It's taken care of the Chief Technology Officer on the General investigation side, it's. Learn about their Industrial Machinery & Equipment, Manufacturing market share, competitors, and ROTHENBERGER's email format. Based on the concept of operations, so I think that's very important. So today the answer. Yeah excellent yeah number of questions about departments and working with other departments and a lot of large programs. A 2022 Vision: 5 Lessons From 2021 Coming Into Focus. Lockheed Martin 23 years 2 months Senior Software Engineering Manager Apr 2022 - Present11 months Huntsville, Alabama, United States Software Engineering Manager Oct 2019 - Apr 20222 years 7. It always keeps me on my toes. In partnership with the Top Gun team, Becky was responsible for building the Darkstar vehicle, incluing a forebody model with a functional cockpit for an iconic actor. /Contents 4 0 R Here Chief technology Officer, so that's really kind of where we get because they're not just focused on the next generation weapon systems, they're also focused on today's. Gave two weeks notice and we've done a very good job of training awareness to the workforce, especially people like HR business Partners, because they see and hear everything, it seems like. Is that something Lockheed Martin is done where they've gone out to the unclear population and obtain some separate consent? Click here to see the career opportunities in your area. What is a very large and expansive challenge? Put a red flag on it. Before I had to beg for data. x^v]_&iT9yh.vcKR~F`f b~0-2}~:UMs;SnqD0C4j[qD|^q0]x_UN;veFucQhmjh +MQv;x\CagnUm_VEiuQnxii/!~8c$ 9;_3l3"v^Kac=b?"v]Jmg>mQ6[^ Prior to joining Darden, he was a professor of supply chain management in the Smeal College of Business at Penn State, where he was the faculty director of the MBA program from 2011 to 2014. And in addition, I would just remind everybody that this is the part of a series on insider threat. Relative to the Insider Threat program, is this. Recruiting military & Veteran talent is absolutely crucial to Lockheed Martin. Now, let me expand on that a little bit. Leidos said Monday that Thomas Bell, CEO of Rolls-Royce's North American subsidiary and president of its global defense business, will succeed Krone in the chief executive post, effective May 3. Is it in HR? Doug Wilhelm's Phone Number and Email. As long as you keep looking for areas of improvements, and communicating the benefits, you can help to improve the way that change is perceived. Uh, a typical behavior? /Count 16 Thomas currently teaches courses in the areas of supply chain management and quantitative modeling in Darden's MBA, Executive MBA and Ph.D. programs. We really have had some great successes with suicide ideations in workplace violence with this tool. That's about 1000 things on there. As a follow up to that one, you know, I know that there are a couple of other companies that have gone out and sought explicit consent for employees. They stop, this learns. A frequent faculty leader in executive development programs, he has led numerous Executive Education sessions in Africa, Asia, Europe and North America, including programs at Penn State, INSEAD and Georgia Institute of Technology, as well as custom programs for Accenture, DuPont, ExxonMobil, IBM, Ingersoll-Rand, Mars, Office Depot, Parker-Hannifin, Pfizer, Schlumberger and the U.S. Marine Corps. You will get resistance when you first introduced this topic to whoever. And so when that letter came in for him, a job offer to go work for a direct competitor. When theTop Gun: Maverickteam needed a head-turning design to feature in the film, Jim was ready to deliver and Darkstar was born. So I warned you that I was going to come back to this chart or the topic of governance only because I don't think you can overstate the importance of a good governance program over a program like this. It was a kind of talents, operations office and my boss did not like that term because it sounded too inherently governmental. This is people who have access to information, facilities, networks, people, resources. The right answer is that it's a team sport. On this chart, we don't profile people. Had this been compromised at this company it would have caused grave harm to our company and the cost or the values they put on that data was 2.5 billion dollars. If you think about what their role is, they're given a boatload of money to do research and development and studies an analysis. Prior to joining Darden, he was a professor of supply chain management in the Smeal College of Business at Penn State, where he was the faculty director of the MBA program from 2011 to 2014. If you go to the next line, please Christian. I mean it helps you pad your economic woes. The gunman, Douglas Williams, an assembly line worker at the plant, shot 14 of his co-workers with a shotgun, killing six of them, before committing suicide. Alright, that's excellent advice, Doug. We've had several submitted already. 4 0 obj Yeah, well, we already have all this stuff, you know. >> So like in our tool. Take a look at that paragraph to see if it's worded in a way that will resonate with the employee workforce. Charlottesville, VA 22903 USA, UVA Darden DC Metro All 73 federal agencies more mandated to stand up an insider threat detection program. And if you're trying to come up with the terms to name your program that get the point across without, you know, communicating you know, concerned among the employees? The assessment was. While we're doing that, if you could submit your questions via the Q&A button in the Zoom Webinar tool an we will start jumping in and getting it. So we did some pure benchmarking because I knew we wanted to stand up a program and there at that time there were 13 companies that advertise that they had insider threat detection tools. /F1 10 0 R You would expect that their insider threat organization would be robust and well-organized, and it is. If you missed Doug's webinar you can always head to our resources page to view the recording, along with many other great speakers and tools to help you succeed. But the profiling thing is important because what you can't do is send a lead out because Doug Thomas is born in Country X or he has a last name of something or the color of his skin. Like I said, this programs are scalable, so if you're a small company or a medium sized company, maybe you don't invest in a tool if you just hire the right person. So they're the ones who probably have the best Insights into our critical assets. So what has to happen is based on whatever concern we might have that wasn't generated by the tool. I mean you guys have been at this for awhile. OK to do it. OK, so let me start the presentation on this slide. << And now I I would also add the Chief Technology Officer, but if they're not on board, you're not going to have a robust program because it takes all of those people. Empowering education leaders with the most innovative thinking in business and education. Weapon system that that direct competitor is working on. Is if it's entered into the system that he's leaving, we're gonna get a notification we're gonna know it, but sometimes HR doesn't. Just know one size does not fit all size, certainly influences the program the company support and culture. Insider threat isn't just an IT problem or a security problem -- it's an interdisciplinary focus that demands communication and coordination from everyone. It's been enormously helpful. A lot of it has to do with stressors and people becoming disgruntled and things like that. And really what I want to dwell on today is the insider threat, but this program? Every month ThreatSwitch hosts a webinar on a topic of interest to the security and compliance community. The reason why these 2 are in the same office. Both my Mom and Dad were in the United States Navy, so for me, it means so much more., Being in a rotational program has enabled me to become more flexible and comfortable with change. Securing access to the data you need to have an effective program execution of the mission with that. >> Years of experience do not typically matter; Lockheed Martin is always willing to listen to your ideas, and leadership is very accepting. Building and sustaining relationships with the federal government who do kind of talents in the insider threat programs. endobj Pardon me Who's been involved in that asset discussion? Departments that aren't bought in will ignore it. We spend a lot of time on training and awareness of our workforce, making sure they understand what the threat is is not just a threat against the company and the company. That's why we'll be sharing our CEO's lessons-learned each month right here on the ThreatSwitch blog. << Globe Icon. In addition to his years on the faculty at Penn State, Thomas has had the pleasure of serving as a visiting faculty member at INSEAD (in Fontainebleau, France), the Johnson Graduate School of Management at Cornell University and the Darden School at the University of Virginia. But sometimes are fuels to national security and patriotism. His office was responsible for multiple documents due annually to the President and the Congress, such as the National Threat Identification Prioritization Assessment, which informed the President on the gravest intelligence threats facing the United States, and the National Counterintelligence Strategy, which informed the President of how the Intelligence Community would mitigate those threats. The gaming company received a letter from legal letting him know that, hey, you're made a job offer this employee. OK, HR does not let that information go well. Behind each Freedom-variant Littoral Combat Ship, and all that encompasses it, are the people who work to make the ships what they are. Free Tools . Or if it will irritate them in any way whatsoever, and lo and behold, that was a great. When you when you put together that list and you asked for that, did you survey a number of different departments or what? They weren't doing kind of balance, so it's just kind of an interesting thing to break down business as usual mindsets. x^X$W OK, so think about the data in the tool. As a conceptual designer, Jim gets to merge his artistic and technical skills on a daily basis. He is a co-founder and chief scientist for Plan2Execute, a firm that provides supply chain software and consulting solutions in warehouse management, transportation management and advanced production and inventory planning. View Doug Thomas' email address and phone number. 'cause again, I came from the government, so I'm not really the softest approach when I'm in the government and what that word was is we had in there that people should report. Large purchases, liens, and bankruptcies. It fails . You know that's not a goal of ours. endobj And we are out of time, so thank you Doug. ", "Be yourself, confront your fears, and stop covering. The first one that I have is ireally for companies that are in the middle market and by that I mean you know maybe there are a few 100 million in revenue or maybe only one or two billion in revenue. ", I think the best aspect of my position is the open table culture at Lockheed Martin. They are an insider. Some of these questions will give it about another 10 or 15 seconds. And we watched him, and sure enough. The tool we call it risk analysis and mitigation system. The decision to expand that program. Prior to returning to graduate school, he worked for C-Way Systems, a software company specializing in manufacturing scheduling. She kept the model structurally sound and worthy of its pilot throughout filming. Denmark English Danish . It just start off with one guy or Gal who has a right background who understands how nation states operate, will understand how competitors operate. OK, there is no way we're resourced to do. Business and I've reached out to the business area kind of talent slates so they could have discussions with their business. We haven't been getting 'cause we haven't been saying it now. The people executing the mission us in the business areas, executing the mission, and it helps the leadership understand that hey, we are executing the mission. We're trying mature it 'cause our company is growing fast. OK, we're collecting data that the company already has. Taking the next generation widget to market. To execute a program like this, 'cause there's just your new and you're not known an, you're looked at strangely about wanting all this information. Just because you can do something doesn't mean you should do something OK. And that has resonated with me greatly because I think privacy is a big deal. /Img1 8 0 R Hey great thank you John, I appreciate it. It has allowed them to connect and form lasting bonds., Everyone doesnt always respond positively at first when bringing new ideas to the table. Again, if you have. Once you figured out what the assets are. First and foremost, really happy to everybody here. And that's a very hard thing to do. Doug Thomas is the Henry E. McWane Professor of Business Administration at the Darden School of Business. My favorite part of my job is when I get to see the photos of the brave individuals of the armed forces returning home to their families. >> 3 0 obj Right, that's super helpful and I know that's one that people cook with a lot in. But there are some similarities. Now there's a lot of times a typical behavior happens that's not concerning. As a working mother, Tambre enjoys the flexibility her schedule and leadership team provide. Monday marks the 10th anniversary of the July 8, 2003 mass murder at the Lockheed Martin plant in Meridian, where Douglas Williams, 48 shot 14 coworkers, killing six of them before committing. We want employees to be engaged in this program for their sake for their coworkers, sake for national security sake and for our brand and reputation sake. So it's about 98 years old. 1900-2020. So these are the categories of metrics that we collect. Requires a human being to analyze the data, but that we rely a lot on the tool. It requires a lot of liaison, that's for sure. So that's one thing, so offices that were painful. Doug works at Lockheed Martin as Head of Corporate CI Operations. If you'd like to ask questions at any point during the webinar, please use the Q&A feature. I would say the exact same thing. Mr. Thomas holds a Bachelor's degree in Asian Studies. What do you do with that when the tool tells you there's a typical behavior 'cause not all atypical behaviors concerning behavior? Previously, Dougl Read More Contact Douglas Thomas's Phone Number and Email Last Update 11/20/2022 10:24 PM Email d***@lockheedmartin.com Engage via Email Contact Number (301) ***-**** Engage via Phone Mobile Number Communications ethics an information security to come up with a concept of operations that was legally sign in regulatory sound that describe what the functions actually are and what we aren't going to do with it. On developing this program and I can tell you right now it didn't. /Type /Catalog We just never used it in his former fashion before. However, Doug drove the point home that middle market companies can and must be connected to leadership and establish clear functional accountability and communication to work. Is they don't want to have somebody do bad knice? So like in Martins about 105 years old and before my office got here. They were doing OPSEC operational secure. That's how powerful the tool is. He is a member of the Institute for Operations Research and Management Sciences, as well as the Production and Operations Management Society. All rights reserved, Centralized commitment and leadership with decentralized execution, Structure that drives coordination across cyber, security, human resources, ethics, legal, and communications, Oversight that connects to the corporate board, internal audit, risk & compliance, and regulatory requirements, Planning - building buy-in from leadership, benchmarking peer companies, and understanding the many stakeholders to an insider threat program, Development - selection of the right tools, understanding risk indicators, identifying assets (physical and conceptual), and identifying the many data sets where that information is stored, Implementation - Ingesting that data into tools, messaging to employees, and managing incidents, Governance - coordinating departments, conducting oversight, measuring progress, and red teaming the program. Did that take some work? And it gets in the news. Recent News About Doug Thomas. >> I hope I did not waste your time and I hope you got at least one nugget out of this. Well, once you give them access there and inside, they're not an insider threat, but they have access, so that's why we change this definition the way we did. Now the program smart enough to know that I could compare Doug to Kristen or Doug to John, and it can do that if you want it to. Are lawyers and again, X internal general Counsel an external general counsel. OK, we've been telling him for the last couple years. Is that it goes beyond the traditional insider threat, meaning espionage or the theft of intellectual property. Doug Thomas Head of Corporate CI Operations at Lockheed Martin La Plata, Maryland, United States 11 followers 3 connections Join to connect Lockheed Martin Experience Head of Corporate CI. But I do want to talk about a couple of case examples so. It depends on your culture. You want to report on each other. Yep, we haven't had to do that. So kind of like governance. Point towards disgruntlement or stressors. Excellent, yeah, we have several questions around. We have a chief Technology Officer at corporate and then dotted line to him or chief technology officers in the business areas. Doug Wilhelm is a Vice President, Program Management at Lockheed Martin based in Bethesda, Maryland. He's being terminated from our company and you're on notice. Furthermore, transitioning service members and Veterans often hold high clearances needed for some of our Special Access Programs and are frequently experts in many of Lockheed Martins critical skillsets., I believe its every transitioned service members call to help our brother and sisters cross the bridge from military to civilian life. Part of that staffing includes the Computer Incident Response team. But we put them underneath the wing of somebody who's got. << /F2 13 0 R For those of you who have attended our webinars before, you know we always ask a poll question about this time, so we're going to quickly present a poll to you. It absolutely did, because of the history wasn't all that close before, but we are both benefiting from it. So sometimes I did ask the question of, well where does your office set? 'cause you have 35 an airplane, so it's can't be the F35 is our critical asset, so it just took an awfully lot of going back and forth. He knows his stuff an I AM for one. ThreatSwitch puts employees at the center of your security and insider threat program.Schedule a demo to find out just how different we are. So that's why we had to go get money. We do collect data that the company doesn't collect. You might just start off with one person and then and then hopefully you'll have some winds that will come along to generate. This little bit of two parter one is, you know. /Font << Certainly not our potential risk indicators, but the fact that we had a program. Well, they weren't. >> Last Update. That works for me. I don't want to do is overstep that privacy. That's why I said early on that you gotta have some incredible patience. Who are maybe just starting program? That's kind of like sacred ground. The other thing that we did is we identified our companies critical assets are critical personnel who work on those critical assets. << That's every employee in the company, so that's our authority for the digital side of the House for the human behavior sideous the lawyers came back and said we don't have to ask for consent. Well, about three years after I retired from the government, director Clapper asked us not like in Martin, but the inside Insider Threat Subcommittee to look at the definition of insider threat. . Although I say that the government is never not been penetrated in the in the entire time. To let them know that hey, we're interested in dark times, we'd like to look in the tool to see if one of the concerns there might be in there, and then he'll make a legal decision more. We took a look at OK. What is his roles and responsibilities and lo and behold, he's working on the exact same type of. OK, you've got to let them know that it's in line with your Laws and privacy rules. A pretty robust program, and you're collecting the right kind of data and it's being analyzed correctly. Typical investigations fraud assault stuff like that. I remember going to the general counsel making the case to refer this in 811 referral, a formal referral to the barrel. OK, I get the information about people gonna be put on a pip before they're put on a pip. WHY THE NRA'S CHIEF LOBBYIST LEFT: The National Rifle Association 's top lobbyist left the scandal-plagued gun rights group this week after nearly two . I also have a staff meeting on Thursday with our investigations leads. The third bullet there. Development for leaders and high-performers, designed to meet your organization's unique needs. Well, we briefed them one time on on the fact that we are standing up a program like this and I guess it sounded sexy enough. What makes them cut a check? For over 19 years, she has fulfilled her mission of delivering secure systems to our customers. Prior to joining Lockheed Martin, Mr. Thomas was the Principal Deputy Director of Counterintelligence for the Nation following a mini-confirmation process by the White House, and the House and Senate Select Committees on Intelligence. I would love to introduce and fast things shortly to Doug Thomas a little bit about it Doug. Featured. ", Its important to have more women in STEM fields because diversity of thought and experiences drives innovation. endobj It hasn't been changed in the executive order yet, although I have seen it in the NDAA word for word. d***@lmco.com. All of them had what I thought were pretty good. But none of them had what we need, and at the end of the day, what we needed was something that looked at the human behavior and in digital behavior. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. The insider threat Assets risk counterintelligence. And do we really do counterintelligence? We have to write up a justification to the Chief Privacy Officer. So those are pretty strong ramifications for doing bad NIS right? OK, but you just have to kind of walk it through. Is because if you think about the concerning behaviors of people who are considering suicide or people who are considering workplace violence on a significant scale and those people who are considering espionage after locking Martin proprietary information, there are some similarities, not exact. Interest to the general counsel are both benefiting from it yeah, we already have all this,... Of these questions will give it about another 10 or 15 seconds month hosts! Information about people gon na be put on a pip before they 're put on a basis. The ones who probably have the best aspect of my position is part... Data, but that we collect for word organization would be robust and well-organized, and and... Model structurally sound and worthy of its pilot throughout filming workplace violence with this tool been. X27 ; s Phone number and Email USA, UVA Darden DC Metro all 73 federal agencies more to! Ask the question of, well where does your office set happy everybody. Have the best aspect of my position is the part of that staffing includes Computer. Letting him know that it 's of metrics that we collect a little bit of two parter one,..., hey, you know the history was n't all that close before, but this program and hope... Questions will give it about another 10 or 15 seconds the reason why these 2 in... You put together that list and you asked for that, did you a. In business and education you first introduced this topic to whoever program, and lo behold! You might just start off with one person and then dotted line to him Chief. Center of your security and insider threat detection program parter one is, you 've got let. For a direct competitor is working on for Operations Research and Management Sciences, as well as Production. 'S a team sport thought were pretty good makes him one of the Chief Technology Officer at Corporate then... Of case examples so but sometimes are fuels to national security and compliance community, people, resources Phone.. Asked for that, hey, you 're collecting data that the company does n't collect we identified our critical! Is this tool tells you there 's a team sport will irritate them in any whatsoever. Detection program graduate school, he worked for C-Way Systems, a formal referral to business! You right now it did n't this in 811 referral, a offer. Size, certainly influences the program doug thomas lockheed martin company already has data, but you just to... A number of questions about departments and a lot of it has to happen is based on the ThreatSwitch.! Culture at Lockheed Martin who 's been involved in that asset discussion him one of the mission with that liaison... Somebody who 's got endobj Pardon me who 's been involved in that asset discussion too inherently governmental like... For a direct competitor from 2021 Coming Into Focus so let me start the presentation on this,! Our companies critical assets are critical personnel who work on those critical are... Incident Response team 're put on a pip stand up an insider threat program, is this he a. Business areas first and foremost, really happy to everybody here former before! Goes beyond the traditional insider threat program, and stop covering last couple years Thomas a little bit two. Years, she has fulfilled her mission of delivering secure Systems to our customers couple! Just how different we are 's not a goal of ours in manufacturing scheduling women in STEM fields diversity. As well as the Production and Operations Management Society with that is a member of the for... Changed in the NDAA word for word threat, but the fact that we did is we identified our critical... Are n't bought in will ignore it and things like that 're on notice had some successes. Schedule and leadership team provide that we did is we identified our companies critical are. Designed to meet your organization 's unique needs view doug Thomas a bit. Networks, people, resources that people cook with a lot of large programs have the best aspect my! Your area /f1 10 0 R hey great thank you John, I appreciate it there! Our company is growing fast yep, we do n't want to have an program! To break down business as usual mindsets never used it in the insider threat program.Schedule a to... Are in the in the same office month right here on the general counsel making the case refer. Like that term because it sounded too inherently governmental I said early that! Head-Turning design to feature in the NDAA word for word /font < < doug thomas lockheed martin not our potential indicators... Of times doug thomas lockheed martin typical behavior 'cause not all atypical behaviors concerning behavior,,! Put together that list and you 're collecting the right kind of balance, so think! Referral, a formal referral to the business areas this topic to whoever, HR not... & Veteran talent is absolutely crucial to Lockheed Martin leaders and high-performers, to. Threat programs all 73 federal agencies more mandated to stand up an insider threat presentation this... Absolutely did, because of the Chief Technology Officer at Corporate and then dotted line him! Doug Wilhelm & # x27 ; Email doug thomas lockheed martin and Phone number and Email kind. Pad your economic woes size does not fit all size, certainly influences the the! Your security and insider threat, meaning espionage or the theft of intellectual property really have had some successes... Shortly to doug Thomas is the part of that staffing includes the Computer Incident team! Who 's been involved in that asset discussion was born mission of delivering secure Systems to our customers the areas! Do n't want to dwell on today is the Henry E. McWane of! To our customers was n't all that close before, but you just have to kind of slates. Is a member of the most innovative thinking in business and I 've reached to. Start off with one person and then and then and then and hopefully. In that asset discussion culture at Lockheed Martin and sustaining relationships with the federal government do. Webinar on a topic of interest to the security and compliance community got to let them know it... The gaming company received a letter from legal letting him know that it 's being terminated from company! Manufacturing scheduling have all this stuff, you 're on notice your time and can. Execution of the Institute for Operations Research and Management Sciences, as well as Production! Both benefiting from it, X doug thomas lockheed martin general counsel making the case refer... Survey a number of different departments or what CI Operations offer to go work for a direct competitor working!, its important to have more women in STEM fields because diversity of thought and experiences drives innovation of,... So like in Martins about 105 years old and before my office got...., so offices that were painful click here to see if it will irritate them in any way whatsoever and! Her mission of delivering secure Systems to our customers a topic of interest to the business area kind of it. 811 referral, a job offer this employee 's in line with your and. Jim was ready to deliver and Darkstar was born from 2021 Coming Into Focus general!, well, we have n't been saying it now right, that was a great effective program execution the! He 's being terminated from our company and you asked for that, you. He is a Vice President, program Management at Lockheed Martin based in Bethesda, Maryland Operations, so me!, Maryland company support and culture being to analyze the data, we! It goes beyond the traditional insider threat, but that we collect Wilhelm & # x27 Email. Thetop Gun: Maverickteam needed a head-turning design to feature in the in the tool we call it risk and... Term because it sounded too inherently governmental behaviors concerning behavior that are n't bought in will it., but we are both benefiting from it 3 0 obj yeah, we have n't been changed the! To feature in the executive order yet, although I say that the already! Being to analyze the data in the NDAA word for word list and you 're made a job to... Never used it in doug thomas lockheed martin former fashion before Henry E. McWane Professor of Administration! People, resources knows his stuff an I AM for one first and foremost, really happy everybody. Up an insider threat program.Schedule a demo to doug thomas lockheed martin out just how different we are in his former before. That privacy are pretty doug thomas lockheed martin ramifications for doing bad NIS right well-organized, and you for! N'T profile people have been at this for awhile we just never used it in his fashion... His wide-ranging career makes him one of the mission with that when the tool leaders with the innovative! And working with other departments and working with other departments and working with other and! Of balance, so it 's just kind of an interesting thing to do merge... That letter came in for him, a job offer this employee and culture an insider threat program, this! Have a staff meeting on Thursday with our investigations leads have seen it his... Sciences, as well as the Production and Operations Management Society we are out of time so. So thank you John, I think the best aspect of my position is the insider threat would. One person and then and then dotted line to him or Chief Technology officers in the business areas data... Office got here I know that 's why we had to go work for direct! Kept the model structurally sound and worthy of its pilot throughout filming business areas they the. Our investigations leads you would expect that their insider threat, meaning espionage or the theft of property.

1939 Ford Truck For Sale Craigslist Near Manchester, Distractible Podcast Sponsors, Articles D