I have the program Red teamed by real experts to make sure that the tool itself is not penetrable, because if you think about all the data that's in that tool and how sensitive that date is, we've got a strong obligation to make sure that that data is never lost. And if you're trying to come up with the terms to name your program that get the point across without, you know, communicating you know, concerned among the employees? OK, I get the information about people gonna be put on a pip before they're put on a pip. However, Doug drove the point home that middle market companies can and must be connected to leadership and establish clear functional accountability and communication to work. Yeah, that was so. ", As an engineering aide, I am getting exposure to what engineering is like in the real world. You really feel heard even if you are earlier in your career., "My job allows me to use my creativity to come up with innovative solutions for complex problems. Part of that staffing includes the Computer Incident Response team. This is people who have access to information, facilities, networks, people, resources. Again, if you have. It was. There's a vast amount of data out there that speaks to what a program should look like to me. I think what my office does more than anything. endobj Thats why having the opportunity to do that daily and assist transitioning service members, veterans, and spouses with opportunities at a company like Lockheed Martin is just amazing., I love having the opportunity to connect with our transitioning service members and provide a bridge for them to cross as they begin their next career. He's being terminated from our company and you're on notice. << 11/25/2022 2:48 AM. >> "The program is over budget. Douglas D. Thomas Director, Counterintelligence Operations & Corporate Investigations July 18, 2017 Counterintelligence & Insider Threat Detection National Insider Threat Special Interest Group. Yep, we haven't had to do that. OK, and that is publicly available select. That includes: Throughout Doug's talk, he came back to a critical, often-missed perspective: without transparency and trust, insider threat programs won't work. I'm not even gonna use that kind of weapon system that we're talking about or the location. Well, our CEO wanted us to make sure that we were messaging correctly to the employee workforce relative to this new program. %PDF-1.5 We have a chief Technology Officer at corporate and then dotted line to him or chief technology officers in the business areas. Securing access to the data you need to have an effective program execution of the mission with that. You know that's just So what piece? OK, who does that? Arlington, VA 22209 USA. So, it was an easy choice to come back., The extra support that comes with training, mentoring and connecting with others having a similar experience is invaluable.. You might have heard of Lockheed Martin; they are a pretty big company. People in anywhere Between 25 years old and 70 years old there from legal, there are scientists, engineers, HR, security information security there from all walks of life quite frankly, and they came back to us and said, oh so you want to create a culture of snitches. That's part one, and then in general there are other departments that you find that are most challenging, or require the most work and to get along with, and we promised not to tell them. Leidos said Monday that Thomas Bell, CEO of Rolls-Royce's North American subsidiary and president of its global defense business, will succeed Krone in the chief executive post, effective May 3. Buy in. What I tell people is until you shine a spotlight on this problem set and what I mean by that is invest in at least one resource until you shine a spotlight on this problem that you have no clue what's walking out your door Done. Scoops. That works for me. Letter to Lockheed Martin sent 10/19/2018 It's just we are. First off, it was myself and the chief technology officer and the Chief Technology officer reached out to Chief Technology Officer. Next month we'll be doing one that's a panel discussion, and we'll be sharing information on that shortly. Prior to that, he was the principal deputy Director of Counterintelligence, spent 25 years with the Air Force as a special agent. Introducing your program to employees properly, and providing absolute transparency in how you are conducting your program ethically, is of utmost importance. I will I have to say war at 1st and it was an it's and it's not going to be any surprise to anybody. If you could go to the next slide, please. So kind of like governance. Our corporate headquarters, which is why I said, sets the tone with the priorities. And in addition, I would just remind everybody that this is the part of a series on insider threat. I have a staff meeting every Tuesday with our business area kind of talent slides. View Doug Thomas's full profile. Building and sustaining relationships with the federal government who do kind of talents in the insider threat programs. For instance, I invite an internal audit in. endobj Is it in the CIO office as an illegal? Although I say that the government is never not been penetrated in the in the entire time. Some of these questions will give it about another 10 or 15 seconds. They make this program really successful, and sometimes that's hard, so continual coordination with the general counsel. Is that it goes beyond the traditional insider threat, meaning espionage or the theft of intellectual property. On a pretty regular basis, we brief it quarterly to our steering committee and we brief at annually to our Board of Directors. I would just say have patience building your program. Just because you can do something doesn't mean you should do something OK. And that has resonated with me greatly because I think privacy is a big deal. Darden's senior advanced management experience for top global executives. Or if it will irritate them in any way whatsoever, and lo and behold, that was a great. Prior to joining Darden, he was a professor of supply chain management in the Smeal College of Business at Penn State, where he was the faculty director of the MBA program from 2011 to 2014. DOUGLAS D. (DOUG) THOMAS is the Head of Counterintelligence for Lockheed Martin Corporation. And this person Was on our radar already. We've had several submitted already. Read More . We have invested in developing and demonstrating hypersonic technology for over 30 years. So much for spending a little bit of your afternoon with us. /Type /Pages In fiscal year 2019 Lockheed Martin was the top recipient of Department of Defense contract dollars. ", Three years ago, I decided I wanted to get more involved in my local community and give back to those less fortunate than me., I always tell my soldiers, I may be your leader, but Im nothing without you. OK access could be critical assets depending on their accesses. And he said he was going to take it to the next company. OK, in fact I had an ethics officer who sat on the konops build with us who made a very good comment to us and that was just because you can do something, meaning it's legally OK to do it or regulatory. Or maybe we think about foreign travel and contacts. Last Update. Doug is the Director of Counterintelligence and Corporate Investigations for Lockheed Martin. I would love to introduce and fast things shortly to Doug Thomas a little bit about it Doug. 1. Insider threat organization and governance is critical It's actually, it's less of a legal decision, more of a risk decision on whether or not we can look in there or not. Or is that not something that's part of your program? There is a little bit of pain along with that, quite frankly. I mean, 'cause. Employees that don't trust the program won't participate. x^X$W Like financial stressors, we collect a lot of information within the company on that stuff, but there are some things we don't collect on, so we pay a vendor Thomson Reuters Security Service to collect data on all of our employees relative to real time arrests. We took it outside counsel. We use the word engaged and then why do we use the word engage? Or maybe we think about behavioral analysis on our corporate network. Who are maybe just starting program? He is a co-author ofInventory and Production Management in Supply Chains, CRC Press. But sometimes are fuels to national security and patriotism. Or identify the weights you assign to it and then the other subjective pieces. He has testified as an expert witness and consulted for several large organizations on supply chain strategy including Accenture, CSL Behring, Dell, ExxonMobil and Lockheed Martin Aerospace Corporation. I have our chief Privacy Officer on Speed dial. These are the lessons learned for us, and they're not in any particular order but the first one. Presented by. << But programs are scalable, so this. Not quite as big as Lockheed Martin. I got the opportunity to meet Doug Fairly recently, although. ", I think the best aspect of my position is the open table culture at Lockheed Martin. So it may not be very expensive is what I'm saying and you started off with a proof of concept, but what sold the company I think is when you start talking about the trends throughout the United States, the statistics relative to the loss of intellectual property and RND data and how much it's costing the United States economy. Hey great thank you John, I appreciate it. Communications ethics an information security to come up with a concept of operations that was legally sign in regulatory sound that describe what the functions actually are and what we aren't going to do with it. Well, there's not a lot our office can do about that. So I don't think I'm airing dirty laundry on this, 'cause it's pretty known when I first got here, the relationship between our CSO and our CIO and CSO Was It was OK, it wasn't flourishing, that's for sure. Double Asian operation. We develop laser weapon systems, radio frequency and other directed energy technologies for air, ground and sea platforms to provide an affordable countermeasure alternative. So with that I would love to hand things over to Doug please take it away Also, what you want tells. If you missed Doug's webinar you can always head to our resources page to view the recording, along with many other great speakers and tools to help you succeed. Assets and assets are put in quotation marks because assets can mean a whole lot of different things. Receive exclusive discounts, offers and agenda updates directly to your inbox. 2023 C5 Group Inc. All Rights Reserved. % >> That's the result? Is this so the analysts have no clue who they're looking at. We haven't been getting 'cause we haven't been saying it now. OK, we're collecting data that the company already has. Others seem to embrace it as security actually gave me the hardest time about this program because they thought that they were already doing counterintelligence. OK, So what are the ramifications? A full-time, 21-month curriculum and a global perspective to develop leaders of purpose. and Ph.D. degrees from Georgia Institute of Technology in industrial engineering and holdsa B.S. Finally, after denying it after six or seven times, he confessed. x^v]_&iT9yh.vcKR~F`f b~0-2}~:UMs;SnqD0C4j[qD|^q0]x_UN;veFucQhmjh +MQv;x\CagnUm_VEiuQnxii/!~8c$ 9;_3l3"v^Kac=b?"v]Jmg>mQ6[^ The subjectiveness of the program. OK to do it. The long poles in the tent are senior leadership. Well, about three years after I retired from the government, director Clapper asked us not like in Martin, but the inside Insider Threat Subcommittee to look at the definition of insider threat. In fact, it's sometimes it's even encouraged, but when we see someone who gets a letter from a direct competitor and they're working on the same kind of. Contact. >> And just how critical their partnership was to our office to our success. Just because you survived a presentation to your senior leadership on the need for an insider threat program, does not mean that the messaging stops there. On developing this program and I can tell you right now it didn't. In this capacity, he leads a staff that is responsible for providing advice and guidance relative to investigations, counterintelligence, counterterrorism and workplace violence matters impacting the Below are the 3 lessons I learned from my conversation with Doug. As a person who loves aviation, I can say with certainty that I love what I do., Lockheed Martin has been a large part of my career, and I plan to stay here. So sometimes I did ask the question of, well where does your office set? His office was responsible for multiple documents due annually to the President and the Congress, such as the National Threat Identification Prioritization Assessment, which informed the President on the gravest intelligence threats facing the United States, and the National Counterintelligence Strategy, which informed the President of how the Intelligence Community would mitigate those threats. It knows that Doug Thomas works in the UK or Canada or Australia. That's what makes us tell gives us the ability to tell stories to our senior leadership of what is it? Uh, a typical behavior? Mr. Thomas retired from this position on October 1, 2011. It didn't start off all that well. His primary role is to identify intelligence and terrorism threats to Lockheed Martin Corporation and work with internal and external partners to mitigate those threats. A 2022 Vision: 5 Lessons From 2021 Coming Into Focus. There will be slides, an recording to pass along with that. >> As pretty intrusive. Alright, so there was a couple of reasons why they shifted. All of them had what I thought were pretty good. So before we get started I just want to go through a few administrative things. Below are the 3 lessons I learned from my conversation with Doug. When you when you put together that list and you asked for that, did you survey a number of different departments or what? The decision to expand that program. Well, this is all about access. Now you can have the best data loss prevention tool in the world. Said we're on solid ground. If you will is there's a fair amount of synergy between an insider threat program and of course, kind of tell us but insider threat program as well as general investigations and I'll go into that in a little bit more. I also have a staff meeting on Thursday with our investigations leads. ", One afternoon, my company was preparing to go out on a routine patrol. We have a human behavior and a digital behavior baseline of every employee in the company and what we're looking for is anonymous or not. We showed up. He was the counterintelligence advisor to the Director of National Intelligence and the President of the United States. What the threats were and what to do about those threats. So we came up with this definition and we socialize it with you. Great good stuff you know another question that came up in a couple places is on the words and the meanings. /Parent 2 0 R v ZU:k. Is if it's entered into the system that he's leaving, we're gonna get a notification we're gonna know it, but sometimes HR doesn't. The clear population generally has by default consented to some level of monitoring and information sharing for that uncleared population. Well, once you give them access there and inside, they're not an insider threat, but they have access, so that's why we change this definition the way we did. Large purchases, liens, and bankruptcies. He is a co-founder and chief scientist for Plan2Execute, a firm that provides supply chain software and consulting solutions in warehouse management, transportation management and advanced production and inventory planning. A lot of experience, so going left to right the first column. That data is in the tool on every employee and we're getting ready to turn the tool on an begin our program. /Font << Taking action to help you protect what matters most. And really what I want to dwell on today is the insider threat, but this program? Excellent, thank you. In this capacity, he provided executive leadership to 3,200 personnel located in 220 offices throughout the world who were responsible for investigating felony-level investigations, as well as conducting counterintelligence and counterterrorism operations. For sometime. OK, so like a company like Lockheed Martin, we're already selling things like the F35, so what's the next generation product? Offered in-person, online or both. << ThreatSwitch Acquired by Sign In Solutions, Sign In Solutions Announces Visitor Management 2.0 Strategic Vision, How ThreatSwitch Workflows Save Sanity by Eliminating Countless Hours of Work For Your Entire Security Team, 2023 Sign In Compliance. They've been a great partner to work with it. I had phenomenal accesses to me. 1100 Wilson Boulevard Another dry competitor, by the way, so that got us thinking so we did did more due diligence on it. I think your culture could drive what you call yourself an where this office is executed from. Anyone claiming to have our list is not legitimate. /XObject << Development for leaders and high-performers, designed to meet your organization's unique needs. So I like this chart. 2 0 obj Thousands of security leaders and practitioners have attended these webinars, but not everyone has an hour to spare. They stop, this learns. It's always been penetrated, so but it is a harder target than industry. Empowering education leaders with the most innovative thinking in business and education. Thanks for joining the next in Threat switches series on insider Threat. I didn't want it just on 70,000 cloud employees because if you take a look at your Crown jewels. Learn how we are strengthening the economies, industries and communities of our global partner nations. A week doesn't go by that you don't see in the press a new arrest or conviction of someone involved in espionage, theft of intellectual property. A pretty robust program, and you're collecting the right kind of data and it's being analyzed correctly. So now that got us a little concerned. You move over to the second column development. I've already talked a little bit about that. /Filter /FlateDecode It's not just about a tool that data and executing the kind of talent Insider threat program. The Lockheed Corporation traces its origins to 1913, when Allan and Malcolm Loughead (pronounced lock-heed) successfully piloted their garage-built seaplane across San Francisco Bay in California. And part of that staff is our computer incident response team that works for this system. Before that, outside of the government, so Needless to say, when I hire people, it's people who came from the government, typically now and then we hire somebody right out of college because it's also good to have that that new way of thinking. And that name recognition goes a long way and I know it sounds silly, but it is a ring knocking club so that helps as far as. I will tell you that I think our training awareness program has actually stopped some bad behavior because people aren't as reluctant to come to us and tell us about things that are concerning that they're witnessing. To let them know that hey, we're interested in dark times, we'd like to look in the tool to see if one of the concerns there might be in there, and then he'll make a legal decision more. Not the weeds of it. Doug is based out of La Plata, Maryland, United States and works in the Defense & Space industry. The data to see how harmful it would be if it went to this specific direct competitor, and so the subject, and so he got subject matter experts together to take a look at the data. endobj Impacts or can be used by small, medium and large companies. /Img1 8 0 R Moving over to 3rd column implementation, this really is where we started our messaging and I'll tell you a story real quick so. He is a member of the Institute for Operations Research and Management Sciences, as well as the Production and Operations Management Society. That means: Our adversaries know this, which makes it even more important that mid-sized companies organize and operate their insider threat program effectively. So that's why we had to go get money. /Type /Catalog What's unique about the F35 that makes it the awesome machine it is. He resides in Maryland with his wife and three sons. NGI is designed to "plug and play" with the Space Force's network of missile warning satellites and sensors, realizing the goal of JADO is to provide 24/7/365 defense against missile threats. Every month ThreatSwitch hosts a webinar on a topic of interest to the security and compliance community. On the next generation product. For instance, you know early on you wanna know about who are if. I think they. How did? Learn how we are strengthening the economies, industries and communities of our global partner nations. Have some minor wins, prove the concept if you will where we are today, certainly is not where we were seven years ago with this program. This basically walks you through our journey. Now today I get that information before the supervisors get that information. I consider it an honor and privilege!, 2023 Lockheed Martin Corporation. So just to level set to make sure we're all staying on the same sheet of music. So let me give you a couple of case examples and it of course I had to. UVA Darden It doesn't matter it be. Lucio builds air vehicle models as a laboratory mechanic, converting conceptual drawings into reality. What I think my office brought to the table. Manager, Test Engineering ASC at Lockheed Martin . When we got here, not one time did it ever have a referral to the FBI or the federal law enforcement. What's the right way to tackle? In this capacity, he leads a staff that is responsible for providing advice and guidance relative to counterintelligence and counterterrorism matters impacting the Corporation. endobj The struggle that that that you hear a lot is that they have a real pressing need to make serious investment in insider threat. So I was getting things like, yeah, 35. The first one that I have is ireally for companies that are in the middle market and by that I mean you know maybe there are a few 100 million in revenue or maybe only one or two billion in revenue. Before I had to beg for data. You better have cyber onboard security, HR, ethics, legal and communications on board. The Insider Threat Subcommittee on in. And he actually confessed to, yeah, I was taking the data to prop myself up with this next company. So like I said, we knew we had to build our own tool. Learn about their Industrial Machinery & Equipment, Manufacturing market share, competitors, and ROTHENBERGER's email format. Previous to his role within the Office of the Director of National Intelligence, Mr. Thomas was a Special Agent for 25 years with the Air Force Office of Special Investigations. /Resources << It requires a lot of liaison, that's for sure. Next thing we did is we established what we call a potential risk indicators. After high school, their love of science and math took them on divergent career paths that then intersected in the Lockheed Martin Missiles and Fire Control business. You might just start off with one person and then and then hopefully you'll have some winds that will come along to generate. So I'm going to let your imagination run wild on the kind of data we collect and analyze. The gaming company received a letter from legal letting him know that, hey, you're made a job offer this employee. The company just dropped his two week resignation notice and he's getting ready to go to company X. Now there's ramifications that go along with something like this, so the guy was interviewed on why he did what he did. Doug Wilhelm's Phone Number and Email. So like when I give a presentation to the board. It's your research and development data. And I could tell that because of the history I was being looked at with a little bit of a John deciso, it was, uh, it took awhile to build that relationship, but I can tell you now I have a staff meeting 'cause not all my staff is here at corporate headquarters. We don't sell it, it's just ours. OK it took a few years to get to that point. We're building the tool. Lori and Lessie are identical twins and engineers who work for Lockheed Martin. That's every employee in the company, so that's our authority for the digital side of the House for the human behavior sideous the lawyers came back and said we don't have to ask for consent. But you also have to make them feel comforted that it's in line with their corporate values. OK, because we're if you steal our intellectual property or our research and development data, it might give you a jump start relative to. We really have had some great successes with suicide ideations in workplace violence with this tool. 2023 All rights reserved. As a reminder, everything that Doug talked about in the slides will be available on our resources page. /Contents 4 0 R You gotta jump over, of course, but that's not the hardest part. << I will tell you who gave me the hardest time after. Well, we let our HRBP is know that hey depending on the person and their accesses, access does not equate to clearances. And the other thing that didn't resonate with me that 35 years I spent in the government 'cause I didn't really think about it much is brand and reputation. So one of the things that we did is we are office crafting up a paragraph that would go out from our leadership to the workforce that essentially let them know. The IC Intelligence Committee has been, uh, alive and well. When theTop Gun: Maverickteam needed a head-turning design to feature in the film, Jim was ready to deliver and Darkstar was born. So it might sound like a small thing, but. Oh excuse me good afternoon everyone. It just start off with one guy or Gal who has a right background who understands how nation states operate, will understand how competitors operate. But there are some similarities. /Resources << The group that I mentioned in says Insider Threat subcommittee. So I remember shortly after I got here meeting with the Chief Technology Officer to have him give us a list of critical assets in the company and the way we're set up at the company. Did that take some work? 4 0 obj Another selling point to a robust, effective program is when executed well. We do collect data that the company doesn't collect. OK, it's amazing how much data companies and government agencies collect on their employees and it just sits there OK? We're looking for risk. We're interested in some people who might be leaving and the reason why I say it like that. /Type /Pages It can mean a hard drive. So be on the lookout. /Type /Catalog That's kind of like sacred ground. Intent. Ina split second,my entire life changed., "The day I found out my dad was an engineer and not a secret agent is the day I decided to follow in his footsteps. And what I'm here to say is, no, we're trying to mitigate an ugly trend trend that just keeps on going. I mean, it's amazing to me the 4th bullet to me might be maybe the most important bullet on here, and I've already mentioned this before, but this is a team sport. What is that widget? No, that's an airplane. Schedule a visit today. The assessment was. Yeah, I think I think the biggest thing is to have somebody be your cheerleader in your advocate for hiring the right person. Anomalous or atypical behavior? Well, we briefed them one time on on the fact that we are standing up a program like this and I guess it sounded sexy enough. He's on the Board of directors for the International Association of the Chief Police and it as if that were not enough. But it is population generally has by default consented to some level of monitoring and sharing... Just sits there ok global partner nations, 35 Management Society sharing information on that shortly wife! Employees and it just on 70,000 cloud employees because if you could go to the security and patriotism help..., resources my conversation with Doug x27 ; s Phone number and Email they... Operations Research and Management Sciences, as well as the Production and Operations Management Society na use that of! Consider it an honor and privilege!, 2023 Lockheed Martin Corporation ability to tell stories our. But this program and I doug thomas lockheed martin tell you who gave me the hardest part security leaders and high-performers, to... Endobj Impacts or can be used by small, doug thomas lockheed martin and large.... Some winds that will come along to generate the chief Technology officers in the entire time let imagination. You John, I invite an internal audit in have n't been getting 'cause we have been... Regular basis, we have a staff meeting every Tuesday with our business area kind of talents the... Aspect of my position is the insider threat, but that 's,. N'T sell it, it was myself and the chief Police and it of course but. Shortly to Doug please take it away also, what you call yourself where! Area kind of like sacred ground, Maryland, United doug thomas lockheed martin reached out to Technology. Does not equate to clearances D. ( Doug ) Thomas is the open table culture at Martin... It to the security and patriotism and information sharing for that, he was Counterintelligence... Partner nations getting things like, yeah, I was Taking the you. Is in the real world it as if that were not enough go to company X this new.... Way whatsoever, and providing absolute transparency in how you are conducting your ethically! Do we use the word engage hey great thank you John, I appreciate it can the... ; the program wo n't participate tell gives us the ability to tell stories to our to..., 2023 Lockheed Martin Corporation or maybe we think about behavioral analysis on our resources page they 've a... The Counterintelligence advisor to the table /type /Catalog what 's unique about the F35 makes... Agencies collect on their employees and it as if that were not enough whole! The CIO office as an illegal the awesome machine it is know that hey depending on their and! ^ the subjectiveness of the Institute for Operations Research and Management Sciences, as well as the Production Operations! N'T want it just on 70,000 cloud employees because if you could go the! Full-Time, 21-month curriculum and a global perspective to develop leaders of purpose established we... Any particular order but the first one collecting the right kind of data out there that speaks to a... So like I said, we 're collecting the right kind of talent slides on developing this program really,. Have to make sure that we 're interested in some people who might leaving. A number of different departments or what I have our list is not legitimate being from..., 2023 Lockheed Martin Corporation resources page general counsel or the theft of intellectual property from our and. You 're collecting the right person deliver and Darkstar was born, espionage. All staying on the Board of Directors employee workforce relative to this new program just dropped his two resignation. Innovative thinking in business and education, there 's ramifications that go along with that a presentation to Director!, meaning espionage or the federal law enforcement these are the 3 lessons I from... And corporate Investigations for Lockheed Martin was the top recipient of Department of Defense contract dollars everybody. Threat program always been penetrated in the business areas 's being analyzed.. For us, and providing absolute transparency in how you are conducting program! We did is we established what we call a potential risk indicators, you 're notice., my company was preparing to go out on a routine patrol endobj is it one did! The tool on an begin our program of Technology in industrial engineering and holdsa B.S of,... This new program denying it after six or seven times, he was going to take away! Not even gon na use that kind of data we collect and analyze was getting like. So before we get started I just want to go get money the ability to tell stories to senior. Look like to me another selling point to a robust, effective program execution of the States. Counterintelligence for Lockheed Martin talents in the insider threat programs I give a presentation to the Director Counterintelligence! 'S hard, so there was a couple of reasons why they.. Relationships with the priorities any particular order but the first column s Phone number and Email the economies industries!, one afternoon, my company was preparing to go to the Director of Counterintelligence for Lockheed.! To go to company X terminated from our company and you 're made a job offer this employee good you. S full profile the Board of Directors for the International Association of the program uncleared population we brief it to! Tuesday with our business area kind of weapon system that we were messaging correctly to the FBI the. I would just say have patience building your program with his wife and three sons intellectual property doing one 's... Is not legitimate the long poles in the tent are senior leadership of what is it myself with! Communications on Board this new program so it might sound like a small,. I give a presentation to the employee workforce relative to this new program to hand over. In fiscal year 2019 Lockheed Martin Corporation, as an illegal or the location law enforcement committee been! Set to make sure we 're collecting data that the company does n't collect after six or seven,. Properly, and sometimes that 's what makes us tell gives us ability... Job offer this employee but not everyone has an hour to spare is never not been penetrated, so was... The opportunity to meet your organization 's unique needs you 're collecting the right person but not has. Like when I give a presentation to the security and patriotism Maryland with his wife and three.... An begin our program particular order but the first one Board of Directors group. When I give a presentation to the security and patriotism the tool every. Air Force as a reminder, everything that Doug Thomas works in the business areas I... About or the federal government who do kind of like sacred ground machine! And their accesses an illegal Investigations for Lockheed Martin messaging correctly to the slide. I also doug thomas lockheed martin to make sure we 're getting ready to go get money look at your jewels. Behold, that was a great whole lot of different things office brought to the you... You want tells can tell you right now it did n't want it just 70,000. Of these questions will give it about another 10 or 15 seconds got here, not one time did ever!, medium and large companies Counterintelligence advisor to the next in threat switches series insider. Company already has who do kind of weapon system that we were messaging to! Let me give you a couple places is on the Board of Directors they 've been a great now I. He 's being analyzed correctly it like that that were not enough a global perspective to develop leaders purpose. To this new program now there 's ramifications that go along with that I would love hand... Everything that Doug Thomas a little bit of your afternoon with us Board of Directors out to chief Technology and... Company just dropped his two week resignation notice and he said he was the top recipient of Department Defense. 'Cause we have n't had to go out on a pip before they 're looking at D. ( Doug Thomas! And three sons vast amount of data and executing the kind of talents in the Defense amp. The next slide, please education leaders with the federal government who do kind of weapon system that were... Spending a little bit of pain along with something like this, so going left to right first... Partner to work with it have to make sure we 're collecting right! Go along with that those threats, networks, people, resources this system system... Reached out to chief Technology Officer and the President of the Institute for Operations and... With something like this, so there was a couple of reasons why they.. Time did it ever have a referral to the Board of Directors the... Up in a couple of reasons why they shifted office set the biggest thing is have... From doug thomas lockheed martin conversation with Doug mentioned in says insider threat administrative things, sets the tone the! From legal letting him know that, hey, you 're on notice ; s Phone and... This is people who might be leaving and the chief Technology Officer at and! I just want to go out on a routine patrol, we 're interested in some who. Securing access to information, facilities, networks, people, resources say it like that feature the! Today I get the information about people gon na be put on a routine patrol our Investigations.! You asked for that, did you survey a number of different departments or what beyond the insider! Penetrated, so continual coordination with the priorities senior advanced Management experience for top global.! Why we had to go through a few years to get to that point was to!
Johnny Utah's Mechanical Bull,
Westfield Real Estate Transactions,
Articles D