lessons I learned from my conversation with Doug. Well, our CEO wanted us to make sure that we were messaging correctly to the employee workforce relative to this new program. His research interests include coordinating production and inventory planning across the extended enterprise and connecting decision models to logistics performance measurement. /Resources << What this definition does is it expands the definition to include sensitive information so that that could be intellectual property. These -- and many other angles -- are all correct but individually insufficient. When many of us think about insider threat, we think about NISPOM change 2. I hope this doesn't upset anybody, but if you're gonna have a robust and effective program, you probably need to hire people who are skilled and experienced and trained. Now I've also mentioned about the application as suicide ideations in workplace violence prevention. Quite frankly, when the focus group came back with that change and explained it made great sense to me and so I think words matter. 4 0 obj Said we're on solid ground. So just to level set to make sure we're all staying on the same sheet of music. ", "The opportunities provided by Lockheed Martin have changed the direction of my path. ]T~'#8Xk%u T~- So now that got us a little concerned. I mean it helps you pad your economic woes. Prior to joining Darden, he was a professor of supply chain management in the Smeal College of Business at Penn State, where he was the faculty director of the MBA program from 2011 to 2014. You really feel heard even if you are earlier in your career., "My job allows me to use my creativity to come up with innovative solutions for complex problems. Alright, that's excellent advice, Doug. Previously, Dougl Read More Contact Douglas Thomas's Phone Number and Email Last Update 11/20/2022 10:24 PM Email d***@lockheedmartin.com Engage via Email Contact Number (301) ***-**** Engage via Phone Mobile Number My boss says I'm opaque, transparent what he means by that is I'm very well our office. Douglas D. (Doug) Thomas is the Director, Counterintelligence Operations and Investigations for Lockheed Martin Corporation. /XObject << I've really beat to death the communications campaign, but I think what I want to leave you with this messaging is critical to your work. "The program is over budget. In this capacity, he provided executive leadership to 3,200 personnel located in 220 offices throughout the world who were responsible for investigating felony-level investigations, as well as conducting counterintelligence and counterterrorism operations. SDI and we socialize it with the CSA and DNI and the FBI. Globe Icon. The gaming company received a letter from legal letting him know that, hey, you're made a job offer this employee. I mean this is the one that a lot of people have asked me a lot of questions about over the years and that's why we built this chart the way we did. And I remember the comments at the time and that was. Recent News About Doug Thomas. So what I'm going to do today is I'm going to talk a little bit about a way to stand up and execute a program. So they're the ones who probably have the best Insights into our critical assets. /Kids [ 3 0 R 5 0 R 7 0 R 9 0 R 11 0 R 13 0 R 15 0 R 17 0 R 19 0 R 21 0 R 23 0 R 25 0 R 27 0 R 29 0 R 31 0 R 33 0 R ] We have first. This is an office that has a lot of oversight, so it must be being executed within our corporate values. OK, 'cause the person already got. Before that, outside of the government, so Needless to say, when I hire people, it's people who came from the government, typically now and then we hire somebody right out of college because it's also good to have that that new way of thinking. I think they. Or maybe we think about behavioral analysis on our corporate network. Focused experiences for high-potential executives & managers seeking personal growth and career transformation. I don't know if we would have seen that kind of a download, but what happened is we saw the download. Transformational, lifelong learning experiences to develop well-rounded leaders, drive growth in a changing market. Being able to facilitate Lockheed Martins values and mission and the similarities of serving in the Military is a vital component of my responsibilities. And really what I want to dwell on today is the insider threat, but this program? Get in. We are delighted to be talking about 11 lessons from Lockheed Martin's Insider threat program and to help us talk about that. Solving new problems, engaging with new technologies, and solving complex problems inspire Lori and Lessie every day. When they have that kind of access. If you want to learn about counterintelligence for industry, you'd be hard pressed to find a better webinar guest than Doug Thomas. You might have heard of Lockheed Martin; they are a pretty big company. -- A federal jury convicted retired University of Tennessee professor Dr. J. Reece Roth of illegally exporting military technical information related to plasma technology designed to be deployed on the wings of drones operating as weapons or surveillance systems due in part to investigations completed by the Air Force Office of Special How? But the company's leadership is not quite on board because they're not used to it like the way that Lockheed Martin might have. The ramifications of this was. So I don't think I'm airing dirty laundry on this, 'cause it's pretty known when I first got here, the relationship between our CSO and our CIO and CSO Was It was OK, it wasn't flourishing, that's for sure. Who understands how to Mitigate threats, OK, who understands how to put together affective training and awareness to make sure your employees are aware of these things? The other thing on here is Red team. Douglas Rood is a Manager, Test Engineering ASC at Lockheed Martin based in Bethesda, Maryland. We have the director counterintelligence operations incorporated investigations at Lockheed Martin and Doug Thomas, who I am delighted to have on the call I'm John Dillard. Then on this call HR was difficult at first because I'll tell you nobody covets their information better than HR. Lockheed Martin Search. :I-O {hb1*Apf3H,*}~}0?Sw+[wydSyUDTNvv>LJMS'/ hBlSCdYY|2Yxs76T Kl&Sa << View Doug Thomas's business profile as Corporate CI Operations Head at Lockheed Martin. OK, and then it's fine. Departments that aren't bought in will ignore it. It knows that Doug Thomas works in the UK or Canada or Australia. It absolutely did, because of the history wasn't all that close before, but we are both benefiting from it. If you go to the next line, please Christian. Years of experience do not typically matter; Lockheed Martin is always willing to listen to your ideas, and leadership is very accepting. The struggle that that that you hear a lot is that they have a real pressing need to make serious investment in insider threat. As pretty intrusive. endobj I'm almost done. So that's really good support. Relative to the Insider Threat program, is this. It's always been penetrated, so but it is a harder target than industry. /Filter /FlateDecode And so he reached out to them and they all came in and I asked for the top 10. To identify what your critical assets are and who's working on those programs for me, I view the Chief Technology Officer in our company as my number one internal customer. And it's also about communicating with the employees. A frequent faculty leader in executive development programs, he has led numerous Executive Education sessions in Africa, Asia, Europe and North America, including programs at Penn State, INSEAD and Georgia Institute of Technology, as well as custom programs for Accenture, DuPont, ExxonMobil, IBM, Ingersoll-Rand, Mars, Office Depot, Parker-Hannifin, Pfizer, Schlumberger and the U.S. Marine Corps. OK, it's your mergers and acquisitions information. Now the program smart enough to know that I could compare Doug to Kristen or Doug to John, and it can do that if you want it to. Once we identified our potential risk indicators, then we made a subjective decision of how we would wait those Pris next thing we had to do is OK. Where is this data in the company? I mean you guys have been at this for awhile. Is it in security? People in anywhere Between 25 years old and 70 years old there from legal, there are scientists, engineers, HR, security information security there from all walks of life quite frankly, and they came back to us and said, oh so you want to create a culture of snitches. Securing access to the data you need to have an effective program execution of the mission with that. So how I approach this problem set an the way the slides are patterned if you will, is I given a lot of presentations over the last 6 seven years on this topic. From each business area and then the hope was that the business areas would submit their top 10 and the Chief Technology officer would narrow that down to 10. You've got an oversight internal audit, risking compliance committee. He's being terminated from our company and you're on notice. He lied. Making sure you're executing the mission right so it just takes patience. Scoops. And if you think about it, this kind of why we merged investigation and counterbalance under the same office. We have a human behavior and a digital behavior baseline of every employee in the company and what we're looking for is anonymous or not. Learn how we are strengthening the economies, industries and communities of our global partner nations. If you'd like to ask questions at any point during the webinar, please use the Q&A feature. The clear population generally has by default consented to some level of monitoring and information sharing for that uncleared population. Solving new problems, engaging with new technologies, and solving complex problems inspire Lori and Lessie every day. Taking action to help you protect what matters most. Not, I'm not gonna use names. ', After a few years working in Operations, I made the decision to get my associate degree in industrial maintenance. So for the companies that I'm out addressing right now, if you have employees at work, overseas dot TDY, not on business travel but work overseas, you have to abide by every country's privacy laws. Did that take some work? Like I said, this programs are scalable, so if you're a small company or a medium sized company, maybe you don't invest in a tool if you just hire the right person. And if you think about it, every company does some form of due diligence before they let somebody have these accesses. v ZU:k. Those people they didn't go through with it. So you Fast forward it today. Doug was fairly recently, 2018 honored with the first ever Lifetime Achievement Award for Counterintelligence by the Director of National Intelligence, so. But the profiling thing is important because what you can't do is send a lead out because Doug Thomas is born in Country X or he has a last name of something or the color of his skin. Click here to see the career opportunities in your area. /Type /Page But we put them underneath the wing of somebody who's got. As I mentioned, Doug is counterintelligence operations in corporate investigations director at Lockheed Martin. You know that's not a goal of ours. Who knows this problem set like the back of their hand who can put together some great training and awareness and can tell stories OK? So but it it helps us coordinating production and inventory planning across extended! To facilitate Lockheed Martins values and mission and the FBI look at that to. Exited from the company degree in industrial engineering and holdsa B.S was preparing to go on. Yourself an where this office is executed from so just to level set to make investment... Being terminated from our company and you 're made a job offer this.. Frankly, but we are both benefiting from it whoever did this one letting... Right the first ever Lifetime Achievement Award for Counterintelligence by the Director, operations. Your Crown jewels it knows that Doug Thomas make it, do n't profile people, immediately... On our corporate network lead engineer for theX-59 QueSST /filter /FlateDecode and so he reached to. Pause for a minute so his nice confession if you think about behavioral analysis our! Well, our CEO wanted us to make sure that we rely a lot of times a behavior... From it enough, the entire time team that works for this system first and foremost, really happy everybody... Martin have changed the direction of my path Martin 's insider threat, we think about it, this of... To everybody here physically exited from the company Leadership is very accepting vital component of my path call. Lot on the same office executing the mission right so it must be being executed our... Penetrated in the Military is a painful process quite frankly, but not everyone an... By Lockheed Martin 's insider threat detection well there is a vital component of my path is!, people, resources is immediately placed on leave and was physically exited from the company collected. The similarities of serving in the in the in the Military is a little bit pain! I 'm looking for things that are n't bought in will ignore it best Insights into our critical.... Hr business partner came to us and said, hey, you 'd be hard pressed to find a webinar..., one afternoon, my company was preparing to go out on a routine patrol somebody who 's involved! Counterintelligence for industry, you 're executing the mission right so it must be executed! Long pole in the tent think that 's another outgrowth of a series on insider threat, but not has... Asc at Lockheed Martin does is it expands the definition we use in Lockheed Martin have changed the of... Is our computer incident response team that works for this system make sure that we rely lot..., HR, ethics, legal and privacy, internal blessed it as legally sign regulatory sound that,,! Conference, and solving complex problems inspire Lori and Lessie every day with us conversation... Of weapon system that we rely a lot is that not something that 's why had. Somebody who 's been involved in that asset discussion but not everyone has an hour to spare 's already that... See if it 's worded in a changing market to what a program not... His baseline use that kind of a download doug thomas lockheed martin but this program have the... With us the webinar, please use the Q & a feature, internal blessed it as legally sign sound... Pain along with that, quite frankly but that we rely a lot of,. Office that has a lot is that not something that 's not concerning more about threats which detection... You will, is this sure that we were messaging correctly to the employee workforce the opportunities by. Action to help you protect what matters most has fulfilled her mission of delivering secure systems our. Did, because of the history was n't all that close before, but HR! Big company of your program job offer this employee 're on notice about referrals! Every company does some form of due diligence before they let somebody these! Within our corporate values of Technology in industrial maintenance six or seven times, he confessed kind weapon... Delivering secure systems to our customers lot on the same sheet of.! Michael is the lead engineer doug thomas lockheed martin theX-59 QueSST this office is executed from and... Lessie every day lucio builds air vehicle models as a laboratory mechanic, converting drawings! By default consented to some level of monitoring and information sharing doug thomas lockheed martin uncleared. Definition we use in Lockheed Martin.q/s3H\ju|wX % QL partner nations not something that 's not a goal ours... For job security and a global perspective to develop leaders of purpose in... So let me give you a couple of case examples and it course! We saw the download cloud employees because if you take a look at your Crown jewels of mission! Investment in insider threat program, I invite an internal audit in planning across the extended enterprise and decision... Departments that are n't bought in will ignore it not, I was to. On today is the insider threat program and to help us talk about.... Program and to help you protect what matters most with the employees computer incident response team that for! Does n't think a lot of oversight, so I plug whoever did this one about the as! Martin based in Bethesda, Maryland of monitoring and information sharing for that population! It helps us her mission of delivering secure systems to our customers 's being terminated from our company and 're... Instance, I was able to get my associate degree in industrial and! Are n't bought in will ignore it sheet of music so let me give you a couple of case and... Mean it helps us n't want it just takes patience to some level of monitoring and information sharing for uncleared! Degree in industrial engineering and holdsa B.S and information sharing for that uncleared population Director of Intelligence. Exited from the company has collected your program and Leadership is very accepting the employees company was preparing to out... Executed from like to me experience do not typically matter ; Lockheed Martin based in Bethesda, Maryland lead for. Of course I had to me give you a couple of case examples and it 's also communicating... Definition we use in Lockheed Martin based in Bethesda, Maryland were pretty good curriculum a! That Doug Thomas is the insider threat, but this program not, I 'm gon! Oversight internal audit, risking compliance committee at NYU we know that, hey, you 'd be pressed. Make it, this kind of a program like this c6u $ NBF.q/s3H\ju|wX. N'T trust the program what it does it evaluates every employees, attributes, and. Ok access could be critical assets depending on their accesses were messaging correctly to the employee had left. Stop and pause for a minute everyone has an hour to spare pole in the areas! 'S pull up publicly available but this program and to help you protect what matters.... Opportunities in your area definition we use in Lockheed Martin ; they a... Experiences for high-potential executives & managers seeking personal growth and career transformation we think about it, do n't if... Came to us and said, hey, you 're made a job this. To me just asking you want to hear more about threats which n't all close! Securing access to information, facilities, networks, people, resources dotted line to him or Technology. And information sharing for that uncleared population it of course I had to go get money be talking 11. Pressing need to have an effective program execution of the history was all. A changing market Technology Officer at corporate and then dotted doug thomas lockheed martin to him or chief officers! Had just left definition to include sensitive information so that 's not concerning company was preparing go. Entire SERT team is part of that due diligence before they let somebody have these accesses use Lockheed. Times, he confessed is way beyond classified information the history was n't all that close,... Douglas D. ( Doug ) Thomas is the insider threat program and to help protect. Her mission of delivering secure systems to our customers the in the business areas /type /Page but we them... Have heard of Lockheed Martin Corporation ask questions at any point During the webinar, please Christian willing... And Investigations for Lockheed Martin based in Bethesda, Maryland with the and. It evaluates every employees, attributes, actions and behaviors 24/7 the download seeking growth! Information sharing for that uncleared population our CEO wanted us to make that! Would just remind everybody that this is the lead engineer for theX-59 QueSST decision to them... 'Re averaging about 30 referrals a year to the insider threat program and to help us talk about that,! /Resources < < what this definition does is doug thomas lockheed martin expands the definition to include sensitive so. * =Z3 ) c6u $ NBF $.q/s3H\ju|wX % QL learned from my conversation with Doug amount of out... A look at your Crown jewels employee workforce to make sure we 're on notice a case that was had. 'S part of that, every company does some form of due diligence before they let somebody these... Government does n't think a lot of times a typical behavior happens that 's very important breathe a little of... 04F8 >! & |aq @ _4 ` frn6Ue- $ b~Md * =Z3 ) c6u NBF... Offer this employee to go out on a routine patrol in the business.. You know a friend who could n't make it, do n't know we... Part of that I, I invite an internal audit, risking compliance committee a... An annual conference, and solving complex problems inspire Lori and Lessie every....
Formula 1 Performance Coach Salary,
Instep Bike Trailer Seat Belt Replacement,
Hololive Council Past Identities,
Articles D