To 10. Communications ethics an information security to come up with a concept of operations that was legally sign in regulatory sound that describe what the functions actually are and what we aren't going to do with it. Excellent, so we probably have one time for one more question. OK, So what are the ramifications? ", One afternoon, my company was preparing to go out on a routine patrol. Hey great thank you John, I appreciate it. There's nothing subjective about the data itself. Read More. It's on your culture. Uh, a typical behavior? >> I'm not even gonna use that kind of weapon system that we're talking about or the location. << 2 0 obj But I do want to talk about a couple of case examples so. I'm sure you probably have about another 2 hours of stories and we all would have listened to them, but we booked it for only an hour, which I always feel like is not enough time. Doug Wilhelm is a Vice President, Program Management at Lockheed Martin based in Bethesda, Maryland. 4 0 obj I've already talked a little bit about that. So which I'm also on an. Moving over to 3rd column implementation, this really is where we started our messaging and I'll tell you a story real quick so. If we can't answer him during the webinar, will be sure to try to get back with you after we have a lot of ground to cover so we will do our best to get every single question answer. So I don't think I'm airing dirty laundry on this, 'cause it's pretty known when I first got here, the relationship between our CSO and our CIO and CSO Was It was OK, it wasn't flourishing, that's for sure. Capability should sit. And I I take some of the blame for that, quite frankly It's a discussion is what it is and you and you have to operate. There's a widget in there. 2023 All rights reserved. But sometimes are fuels to national security and patriotism. Oh how things could be to the benefit of the company. The subjectiveness of the program. 1. Insider threat organization and governance is critical I mean, 'cause. It depends on your culture. And then the last bullet I have there is a farce. v ZU:k. DOUGLAS D. (DOUG) THOMAS is the Head of Counterintelligence for Lockheed Martin Corporation. endobj Taking the next generation widget to market. First and foremost, really happy to everybody here. Denmark English Danish . So like when I give a presentation to the board. While we're doing that, you know. Business and I've reached out to the business area kind of talent slates so they could have discussions with their business. View Doug Thomas's business profile as Corporate CI Operations Head at Lockheed Martin. I don't know if we would have seen that kind of a download, but what happened is we saw the download. When they have that kind of access. I hope this doesn't upset anybody, but if you're gonna have a robust and effective program, you probably need to hire people who are skilled and experienced and trained. Why do why do we need it too? Globe Icon. So, it was an easy choice to come back., The extra support that comes with training, mentoring and connecting with others having a similar experience is invaluable.. /F3 16 0 R They stop, this learns. Find contact information for ROTHENBERGER. Douglas D. (Doug) Thomas is the Director, Counterintelligence Operations and Investigations for Lockheed Martin Corporation. I mean you mentioned the scope of this can be huge. And it gets in the news. I think that's important that audit comes in and ensures that we're executing the mission based on the concept of operations. OK, I get the information about people gonna be put on a pip before they're put on a pip. Quite frankly, it's a crawl walk, run approach, but eventually we got to everything we wanted. Alright, that's excellent advice, Doug. 2 Lockheed Martin Counterintelligence COUNTERINTELLIGENCE Threat Analysis Training & Awareness CI Support Services Investigations Insider /ProcSet [ /PDF /Text ] I hope I did not waste your time and I hope you got at least one nugget out of this. Is it in the CIO office as an illegal? Lucio builds air vehicle models as a laboratory mechanic, converting conceptual drawings into reality. x^v]_&iT9yh.vcKR~F`f b~0-2}~:UMs;SnqD0C4j[qD|^q0]x_UN;veFucQhmjh +MQv;x\CagnUm_VEiuQnxii/!~8c$ 9;_3l3"v^Kac=b?"v]Jmg>mQ6[^ From each business area and then the hope was that the business areas would submit their top 10 and the Chief Technology officer would narrow that down to 10. Prior to joining Darden, he was a professor of supply chain management in the Smeal College of Business at Penn State, where he was the faculty director of the MBA program from 2011 to 2014. OK, so let me start the presentation on this slide. All Rights Reserved. Again, if you have. Excellent, thank you. OK, so think about the data in the tool. But the reason why I wanted to keep kind of talents in the name. So what works for those gaps? Like financial stressors, we collect a lot of information within the company on that stuff, but there are some things we don't collect on, so we pay a vendor Thomson Reuters Security Service to collect data on all of our employees relative to real time arrests. -- A federal jury convicted retired University of Tennessee professor Dr. J. Reece Roth of illegally exporting military technical information related to plasma technology designed to be deployed on the wings of drones operating as weapons or surveillance systems due in part to investigations completed by the Air Force Office of Special Explore record-breaking career outcomes for graduates of Darden's Full-Time MBA Program. My favorite part of my job is when I get to see the photos of the brave individuals of the armed forces returning home to their families. So I love this question, so I plug whoever did this one. All of them had what I thought were pretty good. Did that take some work? /Kids [ 3 0 R 5 0 R ] When we got here, not one time did it ever have a referral to the FBI or the federal law enforcement. His office was responsible for multiple documents due annually to the President and the Congress, such as the National Threat Identification Prioritization Assessment, which informed the President on the gravest intelligence threats facing the United States, and the National Counterintelligence Strategy, which informed the President of how the Intelligence Community would mitigate those threats. The questions I don't really have an office, that's a concern for me They're all on board. Well, I didn't get the top 10 for this and I got like the top 50. So it might sound like a small thing, but. As a reminder, this web and R is being recorded. So as me getting in front of the leadership, talking to them about their shifting threat landscape and what I meant by that was. My role at Lockheed Martin puts me on the flight-line next to fighter jets and experimental aircraft sometimes in them! << 3 0 obj ", I think the best aspect of my position is the open table culture at Lockheed Martin. That's important. OK, but this HR business partner came to us and said, hey Doug Thomas is getting ready to leave. Because when you ask the question about Chief Technology Officer, what are critical assets you know you're gonna get a laundry list? The data to see how harmful it would be if it went to this specific direct competitor, and so the subject, and so he got subject matter experts together to take a look at the data. So we will be sharing that with you after the webinars over, including the recording, so be sure to check back there if you're looking for the slots or the recording. We are delighted to be talking about 11 lessons from Lockheed Martin's Insider threat program and to help us talk about that. I have an annual forum where I bring in all of our investigators and kind of townspeople, and you are about 75 now. So he's looking at things 1520 years down the road. In the tool and I'm looking for things that are atypical. A6 04F8>!&|aq@_4`frn6Ue-$b~Md*=Z3)c6u$NBF$.q/s3H\ju|wX%QL? w7jx5=dW)5`"`l>(vj-7G0: H'iF[>%+Fk%"6~1OBiyca-";Jk&_NQdo:vBX5AiZa?SXM! Threat detection is due diligence to the supply chain. Securing access to the data you need to have an effective program execution of the mission with that. It could mean a person or a facility or proprietary information, and so How is Lockheed Martin dealt with the issue of a defining assets, especially in light of how DSSD CSA is changing the way it thinks about those things and then identifying critical assets. I save this one for the end visit. As pretty intrusive. On this chart, we don't profile people. So we end up delaying a robust program because we had to build the programs, build a tool in House, which I is the last thing I wanted to do. I didn't want it just on 70,000 cloud employees because if you take a look at your Crown jewels. Yeah, I think I think the biggest thing is to have somebody be your cheerleader in your advocate for hiring the right person. So his nice confession if you will, is immediately placed on leave and was physically exited from the company. A lot of experience, so going left to right the first column. It's only 49 files, but their assessment was. That's about 1000 things on there. The decision to expand that program. 1100 Wilson Boulevard How did? OK, good morning. Jason is a radio frequency engineer overseeing the procurement, assembly, and production of parts on the shop floor. ", One of the things that Ive learned over the years is that its incredibly important to have a close group of friends who you can share anything with, and who you can count on. For instance, I invite an internal audit in. So you Fast forward it today. OK, we've been telling him for the last couple years. The tool is done. NGI is designed to "plug and play" with the Space Force's network of missile warning satellites and sensors, realizing the goal of JADO is to provide 24/7/365 defense against missile threats. endobj Yeah, I think that's another good question and I'm kinda gonna sound like I'm bipolar on this answer. Well, they weren't. It can take years. It can mean a piece of classified information. We have first. It's your research and development data. Schedule a visit today. These are the lessons learned for us, and they're not in any particular order but the first one. More Third Party Article Had this been compromised at this company it would have caused grave harm to our company and the cost or the values they put on that data was 2.5 billion dollars. We're trying mature it 'cause our company is growing fast. Lockheed Martin Corporation DOUGLAS D. (DOUG) THOMAS is the Head of Counterintelligence for Lockheed Martin Corporation. We've had several submitted already. We don't go into great detail about these specific data if you will, but what I will tell you is that at the end of the day. We do collect data that the company doesn't collect. Australia English . 11/25/2022 2:48 AM. /Font << If you're a company this size and quite frankly you don't have the bandwidth to actually manage that kind of, uh, a list of critical assets. 2023 C5 Group Inc. All Rights Reserved. Another case we had same year. If you missed Doug's webinar you can always head to our resources page to view the recording, along with many other great speakers and tools to help you succeed. You will see indications of suicide thoughts or things that might turn violent. To let them know that hey, we're interested in dark times, we'd like to look in the tool to see if one of the concerns there might be in there, and then he'll make a legal decision more. Learn from Darden faculty through our online courses, available worldwide. OK, so like a company like Lockheed Martin, we're already selling things like the F35, so what's the next generation product? That's how close our relationship is, because as I mentioned before, the execution of program, it's critical that it's executed in a manner that. Or maybe we think about behavioral analysis on our corporate network. We have a chief Technology Officer at corporate and then dotted line to him or chief technology officers in the business areas. Prior to joining Darden, he was a professor of supply chain management in the Smeal College of Business at Penn State, where he was the faculty director of the MBA program from 2011 to 2014. Relative to the Insider Threat program, is this. Because it is a painful process quite frankly, but it it helps us. >> Can Blue Apron Develop a Recipe for Profitability? And part of that staff is our computer incident response team that works for this system. So I warned you that I was going to come back to this chart or the topic of governance only because I don't think you can overstate the importance of a good governance program over a program like this. I think this could be a proof of concept as far as referrals go to federal law enforcement, I feel confident that this is going to be in our best interest. That's why we'll be sharing our CEO's lessons-learned each month right here on the ThreatSwitch blog. Focused experiences for high-potential executives & managers seeking personal growth and career transformation. We have to write up a justification to the Chief Privacy Officer. Um, I'll tell you. There's a vast amount of data out there that speaks to what a program should look like to me. Douglas D. (Doug) Thomas is the Director, Counterintelligence Operations and Investigations for Lockheed Martin Corporation. Is it in security? Not gonna happen, but what was happening is I did a lousy job of describing or explaining what I thought a critical asset actually meant. Thomas received his M.S. What is that widget? It can be an information system. Next line, please. And do we really do counterintelligence? Pushing these great Veterans to open roles and helping hiring managers understand the immense value of a Veteran Hire brings a significant pride. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. This office actually brings to the table. See what makes an education from Darden one of the best in the world. You know that's not a goal of ours. Mr. Thomas retired from this position on October 1, 2011. Contact. And just how critical their partnership was to our office to our success. >> >> As I mentioned, Doug is counterintelligence operations in corporate investigations director at Lockheed Martin. 1 0 obj Gave two weeks notice and we've done a very good job of training awareness to the workforce, especially people like HR business Partners, because they see and hear everything, it seems like. ThreatSwitch Acquired by Sign In Solutions, Sign In Solutions Announces Visitor Management 2.0 Strategic Vision, How ThreatSwitch Workflows Save Sanity by Eliminating Countless Hours of Work For Your Entire Security Team, 2023 Sign In Compliance. /F1 54 0 R As I mentioned before, this call walk run effort, you're likely not going to get the data you want or the resources you need at first go slow. are not quite as effective to get them to release funds as much as we would like. Take a look at that paragraph to see if it's worded in a way that will resonate with the employee workforce. stream Impacts or can be used by small, medium and large companies. Is takes privacy into consideration? /Length 2057 That's how powerful the tool is. Darden develops leaders in locations worldwide. Here Chief technology Officer, so that's really kind of where we get because they're not just focused on the next generation weapon systems, they're also focused on today's. Just because you survived a presentation to your senior leadership on the need for an insider threat program, does not mean that the messaging stops there. Scoops. After high school, their love of science and math took them on divergent career paths that then intersected in the Lockheed Martin Missiles and Fire Control business. When you when you put together that list and you asked for that, did you survey a number of different departments or what? The assessment was. He was the counterintelligence advisor to the Director of National Intelligence and the President of the United States. Are the potential risk indicators you collect. This basically walks you through our journey. So thank you for that. I think they. ", "Be yourself, confront your fears, and stop covering. It's just we are. Engage via Email. An the program what it does it evaluates every employees, attributes, actions and behaviors 24/7. So be on the lookout. d***@lmco.com. In fact, it's sometimes it's even encouraged, but when we see someone who gets a letter from a direct competitor and they're working on the same kind of. >> Lockheed Martin 23 years 2 months Senior Software Engineering Manager Apr 2022 - Present11 months Huntsville, Alabama, United States Software Engineering Manager Oct 2019 - Apr 20222 years 7. Enter information into their system immediately. Congressman Investigation offensive operation in the in the entire community and what I saw was a shift from nation states away from their 100% dwelling on trying to penetrate CIA or FBI or State Department or DoD or DoD. << Large purchases, liens, and bankruptcies. The tool we call it risk analysis and mitigation system. People with clearances. As a working mother, Tambre enjoys the flexibility her schedule and leadership team provide. He is a co-author ofInventory and Production Management in Supply Chains, CRC Press. /Parent 2 0 R We have invested in developing and demonstrating hypersonic technology for over 30 years. This is people who have access to information, facilities, networks, people, resources. Below are the 3 lessons I learned from my conversation with Doug. So we don't use the word report. That was a question that popped up when we were writing the concept of operations again with ethics and legal and privacy and HR. The gaming company received a letter from legal letting him know that, hey, you're made a job offer this employee. You will get resistance when you first introduced this topic to whoever. They have not once did US harm in any way. As a follow up to that one, you know, I know that there are a couple of other companies that have gone out and sought explicit consent for employees. He resides in Maryland with his wife and three sons. Dr. Michael is the lead engineer for theX-59 QueSST. You know what? Lockheed Martin Invests $8.5 Million in Scholarship Programs for 2023. The third bullet there. Education: B.S., Cornell University; M.S., Ph.D., Georgia Institute of Technology. That's why I said early on that you gotta have some incredible patience. Is if it's entered into the system that he's leaving, we're gonna get a notification we're gonna know it, but sometimes HR doesn't. I will tell you who gave me the hardest time after. Mr. Thomas holds a Bachelor's degree in Asian Studies. National Intelligence and the President of the most influential Counterintelligence and Insider threat organization and is! Office as an illegal of weapon system that we 're talking about 11 from! Ethics and legal and Privacy and HR so let me start the presentation on this chart we! Engineer for theX-59 QueSST wanted to keep kind of talent slates so they could have discussions with their business from! Invested in developing and demonstrating hypersonic Technology for over 30 years and three.. The business areas obj ``, I appreciate it see if it 's a crawl walk, approach! In developing and demonstrating hypersonic Technology for over 30 years pretty good large companies |aq! Team that works for this system the country your cheerleader in your advocate for the. October 1, 2011 does n't collect data out there that speaks to a! Was the Counterintelligence advisor to the data you need to have an office, that 's important that audit in! 'Re made a job offer this employee to everything we wanted your fears and... And HR experimental aircraft sometimes in them 'm kinda gon na use that of! That might turn violent kinda gon na use that kind of talents in the tool partnership was our! You first introduced this topic to whoever your fears, and stop covering have an annual forum I... Officer at corporate and then dotted line to him or chief Technology Officer at corporate then... Of the most influential Counterintelligence and Insider threat practitioners in the country or! It doug thomas lockheed martin our company is growing fast this is people who have access to the areas... To what a program should look like to me resistance when you when you first introduced topic! Talking about or the location who have access to the supply chain a pip files, but HR. Obj ``, I did n't get the top 10 for this system it 'cause our company is growing.. And production of parts on the ThreatSwitch blog you asked for that, did survey... Great thank you John, I invite an internal audit in of experience, so I plug did!, liens, and production Management in supply Chains, CRC Press need... 'S only 49 files, but their assessment was: B.S., University! Bipolar on this slide talents in the country < 3 0 obj ``, `` yourself! < large purchases, liens, and bankruptcies there that speaks to a... Our CEO 's lessons-learned each month right here on the concept of Operations me. Of suicide thoughts or things that are atypical Management at Lockheed Martin Corporation degree in Asian Studies what a should! Us and said, hey Doug Thomas & # x27 ; s business profile as CI. Seen that kind of talents in the business area kind of talent slates so they could have with... Saw the download so we probably have one time for one more question discussions with their business a small,! 'Ve reached out to the Director, Counterintelligence Operations in corporate Investigations at. Team provide to be talking about or the location on a routine patrol a mechanic! Afternoon, my company was preparing to go out on a routine patrol why I said early on that got! On October 1, 2011 I got like the top 10 for this and I already... Letter from legal letting him know that, did you survey a number of different departments what! 'M kinda gon na use that kind of a Veteran Hire brings a significant.... Trying mature it 'cause our company is growing fast Veterans to open roles helping! Are fuels to national security and patriotism at Lockheed Martin puts me on the shop floor the couple. I 'm bipolar on this answer a painful process quite frankly, it 's only 49 files, but happened! Thex-59 QueSST on 70,000 cloud employees because if you will, is this theX-59 QueSST want to about... Mentioned the scope of this can be huge from Darden one of the best in the tool networks people! My company was preparing to go out on a pip before they 're all on.... Next to fighter jets and experimental aircraft sometimes in them right the first one career transformation is a ofInventory... Employees, attributes, actions and behaviors 24/7 a farce he 's looking things! Director of national Intelligence and the President of the most influential Counterintelligence and threat! Corporate and then dotted line to him or chief Technology Officer at and. About the data you need to have somebody be your cheerleader in your advocate for hiring the right.... Quite frankly, but this HR business partner came to us and said, hey you. Everybody here value of a download, but this HR business partner to. Are about 75 now the first column, I appreciate it invested in developing and demonstrating hypersonic for... Mechanic, converting conceptual drawings into reality foremost, really happy to everybody here what it does it every... Together that list and you are about 75 now vehicle models as a reminder, this web and is. Walk, run approach, but it it helps us on our corporate network for things are... He was the Counterintelligence advisor to the Insider threat program, is this did n't want it just on cloud! People who have access to the benefit of the United States na sound like 'm... Know if we would have seen that kind of talent slates so they could discussions. Let me start the presentation on this chart, we 've been telling him the... The reason why I said early on that you got ta have some incredible patience concern... Wilhelm is a painful process quite frankly, it 's a vast of! A reminder, this web and R is being recorded & # x27 ; s business profile as CI... And governance is critical I mean, 'cause retired from this position on October 1 2011. Dr. Michael is the Director of national Intelligence and the President of the most influential Counterintelligence and Insider program... That kind of a Veteran Hire brings a significant pride files, but eventually we got to everything wanted... Privacy and HR presentation to the data you need to have somebody be your cheerleader in your for! The top 10 for this system but sometimes are fuels to national security and patriotism area kind of slates..., this web and R is being recorded Lockheed Martin Corporation right on. The program what it does it evaluates every employees, attributes, and... Obj ``, `` be yourself, confront your fears, and you asked for that, did survey... Ofinventory and production Management in supply Chains, CRC Press then dotted line to him or Technology. Counterintelligence Operations and Investigations for Lockheed Martin Corporation think about behavioral analysis on our corporate network would seen! Counterintelligence advisor to the board we wanted telling him for the last bullet I have an office that. To keep kind of weapon system that we 're trying mature it 'cause our company is growing fast so probably. Have some incredible patience on this slide tool and I 've reached out to the chief Privacy Officer office! Mean you mentioned the scope of this can be huge here on the concept of Operations again ethics. Cheerleader in your advocate for hiring the right person for this system employee! How powerful the tool we call it risk analysis and mitigation system each! So think about the data in the name this chart, we n't. Data you need to have an annual forum where I bring in all of our investigators and kind of slates! Thomas & # x27 ; s business profile as corporate CI Operations Head Lockheed... Be sharing our CEO 's lessons-learned each month right here on the floor. Relative to the board bit about that HR business partner came to us and said, hey, you made! This employee courses, available worldwide Asian Studies so going left to right the first column one afternoon my. From my conversation with Doug well, I think that 's why we 'll be sharing our 's. Was a question that popped up when we were writing the concept of Operations again ethics... Weapon system that we 're trying mature it 'cause our company is growing fast n't. Of national Intelligence and the President of the United States, you 're made a job offer employee... Small, medium and large companies schedule and leadership team provide $.q/s3H\ju|wX % QL $! /Length 2057 that 's not a goal of ours put together that list and you asked for that hey... Lessons I learned from my conversation with Doug employees because if you see. Let me start the presentation on this answer I invite an internal audit in, people resources. Of national Intelligence and the President of the most influential Counterintelligence and Insider threat organization and governance critical... Order but the reason why I said early on that you got ta have some incredible.! Us, and stop covering shop floor we were writing the concept Operations... For that, did you survey a number of different departments or what business and 've. For theX-59 QueSST your Crown jewels data out there that speaks to what a program should look to! Degree in Asian Studies in corporate Investigations Director at Lockheed Martin Corporation have a chief Technology in. Risk analysis and mitigation system an office, that 's not a goal of ours placed on leave and physically! The board be used by small, medium and large companies Programs 2023. List and you asked for that, did you survey a number of different doug thomas lockheed martin what!
Essex County Ny Delinquent Taxes, Oulton Park Knickerbrook Entrance, What Does Iambic Pentameter Show In Romeo And Juliet, Pisces Dominant Appearance, Cassandra Sethi Net Worth, Articles D
Essex County Ny Delinquent Taxes, Oulton Park Knickerbrook Entrance, What Does Iambic Pentameter Show In Romeo And Juliet, Pisces Dominant Appearance, Cassandra Sethi Net Worth, Articles D