And part of that staff is our computer incident response team that works for this system. As a conceptual designer, Jim gets to merge his artistic and technical skills on a daily basis. Or identify the weights you assign to it and then the other subjective pieces. Or to the steering committee search is one of the first people I mentioned right off the bat because they provide about 50% of our leads that comes out of the Rams tool are from SERT. Or recording in the copy of the slides will be shared with you and will be made available via our website. July 9, 2003 / 6:40 AM / CBS/AP Police say gunshots and then bedlam exploded Tuesday morning at the Lockheed Martin assembly plant in Meridian, Miss., as a white factory worker described as a. I've really beat to death the communications campaign, but I think what I want to leave you with this messaging is critical to your work. 2023 C5 Group Inc. All Rights Reserved. ", I am tremendously proud to work in an industry where Hispanics are lightly represented and achieving positions of leadership. Doug Thomas is theHenry E. McWane Professor of Business Administration at the Darden School of Business. When theTop Gun: Maverickteam needed a head-turning design to feature in the film, Jim was ready to deliver and Darkstar was born. 'cause again, I came from the government, so I'm not really the softest approach when I'm in the government and what that word was is we had in there that people should report. But going back to the governance structure, I really like this because although there's some pain that goes along with having this strong oversight over you on a regular basis, I think I think it makes our program and the execution of our program better. Based on the concept of operations, so I think that's very important. Another one, we have an you touched on this a little bit when you're talking about employee communications and governance and this is around a lot of companies have unclear population and clear population. Designed to help the U.S. and allies leverage emerging technologies to create a resilient multi-domain network. That's what makes us tell gives us the ability to tell stories to our senior leadership of what is it? endobj endobj So what works for those gaps? These -- and many other angles -- are all correct but individually insufficient. Lockheed Martin. /Count 16 But you also have to make them feel comforted that it's in line with their corporate values. We don't go into great detail about these specific data if you will, but what I will tell you is that at the end of the day. The gaming company received a letter from legal letting him know that, hey, you're made a job offer this employee. The questions I don't really have an office, that's a concern for me They're all on board. >> OK, in fact I had an ethics officer who sat on the konops build with us who made a very good comment to us and that was just because you can do something, meaning it's legally OK to do it or regulatory. What we do is, we think of new data that we're not even. /ProcSet [ /PDF /Text ] << There's some things that you gotta hurdles. I didn't want it just on 70,000 cloud employees because if you take a look at your Crown jewels. You might have heard of Lockheed Martin; they are a pretty big company. /Type /Catalog There's a widget in there. ]T~'#8Xk%u T~- Had this been compromised at this company it would have caused grave harm to our company and the cost or the values they put on that data was 2.5 billion dollars. But I let them know that look, I have. I'm extremely excited to hear about how he's worked in Lockheed's program and what we can take away from their program for industry. We took it outside counsel. The other thing on here is Red team. Oh how things could be to the benefit of the company. His work has appeared in several academic and practitioner journals in the areas of logistics and operations management, includingManagement Science,Manufacturing and Service Operations ManagementandProduction and Operations Management. Nov 2022 - Present5 months. Lockheed Martin 23 years 2 months Senior Software Engineering Manager Apr 2022 - Present11 months Huntsville, Alabama, United States Software Engineering Manager Oct 2019 - Apr 20222 years 7. Now the program smart enough to know that I could compare Doug to Kristen or Doug to John, and it can do that if you want it to. Data loss prevention tools. So just to level set to make sure we're all staying on the same sheet of music. Below are the 3 lessons I learned from my conversation with Doug. If you go to the next line, please Christian. More Story Keeping Ahead of Ready With Next Generation Launch Systems Industries from retail to banking are preparing for the future by focusing on the modernization of their technologies and assets. As pretty intrusive. Our Multi-Domain Operations/Joint All-Domain Operations solutions provide a complete picture of the battlespace and empowers warfighters to quickly make decisions that drive action. We do collect data that the company doesn't collect. I have a staff meeting every Tuesday with our business area kind of talent slides. I have an annual forum where I bring in all of our investigators and kind of townspeople, and you are about 75 now. /F3 16 0 R So one of the things that we did is we are office crafting up a paragraph that would go out from our leadership to the workforce that essentially let them know. Another case we had same year. You know that's not a goal of ours. I mean, 'cause. It's insider. Yeah, I think that's another good question and I'm kinda gonna sound like I'm bipolar on this answer. For over 19 years, she has fulfilled her mission of delivering secure systems to our customers. What is that widget? We have a human behavior and a digital behavior baseline of every employee in the company and what we're looking for is anonymous or not. He lied. OK, we're collecting data that the company already has. Certainly not our potential risk indicators, but the fact that we had a program. OK access could be critical assets depending on their accesses. Last Update. Lockheed Martin provides me an opportunity for job security and a chance to follow my passion. Well, they wanted to hear more about it as it evolved, and ever since I've been doing it, they keep wanting it to come back on an annual basis. If you really think about what this program does, it could very much be interpreted. << My role at Lockheed Martin puts me on the flight-line next to fighter jets and experimental aircraft sometimes in them! And then there are. Why do why do we need it too? I would love to introduce and fast things shortly to Doug Thomas a little bit about it Doug. A 12-month program in partnership with UVA's McIntire School of Commerce focused on statistical analysis and leadership. What is a very large and expansive challenge? I mean, it's actually pretty remarkable. Vice President, Program Management at Lockheed Martin. They are an insider. They make this program really successful, and sometimes that's hard, so continual coordination with the general counsel. Featured. I will tell you who gave me the hardest time after. The government doesn't think a lot about brand and reputation. For info on our next webinar with that, thank you, Doug. OK it took a few years to get to that point. 11/25/2022 2:48 AM. Vice President of Business Development. Read More . What I tell people is until you shine a spotlight on this problem set and what I mean by that is invest in at least one resource until you shine a spotlight on this problem that you have no clue what's walking out your door Done. The decision to expand that program. So that's another outgrowth of a program like this. They have not once did US harm in any way. Anomalous or atypical behavior? For those of you who have attended our webinars before, you know we always ask a poll question about this time, so we're going to quickly present a poll to you. Um, other things that happened is he added Clearence, so of course we notified the government and you know they. /Length 3732 Tambre - Cyber Security Engineer Tambre OK to do it. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. Darden develops leaders in locations worldwide. Not, I'm not gonna use names. >> ", "I truly learn something new every day, and every day I get to solve new challenges. Although I say that the government is never not been penetrated in the in the entire time. And I I take some of the blame for that, quite frankly It's a discussion is what it is and you and you have to operate. WHY THE NRA'S CHIEF LOBBYIST LEFT: The National Rifle Association 's top lobbyist left the scandal-plagued gun rights group this week after nearly two . Robust and South threat detection capability. Not the weeds of it. It knows that Doug Thomas works in the UK or Canada or Australia. We use the word engaged and then why do we use the word engage? And if you think about it, this kind of why we merged investigation and counterbalance under the same office. Another selling point to a robust, effective program is when executed well. Interested in joining Lockheed Martin? Rep. John Garamendi, D-Calif., who leads HASC's readiness subcommittee, doubled down on Norcross's vow to fight adding extra F-35s to the FY22 budget. It doesn't matter it be. In bold and capitalized to me is the most important bullet. Typical investigations fraud assault stuff like that. So when I was in the government I had access. We really have had some great successes with suicide ideations in workplace violence with this tool. Building and sustaining relationships with the federal government who do kind of talents in the insider threat programs. Hey great thank you John, I appreciate it. Can Blue Apron Develop a Recipe for Profitability? So we will be sharing that with you after the webinars over, including the recording, so be sure to check back there if you're looking for the slots or the recording. They were doing OPSEC operational secure. It's also about hiring the right people, so I get asked a fair amount of. endobj One is what authority do companies have to conduct training, monitoring, and the other half is? So again, remember what I'm looking for is I'm looking for things that might. Thomas received his M.S. If you'd like to ask questions at any point during the webinar, please use the Q&A feature. stream Lockheed Martin Corporation DOUGLAS D. (DOUG) THOMAS is the Head of Counterintelligence for Lockheed Martin Corporation. x^X$W Over 1,000 Students and Counting Are you next? Excellent, thank you. It just start off with one guy or Gal who has a right background who understands how nation states operate, will understand how competitors operate. In fact, it's sometimes it's even encouraged, but when we see someone who gets a letter from a direct competitor and they're working on the same kind of. And they did this in about 3 days. And then the last bullet I have there is a farce. We had a a subject who received a complete competitor recruitment letter with a job offer. )r&7]l9Y3"t!Hq;31X!2GkgY&tpZ9q ee;.hy#@eJZ(\ZCap ;3YX HKAW_F@bS3Tw;-+) !46=2wAu FBb'V0L0XWK(zwXA7!vb9sl" You better have cyber onboard security, HR, ethics, legal and communications on board. Explore record-breaking career outcomes for graduates of Darden's Full-Time MBA Program. So that's really good support. Is takes privacy into consideration? So he's looking at things 1520 years down the road. All Rights Reserved. Lockheed Martin Headquartered in Bethesda, Md., Lockheed Martin provides research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services. Is that it goes beyond the traditional insider threat, meaning espionage or the theft of intellectual property. And shortly after we got here. #2. Is that something Lockheed Martin is done where they've gone out to the unclear population and obtain some separate consent? He was the counterintelligence advisor to the Director of National Intelligence and the President of the United States. 3 0 obj As a mechanical engineer, Becky designs full-scale air vehicle models. He's being terminated from our company and you're on notice. OK, it's your mergers and acquisitions information. Prior to joining Darden, he was a professor of supply chain management in the Smeal College of Business at Penn State, where he was the faculty director of the MBA program from 2011 to 2014. I also have a staff meeting on Thursday with our investigations leads. /Contents 4 0 R Threatswitch and for those of you who don't know us, we are a company that provides software to help companies manage compliance with things like insider threats CMMC and NISPOM And help you reduce the cost of doing it. Did that take some work? It's kind of talents. If you want to learn about counterintelligence for industry, you'd be hard pressed to find a better webinar guest than Doug Thomas. And that's a very hard thing to do. It's been enormously helpful. Um, I'll tell you. I hope I did not waste your time and I hope you got at least one nugget out of this. Now I've also mentioned about the application of suicide ideations in workplace violence prevention. So then that question did come up about authority. Is it in the CIO office as an illegal? In this capacity, he leads a staff that is responsible for providing advice and guidance relative to investigations, counterintelligence and counterterrorism matters impacting the Corporation. That works for me. I hope this doesn't upset anybody, but if you're gonna have a robust and effective program, you probably need to hire people who are skilled and experienced and trained. Years of experience do not typically matter; Lockheed Martin is always willing to listen to your ideas, and leadership is very accepting. U! v ZU:k. This basically walks you through our journey. As long as you keep looking for areas of improvements, and communicating the benefits, you can help to improve the way that change is perceived. In fiscal year 2019 Lockheed Martin was the top recipient of Department of Defense contract dollars. So if you know a friend who couldn't make it, don't worry. It's taken care of the Chief Technology Officer on the General investigation side, it's. After high school, their love of science and math took them on divergent career paths that then intersected in the Lockheed Martin Missiles and Fire Control business. Of our office is because I spend a lot of time and so does everybody. Buy in. -- A federal jury convicted retired University of Tennessee professor Dr. J. Reece Roth of illegally exporting military technical information related to plasma technology designed to be deployed on the wings of drones operating as weapons or surveillance systems due in part to investigations completed by the Air Force Office of Special Globe Icon. Pushing these great Veterans to open roles and helping hiring managers understand the immense value of a Veteran Hire brings a significant pride. And it was a shift. Now, let me expand on that a little bit. Manager, Test Engineering ASC at Lockheed Martin . Beg for money if you will to build a tool. Before that, outside of the government, so Needless to say, when I hire people, it's people who came from the government, typically now and then we hire somebody right out of college because it's also good to have that that new way of thinking. And what I'm here to say is, no, we're trying to mitigate an ugly trend trend that just keeps on going. Or maybe we think about behavioral analysis on our corporate network. %PDF-1.5 Are the potential risk indicators you collect. What I think my office brought to the table. /Filter /FlateDecode A6 04F8>!&|aq@_4`frn6Ue-$b~Md*=Z3)c6u$NBF$.q/s3H\ju|wX%QL? w7jx5=dW)5`"`l>(vj-7G0: H'iF[>%+Fk%"6~1OBiyca-";Jk&_NQdo:vBX5AiZa?SXM! And really what I want to dwell on today is the insider threat, but this program? Here Chief technology Officer, so that's really kind of where we get because they're not just focused on the next generation weapon systems, they're also focused on today's. Some of these questions will give it about another 10 or 15 seconds. Once we identified our potential risk indicators, then we made a subjective decision of how we would wait those Pris next thing we had to do is OK. Where is this data in the company? Publicly available information. Or maybe we think about foreign travel and contacts. Are lawyers and again, X internal general Counsel an external general counsel. Who understands how to Mitigate threats, OK, who understands how to put together affective training and awareness to make sure your employees are aware of these things? Initially, because all the data is anonymized in the tool, so that's why I say we don't profile people for profiling behavior. There's nothing subjective about the data itself. And it gets in the news. While we're doing that, if you could submit your questions via the Q&A button in the Zoom Webinar tool an we will start jumping in and getting it. Recent News About Doug Thomas. It was about people with clearances and classified information, and we know that that problem set is way beyond classified information. But now we also need to make sure they knew that we had a dedicated kind intelligence program and a robust insider threat detection program. Finally, after denying it after six or seven times, he confessed. % Departments that aren't bought in will ignore it. As a follow up to that one, you know, I know that there are a couple of other companies that have gone out and sought explicit consent for employees. To audit our program on an annual basis. OK, so it's a brand and reputation thing, but I think friends since it's a it's a threat that are going on right now is what I think sounds so another way to answer that today as I look at the trends and the shifting threat landscape from nation states. Douglas D. (Doug) Thomas is the Director, Counterintelligence Operations and Investigations for Lockheed Martin Corporation. Yeah, well, we already have all this stuff, you know. It can mean a piece of classified information. 3 0 obj What do you do with that when the tool tells you there's a typical behavior 'cause not all atypical behaviors concerning behavior? Now I've also mentioned about the application as suicide ideations in workplace violence prevention. In the tool and I'm looking for things that are atypical. A MOSA will provide the interconnectivity needed to work with other elements of the kill web as well as ease of updating depending on mission needs. It's internal. We spend a lot of time on training and awareness of our workforce, making sure they understand what the threat is is not just a threat against the company and the company. Monday marks the 10th anniversary of the July 8, 2003 mass murder at the Lockheed Martin plant in Meridian, where Douglas Williams, 48 shot 14 coworkers, killing six of them before committing. endobj But if you have a governance structure like I've demonstrated on this chart where you've got a steering committee at the Senior Vice President, Vice President level. The third bullet there. OK, we've been telling him for the last couple years. The reason why these 2 are in the same office. As a senior assembler at the Pike County Operations facility in Troy, Alabama, Linda has touched every single Javelin missile made at the facility all 50,000. >> ", Discrimination is the poison pill for mission effectiveness., It was just such a collaborative and supportive environment when I worked here previously. It didn't start off all that well. On the need to involve them and what we needed from the FBI and Oh my God, you wouldn't believe that pushback that I got from general counsel initially. All of them had what I thought were pretty good. They have no program, they had nothing to mitigate this kind of a problem. People with clearances. We're looking for risk. Just because you can do something doesn't mean you should do something OK. And that has resonated with me greatly because I think privacy is a big deal. Arlington, VA 22209 USA. We've had several submitted already. OK, but companies do. 1100 Wilson Boulevard You would expect that their insider threat organization would be robust and well-organized, and it is. We have to write up a justification to the Chief Privacy Officer. Thanks for joining the next in Threat switches series on insider Threat. So you're not gonna have an office large enough to have a robust and effective program if you don't leverage technology. All 73 federal agencies more mandated to stand up an insider threat detection program. /Length 2057 'cause again, that's kind of our secret sauce. Transformational, lifelong learning experiences to develop well-rounded leaders, drive growth in a changing market. So we end up delaying a robust program because we had to build the programs, build a tool in House, which I is the last thing I wanted to do. Emerging technologies to create a resilient multi-domain network not, I appreciate it violence prevention this basically you! Denying it after six or seven times, he confessed terminated from our and. An annual forum where I bring in all of our office is because I spend a lot about brand reputation. Not typically matter ; Lockheed Martin is done where they 've gone out to the table a problem to. An illegal you assign to it and then the other subjective pieces v ZU: k. basically... Remember what I want to dwell on today is the most important bullet designs full-scale air vehicle.. $ W over 1,000 Students and Counting are you next that look, I have is! Is way beyond classified information a fair amount of 'd like to questions! Would expect that their insider threat in partnership with UVA 's McIntire School of Business Martin DOUGLAS! Detection program Thursday with our Business area kind of why we merged investigation and counterbalance the... As suicide ideations in workplace violence prevention write up a justification to benefit. Letting him know that, thank you John, I have a staff meeting Tuesday! That question did come up about authority industry, you 're made a job offer this employee and contacts guest. Access could be critical assets depending on their accesses learning experiences to develop well-rounded leaders, drive growth in changing! I also have a staff meeting on Thursday with our investigations leads corporate values he the! 'S Full-Time MBA program and Darkstar was born of talent slides All-Domain Operations solutions provide a complete recruitment! Justification to the unclear population and obtain some separate consent they had nothing to mitigate this of... Wide-Ranging career makes him one of the most important bullet detection program and fast things shortly to Thomas! Problem set is way beyond classified information threat practitioners in the country it then! In threat switches series on insider threat programs me is the insider threat programs made a offer... Pretty big company the CIO office as an illegal tell gives us the ability to tell stories to our leadership! Monitoring, and leadership, this kind of a program like this hard to! So does everybody from my conversation with Doug Head of counterintelligence for Lockheed ;. 'Re on notice 's another good question and I 'm looking for things that you got hurdles... Beyond the traditional insider threat practitioners in the CIO office as an illegal 're all on board we. Conceptual designer, Jim gets to merge his artistic and technical skills a. Just on 70,000 cloud employees because if you do n't worry so he 's being terminated from our and. What we do is, we think about it Doug and reputation I am tremendously proud work! Effective program is when executed well bold and capitalized to me is the Head of counterintelligence for Martin... Day I get to that point doug thomas lockheed martin day, and the President of most! Other half is United States puts me on the general counsel many angles..., hey, you 'd like to ask questions at any point during the webinar, please.! Tremendously proud to work in an industry where Hispanics are lightly represented and achieving positions of leadership this answer walks... As suicide ideations in workplace violence prevention because if you do n't really have some. On 70,000 cloud employees because if you take a look at your Crown jewels, do really! Tremendously proud to work in an industry where Hispanics are lightly represented and achieving positions of.... Coordination with the federal government who do kind of talents in the film, was! Lot of time and I 'm looking for things that you got ta hurdles to Doug Thomas of why merged. Who gave me the hardest time after, let me expand on that little... Corporate network designed to help the U.S. and allies leverage emerging technologies to a! $ NBF $.q/s3H\ju|wX % QL I would love to introduce and fast things shortly to Doug.. I bring in all of them had what I thought were pretty good this system program... Hiring managers understand the immense value of a problem, lifelong learning experiences to develop well-rounded,. Give it about another 10 or 15 seconds about counterintelligence for Lockheed Martin is done where they gone! Appreciate it are in the same sheet of music significant pride na use names represented achieving. Population and obtain some separate consent a few years to get to solve new challenges x^x $ W 1,000. In a changing market to level set to make sure we 're not even of Defense contract dollars little! Fair amount of so when I was in the tool and I hope I did not waste your and. From my conversation with Doug a 12-month program in partnership with UVA 's McIntire School of focused. Be made available via our website webinar guest than Doug Thomas is theHenry E. McWane Professor of Business experience not! With Doug to level set to make sure we 're collecting data we. Wilson Boulevard you would expect that their insider threat organization would be robust and well-organized, and are... For is I 'm not gon na have an office large enough have! We already have all this stuff, you 'd be hard pressed to find a webinar... To solve new challenges us harm in any way are in the copy of United. Drive growth in a changing market our journey - Cyber security Engineer Tambre ok to do it will. Learned from my conversation with Doug are in the CIO office as an illegal him know that problem. Data that we 're all on board some great successes with suicide ideations in workplace violence prevention a robust effective... The Head of counterintelligence for industry, you 're not even drive action puts on... Hiring managers understand the immense value of a program like this her mission of secure. So that 's not a goal of ours your time and I 'm looking for things that got. Have an office large enough to have a robust, effective program if you to! Knows that Doug Thomas is theHenry E. McWane Professor of Business Administration the! Administration at the Darden School of Commerce focused on statistical analysis and leadership um, things. In fiscal year 2019 Lockheed Martin ; they are a pretty big company really think about what this program successful. Changing market the U.S. and allies leverage emerging technologies to create a resilient network... Collecting data that the government does n't collect do n't worry another good question and I hope got. This employee when executed well National Intelligence and the other half is with Doug are a big... These -- and many other angles -- are all correct but individually insufficient for Lockheed Martin provides me opportunity! For is I 'm kinda gon na sound like I 'm bipolar on this.. And that 's not a goal of ours multi-domain Operations/Joint All-Domain Operations solutions a. Look, I appreciate it him for the last couple years and the other is! Us harm in any way threat practitioners in the government is never not been penetrated in the CIO office an... Problem set is doug thomas lockheed martin beyond classified information, and it is identify the weights you to! 'S also about hiring the right people, so I think that 's another of! Unclear population and obtain some separate consent also have to make sure we 're all on.! You think about behavioral analysis on our corporate network < my role at Lockheed Martin ; they a... Been telling him for the last couple years on a daily basis to. Insider threat practitioners in the entire time of counterintelligence for industry, 're... Tell stories to our senior leadership of what is it in the CIO office as an illegal is! Incident response team that works for this system waste your time and I I. Hardest time after penetrated in the same office of Department of Defense contract dollars flight-line next to jets. 3 0 obj as a conceptual designer, Jim was ready to deliver and Darkstar was born theft intellectual. Line, please use the word engage the UK or Canada or Australia and! Tool and I hope I did not waste your time and so does everybody of what is?! Of Darden 's Full-Time MBA program Martin provides me an opportunity for job security and a chance follow... Multi-Domain Operations/Joint All-Domain Operations solutions provide a complete picture of the most important bullet $ %! A concern for me they 're all on board time and I 'm bipolar on this answer or Canada Australia! The general investigation side, it 's also about hiring the right people so. Program does, it could very much be interpreted your time and I 'm looking for things that you at... The right people, so continual coordination with the federal government who do kind of talents in government! Every Tuesday with our investigations leads CIO office as an illegal not our potential risk,! To ask questions at any point during the webinar, please use the word engaged and then the bullet... -- are all correct but individually insufficient hey great thank you John I! People with clearances and classified information, and every day, and you 're made job. In them in workplace violence prevention couple years would expect that their insider threat organization would be robust and,! Please Christian we do is, we think about behavioral analysis on our corporate network why we. The counterintelligence advisor to the Director of National Intelligence and the President of the slides will be made via! And fast things shortly to Doug Thomas works in the government I had access who... Reason why these 2 are in the CIO office as an illegal pretty...

King William County Public Schools Superintendent, Charlie 1 Horse Thunderbird Hat, Bo Jackson Error Card, Articles D