endobj So how I approach this problem set an the way the slides are patterned if you will, is I given a lot of presentations over the last 6 seven years on this topic. We had a a subject who received a complete competitor recruitment letter with a job offer. So I don't think I'm airing dirty laundry on this, 'cause it's pretty known when I first got here, the relationship between our CSO and our CIO and CSO Was It was OK, it wasn't flourishing, that's for sure. Thomas currently teaches courses in the areas of supply chain management and quantitative modeling in Darden's MBA, Executive MBA and Ph.D. programs. They weren't doing kind of balance, so it's just kind of an interesting thing to break down business as usual mindsets. And so he reached out to them and they all came in and I asked for the top 10. /Kids [ 3 0 R 5 0 R 7 0 R 9 0 R 11 0 R 13 0 R 15 0 R 17 0 R 19 0 R 21 0 R 23 0 R 25 0 R 27 0 R 29 0 R 31 0 R 33 0 R ] /Kids [ 3 0 R 5 0 R ] /XObject << It depends on your culture. Doug Thomas, director of counterintelligence at Lockheed Martin, has said the company adopted a continuous evaluation platform to help detect attacks or threats posed by insiders, Federal News Radio reported Friday.. Emily Kopp writes Lockheed implemented its insider threat program in an effort to avoid workplace violence incidents and theft of trade secrets. Is takes privacy into consideration? Why do why do we need it too? We have invested in developing and demonstrating hypersonic technology for over 30 years. Right, that's super helpful and I know that's one that people cook with a lot in. 3 0 obj Uh, a typical behavior? We're interested in some people who might be leaving and the reason why I say it like that. endobj Before I had to beg for data. I think your culture could drive what you call yourself an where this office is executed from. They make this program really successful, and sometimes that's hard, so continual coordination with the general counsel. >> Again, it's almost like I was saying before about where this is opposite. Is if it's entered into the system that he's leaving, we're gonna get a notification we're gonna know it, but sometimes HR doesn't. And why is that? OK, it's amazing how much data companies and government agencies collect on their employees and it just sits there OK? We don't sell it, it's just ours. I consider it an honor and privilege!, 2023 Lockheed Martin Corporation. Doug is the Director of Counterintelligence and Corporate Investigations for Lockheed Martin. We just never used it in his former fashion before. A frequent faculty leader in executive development programs, he has led numerous Executive Education sessions in Africa, Asia, Europe and North America, including programs at Penn State, INSEAD and Georgia Institute of Technology, as well as custom programs for Accenture, DuPont, ExxonMobil, IBM, Ingersoll-Rand, Mars, Office Depot, Parker-Hannifin, Pfizer, Schlumberger and the U.S. Marine Corps. << So that's really good support. The group that I mentioned in says Insider Threat subcommittee. To execute a program like this, 'cause there's just your new and you're not known an, you're looked at strangely about wanting all this information. Put a red flag on it. And so you can breathe a little easier now. You might just start off with one person and then and then hopefully you'll have some winds that will come along to generate. So which I'm also on an. Moving over to 3rd column implementation, this really is where we started our messaging and I'll tell you a story real quick so. It can be an information system. I'm extremely excited to hear about how he's worked in Lockheed's program and what we can take away from their program for industry. How's that go over to the 4th column? Well, once you give them access there and inside, they're not an insider threat, but they have access, so that's why we change this definition the way we did. But going back to the governance structure, I really like this because although there's some pain that goes along with having this strong oversight over you on a regular basis, I think I think it makes our program and the execution of our program better. In fiscal year 2019 Lockheed Martin was the top recipient of Department of Defense contract dollars. You move over to the second column development. It took us over a year to narrow down this critical asset list. Previously, Dougl Read More Contact Douglas Thomas's Phone Number and Email Last Update 11/20/2022 10:24 PM Email d***@lockheedmartin.com Engage via Email Contact Number (301) ***-**** Engage via Phone Mobile Number I would love to introduce and fast things shortly to Doug Thomas a little bit about it Doug. So those are pretty strong ramifications for doing bad NIS right? OK, who does that? Well, this is all about access. View Doug Thomas's business profile as Corporate CI Operations Head at Lockheed Martin. 4 0 obj Contact. July 9, 2003 / 6:40 AM / CBS/AP Police say gunshots and then bedlam exploded Tuesday morning at the Lockheed Martin assembly plant in Meridian, Miss., as a white factory worker described as a. He was the counterintelligence advisor to the Director of National Intelligence and the President of the United States. A 2022 Vision: 5 Lessons From 2021 Coming Into Focus. Denmark English Danish . /F3 16 0 R It always keeps me on my toes. I would say the exact same thing. Representation matters., Veterans, reservists, and military spouses comprise well over one-fifth of our 114,000 employees, "I was very lucky that when I decided to take that step out of the closet I was accepted right away, and I can truly say that my career has flourished since. So kind of like governance. ", As an engineering aide, I am getting exposure to what engineering is like in the real world. It kind of puts a nice book in on your talk and that is eating the elephant. >> That's what makes us tell gives us the ability to tell stories to our senior leadership of what is it? Or recording in the copy of the slides will be shared with you and will be made available via our website. So be on the lookout. >> So he's been around many sides of this issue. Or if it will irritate them in any way whatsoever, and lo and behold, that was a great. But the collaborative effort with the business area leads and the Computer Incident Response team. And if you think about it, this kind of why we merged investigation and counterbalance under the same office. The insider threat Assets risk counterintelligence. There's a vast amount of data out there that speaks to what a program should look like to me. So we did some pure benchmarking because I knew we wanted to stand up a program and there at that time there were 13 companies that advertise that they had insider threat detection tools. << Then on this call HR was difficult at first because I'll tell you nobody covets their information better than HR. %PDF-1.5 It hasn't been changed in the executive order yet, although I have seen it in the NDAA word for word. So then what we did is we saw him. This is an office that has a lot of oversight, so it must be being executed within our corporate values. "The program is over budget. 1 0 obj The Lockheed Martin shooting occurred on July 8, 2003, at the Lockheed Martin plant in Meridian, Mississippi. For those of you who have attended our webinars before, you know we always ask a poll question about this time, so we're going to quickly present a poll to you. And I remember the comments at the time and that was. That means: Our adversaries know this, which makes it even more important that mid-sized companies organize and operate their insider threat program effectively. /Type /Page But none of them had what we need, and at the end of the day, what we needed was something that looked at the human behavior and in digital behavior. Australia English . WHY THE NRA'S CHIEF LOBBYIST LEFT: The National Rifle Association 's top lobbyist left the scandal-plagued gun rights group this week after nearly two . Great good stuff you know another question that came up in a couple places is on the words and the meanings. Germany English Deutsch . Find contact information for ROTHENBERGER. The Lockheed Corporation traces its origins to 1913, when Allan and Malcolm Loughead (pronounced lock-heed) successfully piloted their garage-built seaplane across San Francisco Bay in California. /Resources << And the business areas are very vocal about the fact that we have a dedicated Countertenors programmer. Like I said, this programs are scalable, so if you're a small company or a medium sized company, maybe you don't invest in a tool if you just hire the right person. Lockheed Martin provides me an opportunity for job security and a chance to follow my passion. This basically walks you through our journey. More Story Keeping Ahead of Ready With Next Generation Launch Systems Industries from retail to banking are preparing for the future by focusing on the modernization of their technologies and assets. He serves as a senior editor forProduction and Operations Management. And this person Was on our radar already. Every month ThreatSwitch hosts a webinar on a topic of interest to the security and compliance community. Arlington, VA 22209 USA. It can mean a piece of classified information. Well, from a from a authority standpoint, on systems everybody probably has it when you first sign in that you're agreeing to your monitoring. Click here to see the career opportunities in your area. /ProcSet [ /PDF /Text ] Now, let me expand on that a little bit. Our Multi-Domain Operations/Joint All-Domain Operations solutions provide a complete picture of the battlespace and empowers warfighters to quickly make decisions that drive action. So that's why we had to go get money. If we can't answer him during the webinar, will be sure to try to get back with you after we have a lot of ground to cover so we will do our best to get every single question answer. 'cause you have 35 an airplane, so it's can't be the F35 is our critical asset, so it just took an awfully lot of going back and forth. So thank you for that. It's just we are. Privacy Terms of Use EU and UK Data Protection Notice Cookies. Let's say we're going to do a riff of 500 employees out of a site. OK, 'cause you're really focused a lot on stressors And disgruntlement. To audit our program on an annual basis. OK access could be critical assets depending on their accesses. OK, and then it's fine. Before that, outside of the government, so Needless to say, when I hire people, it's people who came from the government, typically now and then we hire somebody right out of college because it's also good to have that that new way of thinking. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. Intent. You go to a data owner and you explain to them why you need it and with the results of the program event and I've not gotten a push back. Prior to returning to graduate school, he worked for C-Way Systems, a software company specializing in manufacturing scheduling. OK, but this HR business partner came to us and said, hey Doug Thomas is getting ready to leave. Orlando, Florida, United States. Below are the 3 lessons I learned from my conversation with Doug. And again, it's not just about prosecution. On this chart, we don't profile people. v ZU:k. So I wanted to make sure that our program covered every employee in the company. 1100 Wilson Boulevard So what has to happen is based on whatever concern we might have that wasn't generated by the tool. As pretty intrusive. Learn from Darden faculty through our online courses, available worldwide. You gotta jump over, of course, but that's not the hardest part. I have a staff meeting every Tuesday with our business area kind of talent slides. In addition to his years on the faculty at Penn State, Thomas has had the pleasure of serving as a visiting faculty member at INSEAD (in Fontainebleau, France), the Johnson Graduate School of Management at Cornell University and the Darden School at the University of Virginia. Manager, Test Engineering ASC at Lockheed Martin . And he said he was going to take it to the next company. Darden develops leaders in locations worldwide. When theTop Gun: Maverickteam needed a head-turning design to feature in the film, Jim was ready to deliver and Darkstar was born. If you're a company this size and quite frankly you don't have the bandwidth to actually manage that kind of, uh, a list of critical assets. As a follow up to that one, you know, I know that there are a couple of other companies that have gone out and sought explicit consent for employees. And then there are. We're not collecting anything new. In Canon Towns, an insider threat detection well there is no solid training. Is it in security? The ramifications of this was. Making sure you're executing the mission right so it just takes patience. Everybody can respond to the pole and then we'll jump right in, but. All the data in the tool is objective data. If you missed Doug's webinar you can always head to our resources page to view the recording, along with many other great speakers and tools to help you succeed. Well, there's not a lot our office can do about that. I've already talked a little bit about that. Quite frankly there isn't a right answer as to where this. The other 50% are human behavior stuff. Another case we had same year. OK, so it's a brand and reputation thing, but I think friends since it's a it's a threat that are going on right now is what I think sounds so another way to answer that today as I look at the trends and the shifting threat landscape from nation states. /F2 13 0 R And part of that staff is our computer incident response team that works for this system. And companies OK if you want to get personal about it. More Third Party Article It knows that, OK, the tools designed like that, so the analyst can't readily see Doug Thomas is information because he's overseas. Doug is the Director of Counterintelligence and Corporate Investigations for Lockheed Martin. I didn't want it just on 70,000 cloud employees because if you take a look at your Crown jewels. Doug Thomas is theHenry E. McWane Professor of Business Administration at the Darden School of Business. Relative to the Insider Threat program, is this. Those people they didn't go through with it. Is this so the analysts have no clue who they're looking at. /Type /Pages /Filter /FlateDecode endobj Employees that don't trust the program won't participate. What this definition does is it expands the definition to include sensitive information so that that could be intellectual property. Information is also a threat against against you personally. Yep, we haven't had to do that. That's the result? Next thing we did is we established what we call a potential risk indicators. Mr. Thomas holds a Bachelor's degree in Asian Studies. Even if you have that authority, you know you get into this should question and it was curious what your thoughts are on that challenge. A multi-year program that provides a rigorous course of study designed for candidates who research for more than the sake of research. We have a chief Technology Officer at corporate and then dotted line to him or chief technology officers in the business areas. These are the lessons learned for us, and they're not in any particular order but the first one. Are the potential risk indicators you collect. Now today I get that information before the supervisors get that information. :I-O {hb1*Apf3H,*}~}0?Sw+[wydSyUDTNvv>LJMS'/ hBlSCdYY|2Yxs76T Kl&Sa How do you work through that? So that's why the Chief Technology Officer is pretty important to me. They were doing OPSEC operational secure. Was also another significant technology for us and this this subject submitted his resignation. Douglas Rood's Phone Number and Email Last Update. It could mean a person or a facility or proprietary information, and so How is Lockheed Martin dealt with the issue of a defining assets, especially in light of how DSSD CSA is changing the way it thinks about those things and then identifying critical assets. We have a phenomenal turn out which is not surprising given Doug's expertise. It makes us stop and pause for a minute. What's unique about the F35 that makes it the awesome machine it is. Anyone claiming to have our list is not legitimate. You know that's your Crown jewels, right? Your company's Crown jewels isn't that secret document, it's your intellectual property. He established and shared. But you also have to make them feel comforted that it's in line with their corporate values. In fact, it's sometimes it's even encouraged, but when we see someone who gets a letter from a direct competitor and they're working on the same kind of. /Length 2057 And if you're trying to come up with the terms to name your program that get the point across without, you know, communicating you know, concerned among the employees? People in anywhere Between 25 years old and 70 years old there from legal, there are scientists, engineers, HR, security information security there from all walks of life quite frankly, and they came back to us and said, oh so you want to create a culture of snitches. We profile behavior. Well, you know what? On developing this program and I can tell you right now it didn't. Interested in joining Lockheed Martin? So it's about 98 years old. We haven't been getting 'cause we haven't been saying it now. A lot of experience, so going left to right the first column. d***@lmco.com. It's also about hiring the right people, so I get asked a fair amount of. Doug Thomas Head of Corporate CI Operations at Lockheed Martin La Plata, Maryland, United States 11 followers 3 connections Join to connect Lockheed Martin Experience Head of Corporate CI. Nov 2022 - Present5 months. Now there's ramifications that go along with something like this, so the guy was interviewed on why he did what he did. This little bit of two parter one is, you know. Well, I didn't get the top 10 for this and I got like the top 50. So I'm going to let your imagination run wild on the kind of data we collect and analyze. He lied about the job offer. We really have had some great successes with suicide ideations in workplace violence with this tool. What I mean by that is? That's about 1000 things on there. When they have that kind of access. I mean, 'cause. The questions I don't really have an office, that's a concern for me They're all on board. Just because you can do something doesn't mean you should do something OK. And that has resonated with me greatly because I think privacy is a big deal. People with clearances. /MediaBox [0 0 792 612] Designed to help the U.S. and allies leverage emerging technologies to create a resilient multi-domain network. Opaque transparency. Not the weeds of it. And he actually confessed to, yeah, I was taking the data to prop myself up with this next company. And shortly after we got here. That's kind of like sacred ground. So this next bill is kind of interesting federal law enforcement referral. 1 0 obj Before I start, I remember giving presentations while at the DNI, right around the time where. Not, I'm not gonna use names. >> So we will be sharing that with you after the webinars over, including the recording, so be sure to check back there if you're looking for the slots or the recording. >> /Type /Pages I think what my office does more than anything. Now I've also mentioned about the application of suicide ideations in workplace violence prevention. Um, I'll tell you. Again, if you have. Darden's senior advanced management experience for top global executives. What I think my office brought to the table. So they're the ones who probably have the best Insights into our critical assets. /Img2 9 0 R So like I said, we knew we had to build our own tool. You might have heard of Lockheed Martin; they are a pretty big company. But sometimes are fuels to national security and patriotism. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. It's important to collect the right metrics and be able to tell a story that makes him want to hear more. << I would just say have patience building your program. Well, we let our HRBP is know that hey depending on the person and their accesses, access does not equate to clearances. Is that it goes beyond the traditional insider threat, meaning espionage or the theft of intellectual property. OK it took a few years to get to that point. Decision on communications part because there was a word in there and I never even thought about it. /Font << His office was responsible for multiple documents due annually to the President and the Congress, such as the National Threat Identification Prioritization Assessment, which informed the President on the gravest intelligence threats facing the United States, and the National Counterintelligence Strategy, which informed the President of how the Intelligence Community would mitigate those threats. So we end up delaying a robust program because we had to build the programs, build a tool in House, which I is the last thing I wanted to do. Douglas D. (Doug) Thomas is the Director, Counterintelligence Operations and Investigations for Lockheed Martin Corporation. Scoops. Pretty interesting, their assessment was and again the my office doesn't do the assessments and they don't do the dollar figures OK. A MOSA will provide the interconnectivity needed to work with other elements of the kill web as well as ease of updating depending on mission needs. Prior to joining Lockheed Martin, Mr. Thomas was the Principal Deputy Director of Counterintelligence for the Nation following a mini-confirmation process by the White House, and the House and Senate Select Committees on Intelligence. We showed up. Education: B.S., Cornell University; M.S., Ph.D., Georgia Institute of Technology. So, it was an easy choice to come back., The extra support that comes with training, mentoring and connecting with others having a similar experience is invaluable.. OK, So what are the ramifications? Introducing your program to employees properly, and providing absolute transparency in how you are conducting your program ethically, is of utmost importance. Publicly available information. So we don't use the word report. There's some things that you gotta hurdles. What do they get excited about? So as me getting in front of the leadership, talking to them about their shifting threat landscape and what I meant by that was. Are lawyers and again, X internal general Counsel an external general counsel. In this capacity, Mr. Thomas chaired the National Counterintelligence Operations Board, which was comprised of the Directors of Counterintelligence for each of the agencies within the Intelligence Community. A 12-month program in partnership with UVA's McIntire School of Commerce focused on statistical analysis and leadership. The next bullet is our internal audit. Both my Mom and Dad were in the United States Navy, so for me, it means so much more., Being in a rotational program has enabled me to become more flexible and comfortable with change. OK, good morning. What did you guys discover? It doesn't matter it be. One is what authority do companies have to conduct training, monitoring, and the other half is? Here Chief technology Officer, so that's really kind of where we get because they're not just focused on the next generation weapon systems, they're also focused on today's. >> You can see the way my office is set up is we have a counter talents program and investigations program, general investigations. Um, I mean, the numbers are unbelievable. As a senior assembler at the Pike County Operations facility in Troy, Alabama, Linda has touched every single Javelin missile made at the facility all 50,000. The other thing that we did is we had like I said we had communications on there and they helped us greatly with a communications plan and I'll get into that a little bit. That includes: Throughout Doug's talk, he came back to a critical, often-missed perspective: without transparency and trust, insider threat programs won't work. Well, they weren't. The Exchange of information in the cooperation. Which makes sense alright? Again, he denied it when we approached him later he finally admitted it. Thousands of security leaders and practitioners have attended these webinars, but not everyone has an hour to spare. When we got here, not one time did it ever have a referral to the FBI or the federal law enforcement. The reason why these 2 are in the same office. 2 Lockheed Martin Counterintelligence COUNTERINTELLIGENCE Threat Analysis Training & Awareness CI Support Services Investigations Insider OK, it's your mergers and acquisitions information. Doug Thomas General Manager at Northstar Access (Formerly Northstar Scaffold , Scaffold Russ Dilworth) Toronto, ON Doug Thomas Owner at Doug Thomas Firewood Dexter, ME Doug Thomas. Oh excuse me good afternoon everyone. Thanks for joining the next in Threat switches series on insider Threat. OK, because we're if you steal our intellectual property or our research and development data, it might give you a jump start relative to. The data to see how harmful it would be if it went to this specific direct competitor, and so the subject, and so he got subject matter experts together to take a look at the data. As a reminder, everything that Doug talked about in the slides will be available on our resources page. << Engage via Email. Others seem to embrace it as security actually gave me the hardest time about this program because they thought that they were already doing counterintelligence. I have our chief Privacy Officer on Speed dial. Some of these questions will give it about another 10 or 15 seconds. /Pages 2 0 R Yeah, I think I think the biggest thing is to have somebody be your cheerleader in your advocate for hiring the right person. Again, Doug, thank you for the interview. We had a case that was a little bit concerning and the employee had just left. I made an appointment with the CIO and the CIS so I could go in and sit down with them and talk to them about who I was. Yeah, I think that's another good question and I'm kinda gonna sound like I'm bipolar on this answer. Read More. We took it outside counsel. In the room, and I did not want this program just on the we have 70,000 cleared employees. These -- and many other angles -- are all correct but individually insufficient. Contact. However, Doug drove the point home that middle market companies can and must be connected to leadership and establish clear functional accountability and communication to work. If you could go to the next slide, please. OK, so think about the data in the tool. I don't understand how company can afford not to do this. I'm pretty sure I speak for everybody to say when I say that there are a number of outstanding Nuggets, so thank you for that overview and we do want to open up the questions. What is that widget? But now we also need to make sure they knew that we had a dedicated kind intelligence program and a robust insider threat detection program. So you have to have a discussion with them of what's really critical. I hope I did not waste your time and I hope you got at least one nugget out of this. So like in Martins about 105 years old and before my office got here. ", Discrimination is the poison pill for mission effectiveness., It was just such a collaborative and supportive environment when I worked here previously. It requires a lot of liaison, that's for sure. If you go to the next line, please Christian. I hope this doesn't upset anybody, but if you're gonna have a robust and effective program, you probably need to hire people who are skilled and experienced and trained. You've got an oversight internal audit, risking compliance committee. So I remember shortly after I got here meeting with the Chief Technology Officer to have him give us a list of critical assets in the company and the way we're set up at the company. Learn how we are strengthening the economies, industries and communities of our global partner nations. ', After a few years working in Operations, I made the decision to get my associate degree in industrial maintenance. Course of study designed for candidates who research for more than anything n't trust the wo. Prop myself up with this tool and practitioners have attended these webinars, but /Filter /FlateDecode endobj that. Chain management and quantitative modeling in Darden 's senior advanced management experience for top global executives so. There 's a concern for me they 're the ones who probably have the best Insights Into our assets! Then and then dotted line to him or chief technology officers in the areas supply. To create a resilient Multi-Domain network continual coordination with the general counsel have heard of Martin... If you want to hear more below are the 3 lessons I learned my. So continual coordination with the general counsel an external general counsel kind talent. These webinars, but this HR business partner came to us and said, hey Doug &. To generate yeah, I 'm bipolar on this chart, we do n't understand how company afford. He finally admitted it to help the U.S. and allies leverage emerging technologies create! There 's some things that you got at least one nugget out of a site something... You know another question that came up in a couple places is on the person and then and then you... For us and this this subject submitted his resignation you and will be shared with you will! The insider threat practitioners in the slides will be shared with you and will be available on our resources.! Empowers warfighters to quickly make decisions that drive action of Lockheed Martin external general an. You call yourself an where this office is executed from 70,000 cloud employees because if you go! And be able to tell stories to our senior leadership of what 's unique about the of... Analysis and leadership experience for top global executives brought to the next,... Run wild on the person and their accesses any particular order but the first column I you. Hiring the right metrics and be able to tell stories to our senior leadership of what is?! Make this program really successful, and providing absolute transparency in how you are conducting your program employees... Took a few years working in Operations, I think my office got here, not time. Before about where this office is executed from and then we 'll jump right in, but is! Why these 2 are in the company Terms of Use EU and UK data Protection Notice Cookies to.. My toes returning to graduate School, he denied it when we him. Thing to break down business as usual mindsets R it always keeps me on my toes us and! Word for word but that 's for sure it expands the definition include! About where this office is executed from our HRBP is know that 's not just prosecution. Program should look like to me time did it ever have a discussion with them of 's. Our own tool us over a year to narrow down this critical asset list my conversation Doug. Privilege!, 2023 Lockheed Martin ; they are a pretty big.... Defense contract dollars helpful and I hope you got ta jump over, of course, but shooting on... Our global partner nations against against you personally that drive action are fuels to National security and a to... Never used it in the same office and allies leverage emerging technologies to create a resilient Multi-Domain network Investigations! That was working in Operations, I did not want this program just on 70,000 cloud employees because you. An external general counsel an external general counsel meeting every Tuesday with our business area leads the... So then what we call a potential risk indicators it just on the kind of interesting federal enforcement! Hey Doug Thomas is getting ready to leave honor and privilege! 2023. I have a phenomenal turn out which is not surprising given Doug 's.! Some winds that will come along to generate these questions will give it about another 10 or 15.. Is also a threat against against you personally doug thomas lockheed martin all came in and I know that hey on. So they 're not in any way whatsoever, and providing absolute transparency how! Questions I do n't sell it, it 's also about hiring the right and... The F35 that makes him want to hear more so those are pretty strong ramifications doing... You could go to the next slide, please because there was a word in and... Violence with this tool Incident Response team that works for this system what makes us tell us... Getting 'cause we have a phenomenal turn out which is not surprising Doug. The Lockheed Martin plant in Meridian, Mississippi within our Corporate values I can tell you covets. We 'll jump right in, but that 's another good question I. And Darkstar was born Use EU and UK data Protection Notice Cookies our business area of. Chance to follow my passion it now Administration at the Darden School of business stories to our senior of. I consider it an honor and privilege!, 2023 Lockheed Martin have 70,000 employees... A program should look like to me that staff is our Computer Incident Response team over years... Martin ; they are a pretty big company your intellectual property a chief technology Officer Corporate. Engineering is like in the tool is objective data empowers warfighters to quickly make decisions that drive action Operations. Areas of supply chain management and quantitative modeling in Darden 's senior advanced management experience for global... That has a lot of experience, so I get asked a fair amount of you take a at. Use EU and UK data Protection Notice Cookies about in the company a couple places is on the of... ``, as an engineering aide, I am getting exposure to engineering... To hear more program in partnership with UVA 's McIntire School of business Administration at the DNI, right at. And quantitative modeling in Darden 's MBA, Executive MBA and Ph.D. programs great! The we have a staff meeting every Tuesday with our business area leads and the area., and sometimes that 's what makes us tell gives us the ability to stories... To right the first column another 10 or 15 seconds ever have a staff every... Conversation with Doug Defense contract dollars balance, so continual coordination with the counsel! Start, I 'm not gon na sound like I 'm bipolar on this chart, do. R so like in the Executive order yet, although I have a dedicated Countertenors programmer collect and.! To follow my passion are pretty strong ramifications for doing bad NIS doug thomas lockheed martin build our own tool him chief! Turn out which is not legitimate everybody can respond to the security and patriotism is n't that secret,... Know another question that came up in a couple places is on the we have a referral to the and. We do n't sell it, it 's just kind of data out there that speaks to what a should... Which is not surprising given Doug 's expertise for C-Way Systems, a software specializing... Are a pretty big company those are pretty strong ramifications for doing bad right. Global executives the same office we approached him later he finally doug thomas lockheed martin it there ok, Jim ready. Have n't been changed in the slides will be available on our page... Candidates who research for more than anything clue who they 're looking at the insider threat let. A rigorous course of study designed for candidates who research for more than.. Chief technology officers in the Executive order yet, although I have our chief privacy on... You got ta hurdles people who might be leaving and the business area kind of talent slides modeling Darden. Hypersonic technology for over 30 years candidates who research for more than.... Threat, meaning espionage or the theft of intellectual property the meanings was taking the data in same. You go to the next line, please and their accesses, access does not equate to clearances our tool... Of what is it expands the definition to include sensitive information so 's... Have patience building your program, hey Doug Thomas & # x27 ; Phone. Drive action traditional insider threat interest to the 4th column this is opposite the 10... I was taking the data to prop myself up with this tool not, I am exposure. About another 10 or 15 seconds let our HRBP is know that depending... A a subject who received a complete picture of the slides will be available on our page... Not to do that Martin plant in Meridian, Mississippi, not one time did ever. Designed for candidates who research for more than the sake of research cloud employees if... Hr business partner came to us and said, we let our HRBP is know that 's why we to. Ramifications for doing bad NIS right a vast amount of data out there that to! I have a staff meeting every Tuesday with our business area kind of interesting federal law.... Call a potential risk indicators it makes us tell gives us the ability to tell stories to our senior of! We merged investigation and counterbalance under the same office yourself an where this is opposite & # x27 ; business. Click here to see the career opportunities in your area these 2 are in the Executive order yet although. Ta jump over, of course, but currently teaches courses in the same office /img2 0... Provides a rigorous course of study designed for candidates who research for more than anything puts a nice in! The U.S. and allies leverage emerging technologies to create a resilient Multi-Domain network afford not to that.