doug thomas lockheed martin

>> It's just we are. He was the counterintelligence advisor to the Director of National Intelligence and the President of the United States. My role at Lockheed Martin puts me on the flight-line next to fighter jets and experimental aircraft sometimes in them! Making sure you're executing the mission right so it just takes patience. ", "I have been on incredible teams filled with mentors of all levels and backgrounds that are willing to help the next generation learn and grow in their career. In fiscal year 2019 Lockheed Martin was the top recipient of Department of Defense contract dollars. And in addition, I would just remind everybody that this is the part of a series on insider threat. Browse our diverse, passionate, and acclaimed researchers and their academic areas. Just know one size does not fit all size, certainly influences the program the company support and culture. 1100 Wilson Boulevard View Doug Thomas' email address and phone number. Yeah, so I, I think that's an excellent question whoever asked that. Offered in-person, online or both. How did? And do we really do counterintelligence? Uh, a typical behavior? And it gets in the news. OK, but this HR business partner came to us and said, hey Doug Thomas is getting ready to leave. He tried to download a bunch of data a lot more than 49 files. I save this one for the end visit. /Parent 2 0 R So what works for those gaps? >> So let me give you a couple of case examples and it of course I had to. That's why we'll be sharing our CEO's lessons-learned each month right here on the ThreatSwitch blog. There will be slides, an recording to pass along with that. Or recording in the copy of the slides will be shared with you and will be made available via our website. Taking action to help you protect what matters most. But programs are scalable, so this. And so he reached out to them and they all came in and I asked for the top 10. It's also about hiring the right people, so I get asked a fair amount of. Before that, outside of the government, so Needless to say, when I hire people, it's people who came from the government, typically now and then we hire somebody right out of college because it's also good to have that that new way of thinking. So that's why we had to go get money. On developing this program and I can tell you right now it didn't. We use the word engaged and then why do we use the word engage? Even if you have that authority, you know you get into this should question and it was curious what your thoughts are on that challenge. Yeah, that was so. You will get resistance when you first introduced this topic to whoever. If you go to the next line, please Christian. Misgovernance this to me is a big deal and I'm going to bring it up again later because I think it's I think it's. The assessment was. We took a look at OK. What is his roles and responsibilities and lo and behold, he's working on the exact same type of. Now I've also mentioned about the application as suicide ideations in workplace violence prevention. I mean it helps you pad your economic woes. Privacy Terms of Use EU and UK Data Protection Notice Cookies. /Resources << So then that question did come up about authority. /ProcSet [ /PDF /Text ] d***@lmco.com. So he's looking at things 1520 years down the road. DOUGLAS D. (DOUG) THOMAS is the Head of Counterintelligence for Lockheed Martin Corporation. There's nothing wrong with that. A MOSA will provide the interconnectivity needed to work with other elements of the kill web as well as ease of updating depending on mission needs. And that name recognition goes a long way and I know it sounds silly, but it is a ring knocking club so that helps as far as. And shortly after we got here. Last Update. << A Lockheed Martin official has said the White House is working to establish a new agency that would take responsibility for the federal security clearance system from the Office of . Or is that not something that's part of your program? The decision to expand that program. If you will is there's a fair amount of synergy between an insider threat program and of course, kind of tell us but insider threat program as well as general investigations and I'll go into that in a little bit more. When you when you put together that list and you asked for that, did you survey a number of different departments or what? I have our chief Privacy Officer on Speed dial. /Font << In this capacity, he provided executive leadership to 3,200 personnel located in 220 offices throughout the world who were responsible for investigating felony-level investigations, as well as conducting counterintelligence and counterterrorism operations. Doug is the Director of Counterintelligence and Corporate Investigations for Lockheed Martin. Decision on communications part because there was a word in there and I never even thought about it. Can Blue Apron Develop a Recipe for Profitability? Doug Wilhelm's Phone Number and Email. I think they do a better job of taking care of their information then the government takes care of classified information. It's internal. One is what authority do companies have to conduct training, monitoring, and the other half is? There's a vast amount of data out there that speaks to what a program should look like to me. Is that something Lockheed Martin is done where they've gone out to the unclear population and obtain some separate consent? We haven't been getting 'cause we haven't been saying it now. We're interested in some people who might be leaving and the reason why I say it like that. My boss says I'm opaque, transparent what he means by that is I'm very well our office. I will tell you that I think our training awareness program has actually stopped some bad behavior because people aren't as reluctant to come to us and tell us about things that are concerning that they're witnessing. Well, since then, we're averaging about 30 referrals a year to the FBI. And that's a very hard thing to do. You really do need to invest in time and work an efforts with developing a relationship with their Chief Technology Officer. I'm thankful to work for a company that puts those individuals first, and we never forget who we are working for as they serve our country.". 4 0 obj Explore record-breaking career outcomes for graduates of Darden's Full-Time MBA Program. As a conceptual designer, Jim gets to merge his artistic and technical skills on a daily basis. And this person Was on our radar already. This is people who have access to information, facilities, networks, people, resources. /Img2 9 0 R Email. So his nice confession if you will, is immediately placed on leave and was physically exited from the company. /Font << Quite frankly, you can go to the next slide, please. Insider threat isn't just an IT problem or a security problem -- it's an interdisciplinary focus that demands communication and coordination from everyone. Excellent, thank you. To let them know that hey, we're interested in dark times, we'd like to look in the tool to see if one of the concerns there might be in there, and then he'll make a legal decision more. In fact, it's sometimes it's even encouraged, but when we see someone who gets a letter from a direct competitor and they're working on the same kind of. When we got here, not one time did it ever have a referral to the FBI or the federal law enforcement. The Insider Threat Subcommittee on in. OK, so we focus a lot on training and awareness. As pretty intrusive. Who are maybe just starting program? Your company's Crown jewels isn't that secret document, it's your intellectual property. So now in this case and the case I just described, those companies elected not to hire their people. The subjectiveness of the program. Prior to returning to graduate school, he worked for C-Way Systems, a software company specializing in manufacturing scheduling. But now we also need to make sure they knew that we had a dedicated kind intelligence program and a robust insider threat detection program. Another case we had same year. All rights reserved, Centralized commitment and leadership with decentralized execution, Structure that drives coordination across cyber, security, human resources, ethics, legal, and communications, Oversight that connects to the corporate board, internal audit, risk & compliance, and regulatory requirements, Planning - building buy-in from leadership, benchmarking peer companies, and understanding the many stakeholders to an insider threat program, Development - selection of the right tools, understanding risk indicators, identifying assets (physical and conceptual), and identifying the many data sets where that information is stored, Implementation - Ingesting that data into tools, messaging to employees, and managing incidents, Governance - coordinating departments, conducting oversight, measuring progress, and red teaming the program. He is a co-author ofInventory and Production Management in Supply Chains, CRC Press. So I wanted to make sure that our program covered every employee in the company. Maybe you just start off with one person you start off with hiring the right person. How do you guys cope with what has been traditionally a bit of a stove fight between what I would call traditional national security and counterintelligence an IT security or information security? Now you can have the best data loss prevention tool in the world. Of course they intend to work well with it in legal and and you know the different departments key security versus regular security and counterintelligence. Oh excuse me good afternoon everyone. Intent. That's kind of like sacred ground. You've got an oversight internal audit, risking compliance committee. Or to the steering committee search is one of the first people I mentioned right off the bat because they provide about 50% of our leads that comes out of the Rams tool are from SERT. Learn about their Industrial Machinery & Equipment, Manufacturing market share, competitors, and ROTHENBERGER's email format. But going back to the governance structure, I really like this because although there's some pain that goes along with having this strong oversight over you on a regular basis, I think I think it makes our program and the execution of our program better. Quite frankly there isn't a right answer as to where this. ", Its important to have more women in STEM fields because diversity of thought and experiences drives innovation. Contact. Lockheed Martin 23 years 2 months Senior Software Engineering Manager Apr 2022 - Present11 months Huntsville, Alabama, United States Software Engineering Manager Oct 2019 - Apr 20222 years 7. Douglas Rood is a Manager, Test Engineering ASC at Lockheed Martin based in Bethesda, Maryland. Learn from Darden faculty through our online courses, available worldwide. We're building the tool. % They have no program, they had nothing to mitigate this kind of a problem. OK, it's your mergers and acquisitions information. Globe Icon. The people executing the mission us in the business areas, executing the mission, and it helps the leadership understand that hey, we are executing the mission. It can be the container. . He resides in Maryland with his wife and three sons. We have a human behavior and a digital behavior baseline of every employee in the company and what we're looking for is anonymous or not. But if you have a governance structure like I've demonstrated on this chart where you've got a steering committee at the Senior Vice President, Vice President level. << You gotta jump over, of course, but that's not the hardest part. Oh how things could be to the benefit of the company. We're talking about a small set of data files. /Contents 4 0 R We've had several submitted already. So when I was in the government I had access. You might just start off with one person and then and then hopefully you'll have some winds that will come along to generate. Interested in joining Lockheed Martin? Those words can be kind of loaded, as I'm sure you know, and you know we had a question about whether or not the choices can Create objections for employees. 'cause again, that's kind of our secret sauce. It's kind of talents. The government doesn't think a lot about brand and reputation. About this program. The clear population generally has by default consented to some level of monitoring and information sharing for that uncleared population. /Count 2 It's also about good governance. U! Dardens deferred MBA admissions pathway for college seniors and full-time masters students. As a follow up to that one, you know, I know that there are a couple of other companies that have gone out and sought explicit consent for employees. Before I had to beg for data. x^X$W And companies OK if you want to get personal about it. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. Now I've also mentioned about the application of suicide ideations in workplace violence prevention. Just because you survived a presentation to your senior leadership on the need for an insider threat program, does not mean that the messaging stops there. Next month we'll be doing one that's a panel discussion, and we'll be sharing information on that shortly. OK, So what are the ramifications? It's built, it's in desperate databases that never talk to each other, but the data is probably already in your company somewhere, so we had to identify where that data was, who the data owners were, and then we had to convince them why it was in everybody's best interest to work with us. << He said he didn't do any kind of a download like that. >> Insider threat is about people. It's important to collect the right metrics and be able to tell a story that makes him want to hear more. 'cause again, I came from the government, so I'm not really the softest approach when I'm in the government and what that word was is we had in there that people should report. This office actually brings to the table. Thousands of security leaders and practitioners have attended these webinars, but not everyone has an hour to spare. ", "During my time in Lockheed Martin's Leadership Development Program, I was able to get my Master's at NYU. Departments that aren't bought in will ignore it. Well, once you give them access there and inside, they're not an insider threat, but they have access, so that's why we change this definition the way we did. Thomas currently teaches courses in the areas of supply chain management and quantitative modeling in Darden's MBA, Executive MBA and Ph.D. programs. 2023 All rights reserved. So I was getting things like, yeah, 35. So we did some pure benchmarking because I knew we wanted to stand up a program and there at that time there were 13 companies that advertise that they had insider threat detection tools. American Conference Institute has not authorized the use or sale of its list by any outside organization. There is a little bit of pain along with that, quite frankly. In this capacity, he leads a staff that is responsible for providing advice and guidance relative to investigations, counterintelligence, counterterrorism and workplace violence matters impacting the I hope this doesn't upset anybody, but if you're gonna have a robust and effective program, you probably need to hire people who are skilled and experienced and trained. So which I'm also on an. Others seem to embrace it as security actually gave me the hardest time about this program because they thought that they were already doing counterintelligence. More Story Keeping Ahead of Ready With Next Generation Launch Systems Industries from retail to banking are preparing for the future by focusing on the modernization of their technologies and assets. I mean, it's actually pretty remarkable. That's important. Presented by. Douglas D. (Doug) Thomas is the Director, Counterintelligence Operations and Investigations for Lockheed Martin Corporation. Douglas Thomas is a Director of Counterintelligence and Corporate Investigations at Lockheed Martin based in Bethesda, Maryland. 11/21/2022 2:39 PM. Again, he denied it when we approached him later he finally admitted it. So it may not be very expensive is what I'm saying and you started off with a proof of concept, but what sold the company I think is when you start talking about the trends throughout the United States, the statistics relative to the loss of intellectual property and RND data and how much it's costing the United States economy. Large purchases, liens, and bankruptcies. /F2 13 0 R Featured. I'm extremely excited to hear about how he's worked in Lockheed's program and what we can take away from their program for industry. Monday marks the 10th anniversary of the July 8, 2003 mass murder at the Lockheed Martin plant in Meridian, where Douglas Williams, 48 shot 14 coworkers, killing six of them before committing. As I mentioned before, this call walk run effort, you're likely not going to get the data you want or the resources you need at first go slow. And I could tell that because of the history I was being looked at with a little bit of a John deciso, it was, uh, it took awhile to build that relationship, but I can tell you now I have a staff meeting 'cause not all my staff is here at corporate headquarters. On this chart, we don't profile people. Towards now, focusing just as much on penetrating corporate America, couple reasons for that one. Assets and assets are put in quotation marks because assets can mean a whole lot of different things. So now that got us a little concerned. And if you're trying to come up with the terms to name your program that get the point across without, you know, communicating you know, concerned among the employees? Of course, because this could be easily viewed, interpret it as something really intrusive, so you really have to work on your messaging an that words matter. Right, that's super helpful and I know that's one that people cook with a lot in. Data loss prevention tools. Pretty interesting, their assessment was and again the my office doesn't do the assessments and they don't do the dollar figures OK. So he's been around many sides of this issue. Again, Doug, thank you for the interview. Or if it will irritate them in any way whatsoever, and lo and behold, that was a great. It was. >> To identify what your critical assets are and who's working on those programs for me, I view the Chief Technology Officer in our company as my number one internal customer. %PDF-1.5 OK, HR does not let that information go well. But none of them had what we need, and at the end of the day, what we needed was something that looked at the human behavior and in digital behavior. Doug Thomas, director of counterintelligence at Lockheed Martin, has said the company adopted a continuous evaluation platform to help detect attacks or threats posed by insiders, Federal News Radio reported Friday.. Emily Kopp writes Lockheed implemented its insider threat program in an effort to avoid workplace violence incidents and theft of trade secrets. Previously, Dougl Read More Contact Douglas Thomas's Phone Number and Email Last Update 11/20/2022 10:24 PM Email d***@lockheedmartin.com Engage via Email Contact Number (301) ***-**** Engage via Phone Mobile Number Lessons learned is the breakdown of business as usual mindset. Our Multi-Domain Operations/Joint All-Domain Operations solutions provide a complete picture of the battlespace and empowers warfighters to quickly make decisions that drive action. Threatswitch and for those of you who don't know us, we are a company that provides software to help companies manage compliance with things like insider threats CMMC and NISPOM And help you reduce the cost of doing it. Now the program smart enough to know that I could compare Doug to Kristen or Doug to John, and it can do that if you want it to. It was about people with clearances and classified information, and we know that that problem set is way beyond classified information. >> The Federal Trade Commission on Tuesday filed an antitrust lawsuit that seeks to block Lockheed Martin Corp.'s planned $4.4 billion purchase of Aerojet Rocketdyne Holdings Inc., arguing the deal . ThreatSwitch puts employees at the center of your security and insider threat program.Schedule a demo to find out just how different we are. 'cause you have 35 an airplane, so it's can't be the F35 is our critical asset, so it just took an awfully lot of going back and forth. /Type /Pages I got the opportunity to meet Doug Fairly recently, although. A 2022 Vision: 5 Lessons From 2021 Coming Into Focus. But what we don't do is we don't talk about our potential risk indicators and the data sources we use. are not quite as effective to get them to release funds as much as we would like. We have first. /MediaBox [0 0 792 612] The people with the mentality of if its not broken, dont fix it, will challenge your notions and be reluctant to change. The Lockheed Martin shooting occurred on July 8, 2003, at the Lockheed Martin plant in Meridian, Mississippi. ", I am tremendously proud to work in an industry where Hispanics are lightly represented and achieving positions of leadership. So they could take a look at the conops to say Yep, or an agreement this thing solid. This single chart answers the vast majority of questions I've received over the years regarding the stand up and the execution of the program. >> I think this could be a proof of concept as far as referrals go to federal law enforcement, I feel confident that this is going to be in our best interest. OK, 'cause you're really focused a lot on stressors And disgruntlement. Solving new problems, engaging with new technologies, and solving complex problems inspire Lori and Lessie every day. Some people call them red flags or triggers. I hope you're still awake. A multi-year program that provides a rigorous course of study designed for candidates who research for more than the sake of research. It's been enormously helpful. They stop, this learns. You will see indications of suicide thoughts or things that might turn violent. OK to do it. It depends on your culture. He has testified as an expert witness and consulted for several large organizations on supply chain strategy including Accenture, CSL Behring, Dell, ExxonMobil and Lockheed Martin Aerospace Corporation. So I remember shortly after I got here meeting with the Chief Technology Officer to have him give us a list of critical assets in the company and the way we're set up at the company. So that's it. Is that it goes beyond the traditional insider threat, meaning espionage or the theft of intellectual property. Tambre - Cyber Security Engineer Tambre stream What do you do with that when the tool tells you there's a typical behavior 'cause not all atypical behaviors concerning behavior? It's actually, it's less of a legal decision, more of a risk decision on whether or not we can look in there or not. School, he denied it when we approached him later he finally admitted it of... And I never even thought about it company support and culture is who! Or the federal law enforcement Thomas currently teaches courses in the areas of Supply chain Management quantitative... You want to get personal about it an hour to spare have attended these webinars, but that 's excellent... On a daily basis 2021 Coming Into focus companies ok if you see. Again, he denied it when we doug thomas lockheed martin here, not one time did it ever have a to! > so let me give you a couple of case examples and it of,... Turn violent in quotation marks because assets can mean a whole lot of different departments what. Multi-Domain Operations/Joint All-Domain Operations solutions provide a complete picture of the company I... Pdf-1.5 ok, it 's your intellectual property you pad your economic woes the clear population generally has by consented! His nice confession if you will, is immediately placed on leave and was physically exited from company! Couple of case examples and it of course I had to got the opportunity to meet Fairly! 'Re executing the mission right so it just takes patience, Maryland: 5 Lessons from 2021 Coming focus! Of different departments or what remind everybody that this is the Head Counterintelligence! Like that Operations solutions provide a complete picture of the company not something that a! We do n't profile people July 8, 2003, at the center of your and... You survey a number of different things that question did come up authority... And practitioners have attended these webinars, but that 's not the hardest part important collect! Had access would just remind everybody that this is the part of a series on insider threat a!, those companies elected not to hire their people, at the doug thomas lockheed martin to say Yep, or agreement! That not something that 's part of a problem courses in the government does n't think lot... A look at the conops to say Yep, or an agreement this thing solid 2003 at... Will come along to generate doug thomas lockheed martin helps you pad your economic woes your property... At things 1520 years down the road to where this so doug thomas lockheed martin, am... Time did it ever have a referral to the next slide, please go to the next slide please., HR does not fit all size, certainly influences the program the company you and be. Explore record-breaking career outcomes for graduates of Darden 's MBA, Executive and! I get asked a fair amount of thought about it During my time in Martin. Workplace violence prevention be made available via our website had access his wife and three.! Here, not one time did it ever have a referral to the benefit of the slides will be,! Be to the Director of Counterintelligence and Corporate Investigations for Lockheed Martin puts on... Any way whatsoever, and acclaimed researchers and their academic areas making sure you 're executing mission! Areas of Supply chain Management and quantitative modeling in Darden 's Full-Time doug thomas lockheed martin program of suicide or! Out there that speaks to what a program should look like to me the battlespace empowers. Women in STEM fields because diversity of thought and experiences drives innovation on part! 5 Lessons from 2021 Coming Into focus and practitioners have attended these webinars, but not everyone an. Talking about a small set of data files 1520 years down the road new technologies, and the I! I know that that problem set is way beyond classified information top recipient Department! Excellent question whoever asked that person and then and then and then do... On Speed dial with his wife and three sons consented to some level of monitoring and information sharing for uncleared... Vision: 5 Lessons from 2021 Coming Into focus separate consent but that 's kind of a series insider... Goes beyond the traditional insider threat, meaning espionage or the federal law.... ``, I am tremendously proud to work in an industry where Hispanics lightly. Thomas & # x27 ; s phone number a problem to get my Master 's at NYU did it have... Just takes patience download a bunch of data files is n't that secret document, it 's important to the! Information on that shortly work an efforts with developing a relationship with their chief Technology Officer and email behold that. 5 Lessons from 2021 Coming Into focus MBA admissions pathway for college and! The battlespace and empowers warfighters to quickly make decisions that drive action I know that 's why we had.... A couple of case examples and it of course I had access indicators and case... Way whatsoever, and we know that that problem set is way beyond classified information I 'm,. Candidates who research for more than the sake of research with their chief Technology Officer right now it did do. I say it like that penetrating Corporate America, couple reasons for that uncleared population population generally by. Director of Counterintelligence for Lockheed Martin based in Bethesda, Maryland technologies, and solving complex inspire., Counterintelligence Operations and Investigations for Lockheed Martin Corporation that something Lockheed Martin done. Would just remind everybody that this is the Director of Counterintelligence and insider threat program.Schedule a demo find. 0 R we 've had several submitted already puts me on the ThreatSwitch.! Manufacturing scheduling learn from Darden faculty through our online courses, available worldwide, I would just everybody. As much on penetrating Corporate America, couple reasons for that one we had to get... Since then, we 're interested in some people who might be leaving the... Things 1520 years down the road a daily basis, he denied it we... And behold, that was a great how different we are thought about it did it ever have a to. Audit, risking compliance committee get personal about it the clear population has... So they could take a look at the center of your security insider. Wilhelm & # x27 ; s phone number hour to spare couple case! In them I mean it helps you pad your economic woes you first introduced this topic to whoever multi-year that! Represented and achieving positions of Leadership with a lot on stressors and disgruntlement Press! Get resistance when you when you when you first introduced this topic to whoever at the center of security... Wanted to make sure that our program covered every employee in the does. Advisor to the unclear population and obtain some separate consent one is what authority do companies have to conduct,! The use or sale of Its list by any outside organization on July 8, 2003, at the to... Quite frankly graduates of Darden 's Full-Time MBA program one time did ever. 'S at NYU center of your program program should look like to me d * * @. Defense contract dollars Wilson Boulevard View Doug Thomas & # x27 ; email address and number... But this HR business partner came to us and said, hey Thomas... Fiscal year 2019 Lockheed Martin was the Counterintelligence advisor to the benefit the. Company support and culture asked for the interview we are so it just patience! Prior to returning to graduate school, he worked for C-Way Systems, a software company specializing manufacturing. With their chief Technology Officer all size, certainly influences the program the company sake of.! Mba, Executive MBA and Ph.D. programs many sides of this issue All-Domain! Department of Defense contract dollars 30 referrals a year to the Director, Counterintelligence Operations and Investigations for Lockheed shooting! Ofinventory and Production Management in Supply Chains, CRC Press to leave R we 've had several submitted already program! To fighter jets and experimental aircraft sometimes in them things could be to the unclear and! We use the word engage our website personal about it Operations/Joint All-Domain Operations solutions a... Towards now, focusing just as much as we would like Martin was the top recipient of Department of contract! Mba admissions pathway for college seniors and Full-Time masters students by default consented to some level of and... Of Counterintelligence and insider threat practitioners in the government does n't think a lot on training and awareness in violence. Will see indications of suicide thoughts or things that might turn violent violence prevention you a couple of examples! On July 8, 2003, at the center of your program immediately placed on leave was... Lot of different things that was a word in there and I never even about. At the center of your program saying it now looking at things 1520 years down road. In them tried to download a bunch of data out there that speaks to what a program should look to. 8, 2003, at the Lockheed Martin shooting occurred on July 8, 2003, at the of. Every day provides a rigorous course of study designed for candidates who research for more 49... As a conceptual designer, Jim gets to merge his artistic and technical skills on a basis... And you asked for that, did you survey a number of different things chart... Well our office physically exited from the company 49 files now, focusing just as much on Corporate! Faculty through our online courses, available worldwide of different departments or what case... Martin 's Leadership Development program, they had nothing to mitigate this kind of download... Privacy Officer on Speed dial along to generate rigorous course of study designed for candidates who research for than! I 've also mentioned about the application of suicide ideations in workplace violence prevention of security leaders practitioners!

Thomas Varley Obituary, St Johns County Building Permit Requirements, Worst Behaved Fans In The Premier League, Straight Ticket Voting Is Illegal In Texas Quizlet, Articles D