]T~'#8Xk%u T~- Lucio builds air vehicle models as a laboratory mechanic, converting conceptual drawings into reality. I mean, 'cause. Thank you everyone for attending and everyone have a fantastic weekend and remainder of your Friday. ", Its important to have more women in STEM fields because diversity of thought and experiences drives innovation. Below are the 3 lessons I learned from my conversation with Doug. The questions I don't really have an office, that's a concern for me They're all on board. So I was getting things like, yeah, 35. It took us over a year to narrow down this critical asset list. Just because you survived a presentation to your senior leadership on the need for an insider threat program, does not mean that the messaging stops there. OK, but companies do. Learn about their Industrial Machinery & Equipment, Manufacturing market share, competitors, and ROTHENBERGER's email format. In this capacity, he leads a staff that is responsible for providing advice and guidance relative to counterintelligence and counterterrorism matters impacting the Corporation. I didn't want it just on 70,000 cloud employees because if you take a look at your Crown jewels. ", Three years ago, I decided I wanted to get more involved in my local community and give back to those less fortunate than me., I always tell my soldiers, I may be your leader, but Im nothing without you. These -- and many other angles -- are all correct but individually insufficient. There is a little bit of pain along with that, quite frankly. We are delighted to be talking about 11 lessons from Lockheed Martin's Insider threat program and to help us talk about that. The assessment was. >> Richard A. Mayo Center for Asset Management, Centers of Excellence Support Services Group, Academic and Practitioner Symposium on Mutual Funds and ETFs, Case Method Teaching Seminar for Educators, Colloquium for Organizational Research Excellence, Darden Financial Economics Brown Bag Workshops, Leadership and Organizational Behavior Seminar Series, New Directions in Leadership Research Conference, The Executive Program: Strategic Leadership at the Top. A week doesn't go by that you don't see in the press a new arrest or conviction of someone involved in espionage, theft of intellectual property. Douglas Rood's Phone Number and Email Last Update. This little bit of two parter one is, you know. << Um in for an annual conference, and sure enough, the entire SERT team is part of that. We're building the tool. We develop laser weapon systems, radio frequency and other directed energy technologies for air, ground and sea platforms to provide an affordable countermeasure alternative. On the next generation product. Once we identified our potential risk indicators, then we made a subjective decision of how we would wait those Pris next thing we had to do is OK. Where is this data in the company? Doug has been at the center of counterintelligence conversations at the highest level of US government. So kind of like governance. His work has appeared in several academic and practitioner journals in the areas of logistics and operations management, includingManagement Science,Manufacturing and Service Operations ManagementandProduction and Operations Management. Great good stuff you know another question that came up in a couple places is on the words and the meanings. So he's looking at things 1520 years down the road. 'cause you have 35 an airplane, so it's can't be the F35 is our critical asset, so it just took an awfully lot of going back and forth. That's how powerful the tool is. That works for me. You know that's just So what piece? Thats why having the opportunity to do that daily and assist transitioning service members, veterans, and spouses with opportunities at a company like Lockheed Martin is just amazing., I love having the opportunity to connect with our transitioning service members and provide a bridge for them to cross as they begin their next career. Then on this call HR was difficult at first because I'll tell you nobody covets their information better than HR. An the program what it does it evaluates every employees, attributes, actions and behaviors 24/7. ", One afternoon, my company was preparing to go out on a routine patrol. If you really think about what this program does, it could very much be interpreted. 4 0 obj When we got here, not one time did it ever have a referral to the FBI or the federal law enforcement. Beg for money if you will to build a tool. So we will be sharing that with you after the webinars over, including the recording, so be sure to check back there if you're looking for the slots or the recording. The clear population generally has by default consented to some level of monitoring and information sharing for that uncleared population. And he said he was going to take it to the next company. After legal and privacy, internal blessed it as legally sign regulatory sound. Prior to joining Darden, he was a professor of supply chain management in the Smeal College of Business at Penn State, where he was the faculty director of the MBA program from 2011 to 2014. ", Discrimination is the poison pill for mission effectiveness., It was just such a collaborative and supportive environment when I worked here previously. It was about people with clearances and classified information, and we know that that problem set is way beyond classified information. Designed to help the U.S. and allies leverage emerging technologies to create a resilient multi-domain network. As I mentioned, Doug is counterintelligence operations in corporate investigations director at Lockheed Martin. But now we also need to make sure they knew that we had a dedicated kind intelligence program and a robust insider threat detection program. Um, other things that happened is he added Clearence, so of course we notified the government and you know they. Yeah excellent yeah number of questions about departments and working with other departments and a lot of large programs. Thomas received his M.S. OK, we've been telling him for the last couple years. ThreatSwitch Acquired by Sign In Solutions, Sign In Solutions Announces Visitor Management 2.0 Strategic Vision, How ThreatSwitch Workflows Save Sanity by Eliminating Countless Hours of Work For Your Entire Security Team, 2023 Sign In Compliance. OK to do it. >> What we do is, we think of new data that we're not even. In the tool and I'm looking for things that are atypical. It hasn't been changed in the executive order yet, although I have seen it in the NDAA word for word. You would expect that their insider threat organization would be robust and well-organized, and it is. Lockheed Martin Corporation DOUGLAS D. (DOUG) THOMAS is the Head of Counterintelligence for Lockheed Martin Corporation. I've already talked a little bit about that. Contact. It's your research and development data. They've been a great partner to work with it. Or if it will irritate them in any way whatsoever, and lo and behold, that was a great. The other 50% are human behavior stuff. /Type /Catalog Another selling point to a robust, effective program is when executed well. OK, but this HR business partner came to us and said, hey Doug Thomas is getting ready to leave. First and foremost, really happy to everybody here. stream Now we're going to be focused on and communications suggested that we have a focus group. They're really kind of two questions here. He was the counterintelligence advisor to the Director of National Intelligence and the President of the United States. Thousands of security leaders and practitioners have attended these webinars, but not everyone has an hour to spare. Veterans are usually familiar with our products and can provide vital insights concerning how to make our products better and safer for current service members. So I don't think I'm airing dirty laundry on this, 'cause it's pretty known when I first got here, the relationship between our CSO and our CIO and CSO Was It was OK, it wasn't flourishing, that's for sure. In addition to his years on the faculty at Penn State, Thomas has had the pleasure of serving as a visiting faculty member at INSEAD (in Fontainebleau, France), the Johnson Graduate School of Management at Cornell University and the Darden School at the University of Virginia. It's internal. Departments that aren't bought in will ignore it. endobj So before we get started I just want to go through a few administrative things. If you'd like to ask questions at any point during the webinar, please use the Q&A feature. Recruiting military & Veteran talent is absolutely crucial to Lockheed Martin. So we don't use the word report. It's just we are. Standing up a program is not the long pole in the tent. It can take years. Previous to his role within the Office of the Director of National Intelligence, Mr. Thomas was a Special Agent for 25 years with the Air Force Office of Special Investigations. We had a case that was a little bit concerning and the employee had just left. I have the program Red teamed by real experts to make sure that the tool itself is not penetrable, because if you think about all the data that's in that tool and how sensitive that date is, we've got a strong obligation to make sure that that data is never lost. So I wanted to make sure that our program covered every employee in the company. But I let them know that look, I have. Weapon system that that direct competitor is working on. We have a great guest, so that's it's really been fantastic. /MediaBox [0 0 612 792] So much for spending a little bit of your afternoon with us. I hope this doesn't upset anybody, but if you're gonna have a robust and effective program, you probably need to hire people who are skilled and experienced and trained. Well, this is all about access. Oh excuse me good afternoon everyone. It's kind of talents. Because the one that was in the executive order was pretty myopic. So you're not gonna have an office large enough to have a robust and effective program if you don't leverage technology. And that name recognition goes a long way and I know it sounds silly, but it is a ring knocking club so that helps as far as. Take a look at that paragraph to see if it's worded in a way that will resonate with the employee workforce. It's actually, it's less of a legal decision, more of a risk decision on whether or not we can look in there or not. Other thing is if you think about what some of our secrets are in industry. You know that's your Crown jewels, right? Not, I'm not gonna use names. He is a co-founder and chief scientist for Plan2Execute, a firm that provides supply chain software and consulting solutions in warehouse management, transportation management and advanced production and inventory planning. /Img1 8 0 R I mean you mentioned the scope of this can be huge. So I love this question, so I plug whoever did this one. I have an annual forum where I bring in all of our investigators and kind of townspeople, and you are about 75 now. The other thing that we did is we had like I said we had communications on there and they helped us greatly with a communications plan and I'll get into that a little bit. Once you figured out what the assets are. Lockheed Martin. Both my Mom and Dad were in the United States Navy, so for me, it means so much more., Being in a rotational program has enabled me to become more flexible and comfortable with change. There will be slides, an recording to pass along with that. "The program is over budget. /Count 2 He said he didn't do any kind of a download like that. endobj So be on the lookout. But the reason why I wanted to keep kind of talents in the name. If you think about what their role is, they're given a boatload of money to do research and development and studies an analysis. Navigation Icon. It was. But there are some similarities. % The right answer is that it's a team sport. Yeah, so I, I think that's an excellent question whoever asked that. Our Multi-Domain Operations/Joint All-Domain Operations solutions provide a complete picture of the battlespace and empowers warfighters to quickly make decisions that drive action. You'll hear me mention this a couple of times because I'm kind of like a broken record one when it comes to some things and one is. The next bullet is our internal audit. So they could take a look at the conops to say Yep, or an agreement this thing solid. Point towards disgruntlement or stressors. Doug Thomas is theHenry E. McWane Professor of Business Administration at the Darden School of Business. After high school, their love of science and math took them on divergent career paths that then intersected in the Lockheed Martin Missiles and Fire Control business. If we can't answer him during the webinar, will be sure to try to get back with you after we have a lot of ground to cover so we will do our best to get every single question answer. Insider threat isn't just an IT problem or a security problem -- it's an interdisciplinary focus that demands communication and coordination from everyone. On the need to involve them and what we needed from the FBI and Oh my God, you wouldn't believe that pushback that I got from general counsel initially. We don't go into great detail about these specific data if you will, but what I will tell you is that at the end of the day. So just to level set to make sure we're all staying on the same sheet of music. Australia English . This is an office that has a lot of oversight, so it must be being executed within our corporate values. Why do why do we need it too? Initially, because all the data is anonymized in the tool, so that's why I say we don't profile people for profiling behavior. Excellent, yeah, we have several questions around. Some of these questions will give it about another 10 or 15 seconds. Doug Thomas is the Henry E. McWane Professor of Business Administration at the Darden School of Business. And it gets in the news. You gotta jump over, of course, but that's not the hardest part. From each business area and then the hope was that the business areas would submit their top 10 and the Chief Technology officer would narrow that down to 10. He serves as a senior editor forProduction and Operations Management. So like in our tool. As a reminder, this web and R is being recorded. Well, I didn't get the top 10 for this and I got like the top 50. His office was responsible for multiple documents due annually to the President and the Congress, such as the National Threat Identification Prioritization Assessment, which informed the President on the gravest intelligence threats facing the United States, and the National Counterintelligence Strategy, which informed the President of how the Intelligence Community would mitigate those threats. That's what makes us tell gives us the ability to tell stories to our senior leadership of what is it? That's why I said early on that you gotta have some incredible patience. I remember going to the general counsel making the case to refer this in 811 referral, a formal referral to the barrel. That's kind of like sacred ground. For over 19 years, she has fulfilled her mission of delivering secure systems to our customers. Arlington, VA 22209 USA. To 10. Education: B.S., Cornell University; M.S., Ph.D., Georgia Institute of Technology. That's important. Just asking you want to hear more about threats which. How do we get started? Our corporate headquarters, which is why I said, sets the tone with the priorities. So like in Martins about 105 years old and before my office got here. So they're the ones who probably have the best Insights into our critical assets. Have some minor wins, prove the concept if you will where we are today, certainly is not where we were seven years ago with this program. /Kids [ 3 0 R 5 0 R 7 0 R 9 0 R 11 0 R 13 0 R 15 0 R 17 0 R 19 0 R 21 0 R 23 0 R 25 0 R 27 0 R 29 0 R 31 0 R 33 0 R ] Decision on communications part because there was a word in there and I never even thought about it. All the data that's in the tool is anonymized, so the analysts, by the way, really have four analysts for over 100,000 employees. In the room, and I did not want this program just on the we have 70,000 cleared employees. I'm sure you probably have about another 2 hours of stories and we all would have listened to them, but we booked it for only an hour, which I always feel like is not enough time. /Pages 2 0 R You want to report on each other. It's only 49 files, but their assessment was. Information is also a threat against against you personally. 11/25/2022 2:48 AM. << But the company's leadership is not quite on board because they're not used to it like the way that Lockheed Martin might have. Prior to that, he was the principal deputy Director of Counterintelligence, spent 25 years with the Air Force as a special agent. Well, our CEO wanted us to make sure that we were messaging correctly to the employee workforce relative to this new program. Excellent, thank you. If you go to the next line, please Christian. But what I prefer the tool to do is compare Doug I've got his baseline. That's the result? 3 0 obj There's a widget in there. Doug Thomas General Manager at Northstar Access (Formerly Northstar Scaffold , Scaffold Russ Dilworth) Toronto, ON Doug Thomas Owner at Doug Thomas Firewood Dexter, ME Doug Thomas. So that's why the Chief Technology Officer is pretty important to me. /Font << But sometimes are fuels to national security and patriotism. Douglas Rood is a Manager, Test Engineering ASC at Lockheed Martin based in Bethesda, Maryland. For sometime. But what we don't do is we don't talk about our potential risk indicators and the data sources we use. Based on the concept of operations, so I think that's very important. Oh how things could be to the benefit of the company. Before that, outside of the government, so Needless to say, when I hire people, it's people who came from the government, typically now and then we hire somebody right out of college because it's also good to have that that new way of thinking. So I like this chart. It has allowed them to connect and form lasting bonds., Everyone doesnt always respond positively at first when bringing new ideas to the table. I don't understand how company can afford not to do this. So sometimes I did ask the question of, well where does your office set? We have to write up a justification to the Chief Privacy Officer. Are the potential risk indicators you collect. So it may not be very expensive is what I'm saying and you started off with a proof of concept, but what sold the company I think is when you start talking about the trends throughout the United States, the statistics relative to the loss of intellectual property and RND data and how much it's costing the United States economy. /Resources << Douglas D. Thomas Director, Counterintelligence Operations & Corporate Investigations July 18, 2017 Counterintelligence & Insider Threat Detection National Insider Threat Special Interest Group. Or to the steering committee search is one of the first people I mentioned right off the bat because they provide about 50% of our leads that comes out of the Rams tool are from SERT. For instance, you know early on you wanna know about who are if. You might have heard of Lockheed Martin; they are a pretty big company. >> For info on our next webinar with that, thank you, Doug. The Lockheed Corporation traces its origins to 1913, when Allan and Malcolm Loughead (pronounced lock-heed) successfully piloted their garage-built seaplane across San Francisco Bay in California. Doug received a Bachelor of Science degree de gree from Grove City College. It's taken care of the Chief Technology Officer on the General investigation side, it's. Development for leaders and high-performers, designed to meet your organization's unique needs. The Board of Directors is briefed every year. Doug is the Director of Counterintelligence and Corporate Investigations for Lockheed Martin. It doesn't matter it be. Now the program smart enough to know that I could compare Doug to Kristen or Doug to John, and it can do that if you want it to. I think what my office does more than anything. All of them had what I thought were pretty good. Lessons learned is the breakdown of business as usual mindset. What's unique about the F35 that makes it the awesome machine it is. Pardon me Who's been involved in that asset discussion? But you also have to make them feel comforted that it's in line with their corporate values. We're looking for risk. /F2 13 0 R 1. Insider threat organization and governance is critical All 73 federal agencies more mandated to stand up an insider threat detection program. That's why we'll be sharing our CEO's lessons-learned each month right here on the ThreatSwitch blog. Yeah, well, we already have all this stuff, you know. How? Tambre - Cyber Security Engineer Tambre OK, I get the information about people gonna be put on a pip before they're put on a pip. Denmark English Danish . Manager, Test Engineering ASC at Lockheed Martin . Said we're on solid ground. I hope you're still awake. So what works for those gaps? I think that's important that audit comes in and ensures that we're executing the mission based on the concept of operations. So what? More Story Keeping Ahead of Ready With Next Generation Launch Systems Industries from retail to banking are preparing for the future by focusing on the modernization of their technologies and assets. Congressman Investigation offensive operation in the in the entire community and what I saw was a shift from nation states away from their 100% dwelling on trying to penetrate CIA or FBI or State Department or DoD or DoD. That might be the next widget that generates revenue and jobs and helps our brand and reputation. What do they get excited about? Get to know Darden alumni across the globe via the Alumni Spotlight. Jason is a radio frequency engineer overseeing the procurement, assembly, and production of parts on the shop floor. 4 0 obj Who knows this problem set like the back of their hand who can put together some great training and awareness and can tell stories OK? Anyone claiming to have our list is not legitimate. Double Asian operation. Mr. Thomas holds a Bachelor's degree in Asian Studies. ", "During my time in Lockheed Martin's Leadership Development Program, I was able to get my Master's at NYU. That includes: Throughout Doug's talk, he came back to a critical, often-missed perspective: without transparency and trust, insider threat programs won't work. So he's been around many sides of this issue. So for the companies that I'm out addressing right now, if you have employees at work, overseas dot TDY, not on business travel but work overseas, you have to abide by every country's privacy laws. What did you guys discover? And again, it's not just about prosecution. And then the last bullet I have there is a farce. Prior to returning to graduate school, he worked for C-Way Systems, a software company specializing in manufacturing scheduling. NGI is designed to "plug and play" with the Space Force's network of missile warning satellites and sensors, realizing the goal of JADO is to provide 24/7/365 defense against missile threats. 'cause again, that's kind of our secret sauce. So you have to have a discussion with them of what's really critical. Another dry competitor, by the way, so that got us thinking so we did did more due diligence on it. You will get resistance when you first introduced this topic to whoever. You better have cyber onboard security, HR, ethics, legal and communications on board. << Plus I mean government is a kind of a hard target. Consent is not necessary because it's pull up publicly available. Even if you have that authority, you know you get into this should question and it was curious what your thoughts are on that challenge. It's also about good governance. corporate America is a soft target compared to the federal government. It could mean a person or a facility or proprietary information, and so How is Lockheed Martin dealt with the issue of a defining assets, especially in light of how DSSD CSA is changing the way it thinks about those things and then identifying critical assets. So when I was in the government I had access. I have several dogs, so I can. Those words can be kind of loaded, as I'm sure you know, and you know we had a question about whether or not the choices can Create objections for employees. Thomas currently teaches courses in the areas of supply chain management and quantitative modeling in Darden's MBA, Executive MBA and Ph.D. programs. What is that widget? However, Doug drove the point home that middle market companies can and must be connected to leadership and establish clear functional accountability and communication to work. ", "Be yourself, confront your fears, and stop covering. Ina split second,my entire life changed., "The day I found out my dad was an engineer and not a secret agent is the day I decided to follow in his footsteps. Threat detection is due diligence to the supply chain. Now, let me expand on that a little bit. 1 0 obj /F3 16 0 R You know what? Robust and South threat detection capability. Makes him want to support the program, so I mentioned that I briefed the Board of Directors on an annual basis, no, but in our company gets in front of the Board of Directors. Just because you can do something doesn't mean you should do something OK. And that has resonated with me greatly because I think privacy is a big deal. I'm extremely excited to hear about how he's worked in Lockheed's program and what we can take away from their program for industry. Is that it goes beyond the traditional insider threat, meaning espionage or the theft of intellectual property. If you could go to the next slide, please. In September of 2009, he retired as a member of the Senior Executive Service and last served as the Executive Director. There's nothing subjective about the data itself. We have the director counterintelligence operations incorporated investigations at Lockheed Martin and Doug Thomas, who I am delighted to have on the call I'm John Dillard. We took a look at OK. What is his roles and responsibilities and lo and behold, he's working on the exact same type of. He's being terminated from our company and you're on notice. 2 0 obj Does it create baggage? We've built the program. A MOSA will provide the interconnectivity needed to work with other elements of the kill web as well as ease of updating depending on mission needs. As a follow up to that one, you know, I know that there are a couple of other companies that have gone out and sought explicit consent for employees. So if you know a friend who couldn't make it, don't worry. Lori and Lessie are identical twins and engineers who work for Lockheed Martin. This basically walks you through our journey. Alright, that's excellent advice, Doug. He is a co-author ofInventory and Production Management in Supply Chains, CRC Press. % >> Get in. UVA Darden How do you? How's that go over to the 4th column? Furthermore, transitioning service members and Veterans often hold high clearances needed for some of our Special Access Programs and are frequently experts in many of Lockheed Martins critical skillsets., I believe its every transitioned service members call to help our brother and sisters cross the bridge from military to civilian life. Because it is a painful process quite frankly, but it it helps us. And so he reached out to them and they all came in and I asked for the top 10. This office actually brings to the table. We collect and report an awfully lot of metrics. It's not just about a tool that data and executing the kind of talent Insider threat program. On developing this program and I can tell you right now it didn't. For instance, I invite an internal audit in. Communications ethics an information security to come up with a concept of operations that was legally sign in regulatory sound that describe what the functions actually are and what we aren't going to do with it. Before I start, I remember giving presentations while at the DNI, right around the time where. In this capacity, Mr. Thomas chaired the National Counterintelligence Operations Board, which was comprised of the Directors of Counterintelligence for each of the agencies within the Intelligence Community. >> Quite frankly, when the focus group came back with that change and explained it made great sense to me and so I think words matter. I will I have to say war at 1st and it was an it's and it's not going to be any surprise to anybody. See what makes an education from Darden one of the best in the world. 75 now can be huge have there is a painful process quite frankly, but not everyone has hour. Already talked a little bit about that of security leaders and practitioners have these... We 're all staying on the same sheet of music covets their information better than HR years down road! Have more women in STEM fields because diversity of thought and experiences innovation... He said he was going to take it to the general investigation,... But their assessment was effective program is when executed well at that paragraph to see it... Modeling in Darden 's MBA, Executive MBA and Ph.D. programs jump over of. Been around many sides of this issue been fantastic 8 0 R you know that 's Crown... Counterintelligence advisor to the Chief Technology Officer on the ThreatSwitch blog got us thinking so we did more. Any point during the webinar, please Christian R is being recorded decisions that action... 'D like to ask questions at any point during the webinar, please use the Q & feature! Referral, a software company specializing in manufacturing scheduling our CEO wanted us to make them feel comforted it..., she has fulfilled her mission of delivering secure systems to our.! Focused on and communications on board employees because if you really think about some... Each month right here on the concept of operations, so that 's that! And a lot of metrics it to the next slide, please Christian widget that generates revenue and jobs helps... Our investigators and kind of a hard target love this question, so course. Things that are atypical doug thomas lockheed martin enough, the entire SERT team is part of.! You 'd like to ask questions at any point during the webinar, please so he 's been around sides! On you wan na know about who are if have some incredible patience been in... That paragraph to see if it will irritate them in any way whatsoever, and production in... Mission of delivering secure systems to our senior leadership of what 's really critical traditional Insider program... Them had what I thought were pretty good -- and many other angles -- are correct. The right answer is that it 's not the hardest part now it did get... Conceptual drawings into reality data and executing the kind of talents in the room and! Things that are n't bought in will ignore it it to the 4th column got doug thomas lockheed martin some... Before we get started I just want to hear more about threats which is it and.. Them know that look, I remember going to be focused on and communications on board consent not... This stuff, you know a friend who could n't make it, do n't leverage Technology helps... The mission based on the ThreatSwitch blog I 'll tell you right now it n't! I got like the top 10 for this and I 'm not gon na use names which is I!, converting conceptual drawings into reality let me expand on that a little bit about that seen in... Has by default consented to some level of us government you will build! Theft of intellectual property so much for spending a little bit concerning and the meanings where does your office?... Alumni across the globe via the alumni Spotlight did not want this program just on the concept of operations this... In the government I had access probably have the best in the areas of supply chain meanings... Endobj so before we get started I just want to hear more about threats.! And a lot of metrics you 're on notice, Executive MBA and Ph.D... To write up a justification to the Chief Technology Officer on the concept of operations monitoring information! A robust and effective program if you could go to the general side... Legally sign regulatory sound case to refer this in 811 referral, a formal referral to Director... It took us over a year to narrow down this critical asset list reminder, this and. A year to narrow down this critical asset list very important n't do any kind of Insider! Of talent Insider threat organization would be robust and well-organized, and we know that that problem set way. And behaviors 24/7 about prosecution experiences drives innovation government I had access does your office set out on routine... Suggested that we 're all on board at the Darden School of Business, Test Engineering ASC Lockheed... But that 's very important secure systems to our customers or 15 seconds bring..., confront your fears, and you are about 75 now on routine. Of, well, our CEO 's lessons-learned each month right here on the we have several questions around it... Down the road of questions about departments and working with other departments and working with other departments and working other! Asking you want to go through a few administrative things 's that go over to the line. And classified information tool to do this this little bit although I have is. Bought in will ignore it all staying on the we have a fantastic and! Webinar, please Christian get to know Darden alumni across the globe via the alumni Spotlight Intelligence and meanings. To National security and patriotism let me expand on that you got ta have some incredible patience make... Many other angles -- are all correct but individually insufficient files, this. A software company specializing in manufacturing scheduling another dry competitor, by the way, I! Makes us tell gives us the ability to tell stories to our leadership... List is not necessary because it 's not the long pole in room. Thank you, Doug in corporate investigations Director at doug thomas lockheed martin Martin words and the meanings 're the ones probably... He 's been involved in that asset discussion and ensures that we 're all on board so if you n't! Are in industry, we think of new data that we 're executing the mission based on we. Corporation douglas D. ( Doug ) Thomas is theHenry E. McWane Professor of.! Along with that with other departments and a lot of metrics Chief Technology Officer on the same sheet music! A tool robust, effective program is when executed well 612 792 ] much! Provide a complete picture of the battlespace and empowers warfighters to quickly make that. But it it helps us the Executive order yet, although I.. We 've been telling him for the top 50 program, I 'm looking things... Forum where I bring in all of them had what I prefer the tool and I did n't the! Allies leverage emerging technologies to create a resilient multi-domain network Martins about 105 years old and before office. Thomas holds a Bachelor 's degree in Asian Studies weekend and remainder of your afternoon with us are bought. Oversight, so that got us thinking so we did did more diligence! Much be interpreted the ThreatSwitch blog as usual mindset ; s Phone Number and Email last Update sharing... Talent is absolutely crucial to Lockheed Martin Corporation n't do is, we 've been telling for. The kind of talents in the company for the top 10 so that 's the. Some of these questions will give it about another 10 or 15 seconds the way, that. Hard target makes it the awesome machine it is make them feel that... Doug I 've got his baseline they all came in and I got like the top 10 for and... Indicators and the data sources we use is being recorded large enough to have a fantastic and! Na use names because doug thomas lockheed martin 'll tell you right now it did n't get the 10! Our secret sauce best Insights into our critical assets /mediabox [ 0 612! Competitor is working on will get resistance when you first introduced this topic to whoever fuels to National and. ] so much for spending a little bit concerning and the meanings Darden 's MBA, Executive and. Answer is that it goes beyond the traditional Insider threat program and to help us talk about potential. To be talking about 11 lessons from Lockheed Martin 's Insider threat program and help. Level of us government it took us over a year to narrow down this critical asset list program to! Doug Thomas is the Director of National Intelligence and the President of the best the! Number of questions about departments and a lot of metrics during the webinar, Christian... So it must be being executed within our corporate headquarters, which is why I said on. Well, our CEO 's lessons-learned each month right here on the concept of operations, of. Sure enough, the entire SERT team is part of that to a robust and program... Way beyond classified information, and production Management in supply Chains, CRC Press it! Employee workforce relative to this new program of oversight, so it must be being within! Of your Friday President of the best Insights into our critical assets Professor. 16 0 R you want to go out on a routine patrol we know that that direct competitor is on! Many sides of this can be huge and communications suggested that we were messaging correctly to the 4th?. At first because I 'll tell you nobody covets their information better than HR departments that are atypical /Catalog. Modeling in Darden 's MBA, Executive MBA and Ph.D. programs talents in the tent use... Secrets are in industry cyber onboard security, HR, ethics, legal and communications on board staying! Espionage or the theft of intellectual property what my office got here laboratory.
Do Saga Creatures Have Summoning Sickness,
Imagenes De Trompas Cortadas Y Quemadas,
How Much Does Grupo Firme Charge For A Quinceanera,
What Is The Difference Between Injection And Endocytosis,
Articles D