To identify what your critical assets are and who's working on those programs for me, I view the Chief Technology Officer in our company as my number one internal customer. So like I said, we knew we had to build our own tool. There is a little bit of pain along with that, quite frankly. Receive exclusive discounts, offers and agenda updates directly to your inbox. endobj In this capacity, he leads a staff that is responsible for providing advice and guidance relative to investigations, counterintelligence, counterterrorism and workplace violence matters impacting the /XObject << Click here to see the career opportunities in your area. So today the answer. OK, so let me start the presentation on this slide. OK, I get the information about people gonna be put on a pip before they're put on a pip. Australia English . Excellent, yeah, we have several questions around. Who understands how to Mitigate threats, OK, who understands how to put together affective training and awareness to make sure your employees are aware of these things? So you have to have a discussion with them of what's really critical. And the other thing that didn't resonate with me that 35 years I spent in the government 'cause I didn't really think about it much is brand and reputation. We're talking about a small set of data files. You really do need to invest in time and work an efforts with developing a relationship with their Chief Technology Officer. I'm not even gonna use that kind of weapon system that we're talking about or the location. Doug received a Bachelor of Science degree de gree from Grove City College. Well, our CEO wanted us to make sure that we were messaging correctly to the employee workforce relative to this new program. So you're not gonna have an office large enough to have a robust and effective program if you don't leverage technology. Years of experience do not typically matter; Lockheed Martin is always willing to listen to your ideas, and leadership is very accepting. Again, if you have. You might have heard of Lockheed Martin; they are a pretty big company. A 2022 Vision: 5 Lessons From 2021 Coming Into Focus. /Type /Catalog Yeah excellent yeah number of questions about departments and working with other departments and a lot of large programs. That includes: Throughout Doug's talk, he came back to a critical, often-missed perspective: without transparency and trust, insider threat programs won't work. Everybody can respond to the pole and then we'll jump right in, but. Does it create baggage? It kind of puts a nice book in on your talk and that is eating the elephant. That's kind of like sacred ground. << Taking the next generation widget to market. A lot of it has to do with stressors and people becoming disgruntled and things like that. So we did some pure benchmarking because I knew we wanted to stand up a program and there at that time there were 13 companies that advertise that they had insider threat detection tools. All the data in the tool is objective data. So that's why we had to go get money. Prior to that, he was the principal deputy Director of Counterintelligence, spent 25 years with the Air Force as a special agent. Prior to returning to graduate school, he worked for C-Way Systems, a software company specializing in manufacturing scheduling. And that name recognition goes a long way and I know it sounds silly, but it is a ring knocking club so that helps as far as. 1 0 obj 3 0 obj So if you know a friend who couldn't make it, don't worry. When we got here, not one time did it ever have a referral to the FBI or the federal law enforcement. Beg for money if you will to build a tool. I have an annual forum where I bring in all of our investigators and kind of townspeople, and you are about 75 now. It's important to collect the right metrics and be able to tell a story that makes him want to hear more. The data to see how harmful it would be if it went to this specific direct competitor, and so the subject, and so he got subject matter experts together to take a look at the data. Doug Thomas is theHenry E. McWane Professor of Business Administration at the Darden School of Business. I don't know if we would have seen that kind of a download, but what happened is we saw the download. So we don't use the word report. We just never used it in his former fashion before. endobj x^X$W Uh, selling the leadership so that that was interesting, because when I came to Lockheed Martin, they didn't have a kind of intense program or insider threat detection program. In partnership with the Top Gun team, Becky was responsible for building the Darkstar vehicle, incluing a forebody model with a functional cockpit for an iconic actor. But the collaborative effort with the business area leads and the Computer Incident Response team. So my staff and I went to visit those 13 companies and what we found was none of them had what we needed. >> A week doesn't go by that you don't see in the press a new arrest or conviction of someone involved in espionage, theft of intellectual property. For sometime. Misgovernance this to me is a big deal and I'm going to bring it up again later because I think it's I think it's. What is a very large and expansive challenge? They are an insider. And companies OK if you want to get personal about it. Doug Thomas Head of Corporate CI Operations at Lockheed Martin La Plata, Maryland, United States 11 followers 3 connections Join to connect Lockheed Martin Experience Head of Corporate CI. The ramifications of this was. It can be an information system. Gave two weeks notice and we've done a very good job of training awareness to the workforce, especially people like HR business Partners, because they see and hear everything, it seems like. He established and shared. It's your research and development data. He lied about the job offer. The Board of Directors is briefed every year. It makes us stop and pause for a minute. And that's a very hard thing to do. Like financial stressors, we collect a lot of information within the company on that stuff, but there are some things we don't collect on, so we pay a vendor Thomson Reuters Security Service to collect data on all of our employees relative to real time arrests. And then the last bullet I have there is a farce. Previous to his role within the Office of the Director of National Intelligence, Mr. Thomas was a Special Agent for 25 years with the Air Force Office of Special Investigations. He tried to download a bunch of data a lot more than 49 files. Veterans are usually familiar with our products and can provide vital insights concerning how to make our products better and safer for current service members. A Lockheed Martin official has said the White House is working to establish a new agency that would take responsibility for the federal security clearance system from the Office of . And I I take some of the blame for that, quite frankly It's a discussion is what it is and you and you have to operate. A pretty robust program, and you're collecting the right kind of data and it's being analyzed correctly. Well, this is all about access. Double Asian operation. Had this been compromised at this company it would have caused grave harm to our company and the cost or the values they put on that data was 2.5 billion dollars. One is what authority do companies have to conduct training, monitoring, and the other half is? We had a a subject who received a complete competitor recruitment letter with a job offer. But I do want to talk about a couple of case examples so. There's nothing subjective about the data itself. Or if it will irritate them in any way whatsoever, and lo and behold, that was a great. Recent News About Doug Thomas. So it may not be very expensive is what I'm saying and you started off with a proof of concept, but what sold the company I think is when you start talking about the trends throughout the United States, the statistics relative to the loss of intellectual property and RND data and how much it's costing the United States economy. Even if you have that authority, you know you get into this should question and it was curious what your thoughts are on that challenge. So I'm going to let your imagination run wild on the kind of data we collect and analyze. It can mean a piece of classified information. The tool is done. corporate America is a soft target compared to the federal government. We have a common connection. /MediaBox [0 0 792 612] The tool we call it risk analysis and mitigation system. I mean you mentioned the scope of this can be huge. Below are the 3 lessons I learned from my conversation with Doug. That might be the next widget that generates revenue and jobs and helps our brand and reputation. I mean this is the one that a lot of people have asked me a lot of questions about over the years and that's why we built this chart the way we did. And this person Was on our radar already. You know that's just So what piece? Next month we'll be doing one that's a panel discussion, and we'll be sharing information on that shortly. Lessons learned is the breakdown of business as usual mindset. So you Fast forward it today. Enhanced plans and mitigation strategies on 300 programs. When they have that kind of access. She kept the model structurally sound and worthy of its pilot throughout filming. Germany English Deutsch . Once you figured out what the assets are. Point towards disgruntlement or stressors. The struggle that that that you hear a lot is that they have a real pressing need to make serious investment in insider threat. I'm thankful to work for a company that puts those individuals first, and we never forget who we are working for as they serve our country.". As a follow up to that one, you know, I know that there are a couple of other companies that have gone out and sought explicit consent for employees. Well, we briefed them one time on on the fact that we are standing up a program like this and I guess it sounded sexy enough. Now you can have the best data loss prevention tool in the world. Doug is the Director of Counterintelligence and Corporate Investigations for Lockheed Martin. As a working mother, Tambre enjoys the flexibility her schedule and leadership team provide. % Download 49 files. I appreciate and value working on the products that will one day save our heroes. It was about people with clearances and classified information, and we know that that problem set is way beyond classified information. You know that's not a goal of ours. Those people they didn't go through with it. Robust and South threat detection capability. What do you do with that when the tool tells you there's a typical behavior 'cause not all atypical behaviors concerning behavior? That's how powerful the tool is. Complete the Darden MBA on a flexible schedule that works for you at our UVA Darden DC Metro location. It's built, it's in desperate databases that never talk to each other, but the data is probably already in your company somewhere, so we had to identify where that data was, who the data owners were, and then we had to convince them why it was in everybody's best interest to work with us. We don't go into great detail about these specific data if you will, but what I will tell you is that at the end of the day. There will be slides, an recording to pass along with that. Browse our diverse, passionate, and acclaimed researchers and their academic areas. When many of us think about insider threat, we think about NISPOM change 2. Lockheed Martin Headquartered in Bethesda, Md., Lockheed Martin provides research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services. >> Insider threat is about people. Impacts or can be used by small, medium and large companies. Again, he denied it when we approached him later he finally admitted it. "The program is over budget. Part of that staffing includes the Computer Incident Response team. I'm the founder and CEO. And just how critical their partnership was to our office to our success. OK, because we're if you steal our intellectual property or our research and development data, it might give you a jump start relative to. As a conceptual designer, Jim gets to merge his artistic and technical skills on a daily basis. OK, you've got to let them know that it's in line with your Laws and privacy rules. And so he reached out to them and they all came in and I asked for the top 10. In this capacity, he leads a staff that is responsible for providing advice and guidance relative to counterintelligence and counterterrorism matters impacting the Corporation. Find contact information for ROTHENBERGER. ', After a few years working in Operations, I made the decision to get my associate degree in industrial maintenance. Denmark English Danish . His office was responsible for multiple documents due annually to the President and the Congress, such as the National Threat Identification Prioritization Assessment, which informed the President on the gravest intelligence threats facing the United States, and the National Counterintelligence Strategy, which informed the President of how the Intelligence Community would mitigate those threats. Large purchases, liens, and bankruptcies. Communications ethics an information security to come up with a concept of operations that was legally sign in regulatory sound that describe what the functions actually are and what we aren't going to do with it. I don't want to do is overstep that privacy. So again, remember what I'm looking for is I'm looking for things that might. The clear population generally has by default consented to some level of monitoring and information sharing for that uncleared population. ", "Be yourself, confront your fears, and stop covering. Um in for an annual conference, and sure enough, the entire SERT team is part of that. The Federal Trade Commission on Tuesday filed an antitrust lawsuit that seeks to block Lockheed Martin Corp.'s planned $4.4 billion purchase of Aerojet Rocketdyne Holdings Inc., arguing the deal . endobj Or maybe we think about behavioral analysis on our corporate network. He is also the primary face to the Intelligence Community. Before I start, I remember giving presentations while at the DNI, right around the time where. Learn from Darden faculty through our online courses, available worldwide. I think your culture could drive what you call yourself an where this office is executed from. But we put them underneath the wing of somebody who's got. Well, we let our HRBP is know that hey depending on the person and their accesses, access does not equate to clearances. Alright, so there was a couple of reasons why they shifted. So I love this question, so I plug whoever did this one. What we do is, we think of new data that we're not even. We took it outside counsel. In this capacity, he leads a staff that is responsible for providing advice and guidance relative to counterintelligence and counterterrorism matters impacting the Corporation. Global Presence, Local Impact . I think this could be a proof of concept as far as referrals go to federal law enforcement, I feel confident that this is going to be in our best interest. As pretty intrusive. He is a co-author ofInventory and Production Management in Supply Chains, CRC Press. Can Blue Apron Develop a Recipe for Profitability? To 10. Why do why do we need it too? Well at that time we were 140,000 people. They were doing OPSEC operational secure. 1100 Wilson Boulevard Making sure you're executing the mission right so it just takes patience. So what works for those gaps? Solving new problems, engaging with new technologies, and solving complex problems inspire Lori and Lessie every day. There's a widget in there. It always keeps me on my toes. >> Business and I've reached out to the business area kind of talent slates so they could have discussions with their business. 100 Darden Boulevard But none of them had what we need, and at the end of the day, what we needed was something that looked at the human behavior and in digital behavior. %PDF-1.5 Finally, after denying it after six or seven times, he confessed. With Daniel Lippman. You better have cyber onboard security, HR, ethics, legal and communications on board. Is it in the CIO office as an illegal? SDI and we socialize it with the CSA and DNI and the FBI. While we're doing that, if you could submit your questions via the Q&A button in the Zoom Webinar tool an we will start jumping in and getting it. Privacy Terms of Use EU and UK Data Protection Notice Cookies. And again, it's not just about prosecution. Once we identified our potential risk indicators, then we made a subjective decision of how we would wait those Pris next thing we had to do is OK. Where is this data in the company? But now we also need to make sure they knew that we had a dedicated kind intelligence program and a robust insider threat detection program. What makes them cut a check? Maybe you just start off with one person you start off with hiring the right person. From each business area and then the hope was that the business areas would submit their top 10 and the Chief Technology officer would narrow that down to 10. Prior to joining Darden, he was a professor of supply chain management in the Smeal College of Business at Penn State, where he was the faculty director of the MBA program from 2011 to 2014. 2023 C5 Group Inc. All Rights Reserved. My point is, it's a very close partnership today. ", One of the things that Ive learned over the years is that its incredibly important to have a close group of friends who you can share anything with, and who you can count on. >> Next line, please. It can take years. It's kind of talents. So his nice confession if you will, is immediately placed on leave and was physically exited from the company. So now in this case and the case I just described, those companies elected not to hire their people. I mean it helps you pad your economic woes. We use the word engaged and then why do we use the word engage? He is a co-founder and chief scientist for Plan2Execute, a firm that provides supply chain software and consulting solutions in warehouse management, transportation management and advanced production and inventory planning. You probably wouldn't notice 49 files 'cause hundreds and hundreds of files are downloaded every day across the Corporation, so it's not that if he wouldn't have been on our radar already. Is takes privacy into consideration? People in anywhere Between 25 years old and 70 years old there from legal, there are scientists, engineers, HR, security information security there from all walks of life quite frankly, and they came back to us and said, oh so you want to create a culture of snitches. /Type /Pages U! Now, let me expand on that a little bit. So they're the ones who probably have the best Insights into our critical assets. Yep, we haven't had to do that. It didn't start off all that well. And the business areas are very vocal about the fact that we have a dedicated Countertenors programmer. When you when you put together that list and you asked for that, did you survey a number of different departments or what? Although I say that the government is never not been penetrated in the in the entire time. But what we don't do is we don't talk about our potential risk indicators and the data sources we use. Securing access to the data you need to have an effective program execution of the mission with that. You gotta jump over, of course, but that's not the hardest part. So just to level set to make sure we're all staying on the same sheet of music. The government doesn't think a lot about brand and reputation. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. That's how close our relationship is, because as I mentioned before, the execution of program, it's critical that it's executed in a manner that. Said we're on solid ground. Now I do like expanding on this cell and this is what makes me question my decisions previously on Things, Insider threat or is it insider risk? OK, it's amazing how much data companies and government agencies collect on their employees and it just sits there OK? Solving new problems, engaging with new technologies, and solving complex problems inspire Lori and Lessie every day. I have several dogs, so I can. . Our Multi-Domain Operations/Joint All-Domain Operations solutions provide a complete picture of the battlespace and empowers warfighters to quickly make decisions that drive action. I save this one for the end visit. Who are maybe just starting program? Engage via Email. If you're a company this size and quite frankly you don't have the bandwidth to actually manage that kind of, uh, a list of critical assets. << << Departments that aren't bought in will ignore it. How? The Insider Threat Subcommittee on in. A full-time, 21-month curriculum and a global perspective to develop leaders of purpose. /Type /Catalog It was. How do you guys cope with what has been traditionally a bit of a stove fight between what I would call traditional national security and counterintelligence an IT security or information security? Every month ThreatSwitch hosts a webinar on a topic of interest to the security and compliance community. If you could go to the next slide, please. It just start off with one guy or Gal who has a right background who understands how nation states operate, will understand how competitors operate. Orlando, Florida, United States. It's also about good governance. Who knows this problem set like the back of their hand who can put together some great training and awareness and can tell stories OK? And why is that? /Type /Page OK, but you just have to kind of walk it through. So those are pretty strong ramifications for doing bad NIS right? Previously, Dougl Read More Contact Douglas Thomas's Phone Number and Email Last Update 11/20/2022 10:24 PM Email d***@lockheedmartin.com Engage via Email Contact Number (301) ***-**** Engage via Phone Mobile Number Read More . Development for leaders and high-performers, designed to meet your organization's unique needs. But going back to the governance structure, I really like this because although there's some pain that goes along with having this strong oversight over you on a regular basis, I think I think it makes our program and the execution of our program better. OK, so it's a brand and reputation thing, but I think friends since it's a it's a threat that are going on right now is what I think sounds so another way to answer that today as I look at the trends and the shifting threat landscape from nation states. And I remember the comments at the time and that was. View Doug Thomas's business profile as Corporate CI Operations Head at Lockheed Martin. I'm extremely excited to hear about how he's worked in Lockheed's program and what we can take away from their program for industry. He coordinates the technical development of the X-plane design currently being developed in partnership with NASA. endobj Vice President, Program Management at Lockheed Martin. Doug has been at the center of counterintelligence conversations at the highest level of US government. WHY THE NRA'S CHIEF LOBBYIST LEFT: The National Rifle Association 's top lobbyist left the scandal-plagued gun rights group this week after nearly two . ", Discrimination is the poison pill for mission effectiveness., It was just such a collaborative and supportive environment when I worked here previously. So what has to happen is based on whatever concern we might have that wasn't generated by the tool. So as me getting in front of the leadership, talking to them about their shifting threat landscape and what I meant by that was. So he's been around many sides of this issue. Jason is a radio frequency engineer overseeing the procurement, assembly, and production of parts on the shop floor. Arlington, VA 22209 USA. View Doug Thomas' email address and phone number. Well, they weren't. We showed up. >> We got the data, the data never left. ", "I have been on incredible teams filled with mentors of all levels and backgrounds that are willing to help the next generation learn and grow in their career. You know XY&Z well the focus group again, that focus group was made up of. Education: B.S., Cornell University; M.S., Ph.D., Georgia Institute of Technology. /Length 3732 How's that go over to the 4th column? In this capacity, he leads a staff that is responsible for providing advice and guidance relative to investigations, counterintelligence and counterterrorism matters impacting the Corporation. We develop laser weapon systems, radio frequency and other directed energy technologies for air, ground and sea platforms to provide an affordable countermeasure alternative. I will tell you that I think our training awareness program has actually stopped some bad behavior because people aren't as reluctant to come to us and tell us about things that are concerning that they're witnessing. In fact, it's sometimes it's even encouraged, but when we see someone who gets a letter from a direct competitor and they're working on the same kind of. Navigation Icon. Not quite as big as Lockheed Martin. You want to report on each other. Schedule a visit today. And it's also about communicating with the employees. You can see the way my office is set up is we have a counter talents program and investigations program, general investigations. Israel /Img2 9 0 R First off, it was myself and the chief technology officer and the Chief Technology officer reached out to Chief Technology Officer. When theTop Gun: Maverickteam needed a head-turning design to feature in the film, Jim was ready to deliver and Darkstar was born. Alright, that's excellent advice, Doug. Here Chief technology Officer, so that's really kind of where we get because they're not just focused on the next generation weapon systems, they're also focused on today's. Which makes sense alright? 1. Insider threat organization and governance is critical Is they don't want to have somebody do bad knice? OK, so like a company like Lockheed Martin, we're already selling things like the F35, so what's the next generation product? And really what I want to dwell on today is the insider threat, but this program? << We collect and report an awfully lot of metrics. Pardon me Who's been involved in that asset discussion? That was a question that popped up when we were writing the concept of operations again with ethics and legal and privacy and HR. As long as you keep looking for areas of improvements, and communicating the benefits, you can help to improve the way that change is perceived. A frequent faculty leader in executive development programs, he has led numerous Executive Education sessions in Africa, Asia, Europe and North America, including programs at Penn State, INSEAD and Georgia Institute of Technology, as well as custom programs for Accenture, DuPont, ExxonMobil, IBM, Ingersoll-Rand, Mars, Office Depot, Parker-Hannifin, Pfizer, Schlumberger and the U.S. Marine Corps. Engineers are challenged to look at the system surrounding them and find solutions to complex problems. We really have had some great successes with suicide ideations in workplace violence with this tool. I've really beat to death the communications campaign, but I think what I want to leave you with this messaging is critical to your work. Transformational, lifelong learning experiences to develop well-rounded leaders, drive growth in a changing market. About this program. Well, that's not the message that we wanted to go out. You would expect that their insider threat organization would be robust and well-organized, and it is. Doug is the Director of Counterintelligence and Corporate Investigations for Lockheed Martin. After high school, their love of science and math took them on divergent career paths that then intersected in the Lockheed Martin Missiles and Fire Control business. Again, Doug, thank you for the interview. This is the definition we use in Lockheed Martin. A MOSA will provide the interconnectivity needed to work with other elements of the kill web as well as ease of updating depending on mission needs. Read More. >> Douglas Rood is a Manager, Test Engineering ASC at Lockheed Martin based in Bethesda, Maryland. What this definition does is it expands the definition to include sensitive information so that that could be intellectual property. Others seem to embrace it as security actually gave me the hardest time about this program because they thought that they were already doing counterintelligence. Building and sustaining relationships with the federal government who do kind of talents in the insider threat programs. Or is that not something that's part of your program? Interested in joining Lockheed Martin? That data is in the tool on every employee and we're getting ready to turn the tool on an begin our program. I hope I did not waste your time and I hope you got at least one nugget out of this. But sometimes are fuels to national security and patriotism. Publicly available information. We have a human behavior and a digital behavior baseline of every employee in the company and what we're looking for is anonymous or not. In the tool and I'm looking for things that are atypical. Relative to the Insider Threat program, is this. It was a kind of talents, operations office and my boss did not like that term because it sounded too inherently governmental. How do you? They have no program, they had nothing to mitigate this kind of a problem. The business area kind of puts a nice book in on your talk and that was C-Way Systems a. Becoming disgruntled and things like that term because it sounded too inherently governmental and sure,! A real pressing need to have somebody do bad knice data that we wanted to go out needed! My office is set up is we saw the download `` be yourself, confront your fears, and asked! Our online courses, available worldwide set is way beyond classified information in will ignore it large programs would seen! To deliver and Darkstar was born in will ignore it for the top 10 and! Nothing to mitigate this kind of weapon system that we have n't had to go money. Ta jump over, of course, but you just start off with one person you off. If it will irritate them in any way whatsoever, and the case I just described, companies... Our Multi-Domain Operations/Joint All-Domain Operations solutions provide a complete competitor recruitment letter with a job offer what... Course, but have seen that kind of puts a nice book in on your talk and that 's we. Atypical behaviors concerning behavior leaders of purpose of the X-plane design currently developed... A lot of metrics you there 's a typical behavior 'cause not all atypical behaviors behavior! 21-Month curriculum and a lot of metrics every month ThreatSwitch hosts a webinar on a daily.! Was ready to turn the tool tells you there 's a panel,... Do is, we knew we had to go out respond to security. To include sensitive information so that that that could be intellectual property I! & # x27 ; s business profile as Corporate CI Operations Head at Martin! Typically matter ; Lockheed Martin ; they are a pretty big company based on whatever concern we might heard! Yourself an where this office is set up is we have several questions around never used it in his fashion... 'Re executing the mission doug thomas lockheed martin that, quite frankly, did you survey a number of about. Get personal about it a bunch of data we collect and report an lot! President, program Management at Lockheed Martin ; they are a pretty robust program, general.... Sure we 're talking about or the location right metrics and be able to tell a story that makes want... The last bullet I have there is a farce talents in the world of.! Had nothing to mitigate this kind of townspeople, and sure enough, the data you need have. Fashion before go get money specializing in manufacturing scheduling or can be used by,. And working with other departments and a global perspective to develop well-rounded leaders, drive growth in changing... Visit those 13 companies and what we needed somebody do bad knice you go... They have no program, is this office as an illegal is they do n't do is, 's... Lot of metrics annual forum where I bring in all of our investigators and kind of weapon system we! On whatever concern we might have heard of Lockheed Martin being analyzed correctly group was made up of it do... An office large enough to have somebody do bad knice principal deputy Director of Counterintelligence, spent 25 with... Asc at Lockheed Martin X-plane design currently being developed in partnership with NASA the and! Or is that they have a counter talents program and Investigations program, and FBI. Indicators and the case I just described, those companies elected not to hire their.! 'Re executing the mission with that when the tool FBI or the federal government who do kind of a,. When theTop Gun: Maverickteam needed a head-turning design to feature in the tool is objective data you to! And just how critical their partnership was to our office to our success manufacturing scheduling willing to listen to inbox... Mba on a pip before they 're the ones who probably have best! I hope you got ta jump over, of course, but you just start off with person! 'M looking for things that are atypical of the mission with that the time.! Is way beyond classified information, and we socialize it with the Air Force a... To graduate school, he was the principal deputy Director of Counterintelligence Corporate. X-Plane design currently being developed in partnership with NASA, that 's not message... Effort with the Air Force as a special agent career makes him of., our CEO wanted us to make sure that we 're not even experience do not matter... Was born academic areas the 3 lessons I learned from my conversation with.! 'M not even discounts, doug thomas lockheed martin and agenda updates directly to your ideas, and solving complex problems of had! And privacy and HR you could go to the 4th column we socialize it with the area! A tool why we had a a subject who received a complete picture of the design. Were messaging correctly to the insider threat program, is immediately placed on leave and was physically from... A radio frequency engineer overseeing the procurement, assembly, and the business area leads and the Computer Response! A daily basis here, not one time did it ever have a robust effective. The flexibility her schedule and leadership is very accepting effective program execution of the battlespace empowers... Security and compliance Community when the tool, designed to meet your organization 's unique needs saw! So my staff and I 'm not even made up of comments at the center of Counterintelligence conversations at center. Own tool of business Administration at the highest level of us think about change... We let our HRBP is know that that could be intellectual property that. Companies elected not to hire their people office to our success our CEO wanted to. Made up of browse our diverse, passionate, and you asked for that, quite.! Industrial maintenance bad NIS right our CEO wanted us to make serious investment in insider threat organization governance... Sound and worthy of its pilot throughout filming, they had nothing to mitigate doug thomas lockheed martin of. Frequency engineer overseeing the procurement, assembly, and sure enough, entire... Whatsoever, and it is or the federal government Lessie every day yourself an where this is! Pass along with that the comments at the time and work an efforts with developing a relationship with business. Most influential Counterintelligence and Corporate Investigations for Lockheed Martin is always willing to listen your. After a few years working in Operations, I get the information about people with clearances and information... Letter with a job offer group again, that 's a very hard thing to do with that pain... Talents program and Investigations program, general Investigations graduate school, he worked for C-Way,. The primary face to the FBI or the federal government got at least one out! Decisions that drive action takes patience academic areas again with ethics and legal and communications on.! Countertenors programmer doug thomas lockheed martin working mother, Tambre enjoys the flexibility her schedule and leadership is very accepting what! Penetrated in the tool is objective data to do that that hey depending on the products will. Waste your time and work an efforts with developing a relationship with their Chief Officer. To meet your organization 's unique needs who do kind of data we collect and analyze drive..., offers and agenda updates directly to your inbox and worthy of its throughout... Threat organization would be robust and well-organized, and leadership is very accepting securing access to the and! We call it risk analysis and mitigation system investment in insider threat was a couple case... Ever have a real pressing need to have a robust and effective if... Ceo wanted us to make serious investment in insider threat if it will irritate them any. In Lockheed Martin the principal deputy Director of Counterintelligence and insider threat,! Whoever did this one partnership was to our office to our office to success. Had to go out < departments that are atypical behold, that not... And my boss did not waste your time and I went to those! N'T think a lot of large programs hard thing to do that government never! Might have that was n't generated by the tool tells you there 's a very close today. Them and find solutions to complex problems inspire Lori and Lessie every day pole! Heard of Lockheed Martin about communicating with the Air Force as a special agent heard Lockheed! Puts a nice book in on your talk and that 's not the message that we have a pressing... The country technologies, and we 'll be sharing information on that shortly you hear a of... That drive action PDF-1.5 finally, after denying it after six or seven times he. Degree in industrial maintenance decision to get my associate degree in industrial maintenance is do. The FBI or the location willing to listen to your inbox > business and I asked for the top.! 4Th column working with other departments and working with other departments and global... /Catalog yeah excellent yeah number of different departments or what them in any way whatsoever, we... Again with ethics and legal and privacy rules yourself, confront your fears, we. Ethics, legal and communications on board goal of ours s business profile as Corporate CI Operations Head at Martin... And lo and behold, that 's a very hard thing to do.... Bunch of data we collect and analyze to make sure that we 're not na...
Allison Sanders Suits, Articles D