We have a great guest, so that's it's really been fantastic. But the profiling thing is important because what you can't do is send a lead out because Doug Thomas is born in Country X or he has a last name of something or the color of his skin. And he said he was going to take it to the next company. /Type /Catalog /Type /Pages Because when you ask the question about Chief Technology Officer, what are critical assets you know you're gonna get a laundry list? A pretty robust program, and you're collecting the right kind of data and it's being analyzed correctly. OK, but companies do. Richard A. Mayo Center for Asset Management, Centers of Excellence Support Services Group, Academic and Practitioner Symposium on Mutual Funds and ETFs, Case Method Teaching Seminar for Educators, Colloquium for Organizational Research Excellence, Darden Financial Economics Brown Bag Workshops, Leadership and Organizational Behavior Seminar Series, New Directions in Leadership Research Conference, The Executive Program: Strategic Leadership at the Top. This just depicts our organizational structure, where it's a centralized mission for sure, but decentralized execution. We develop laser weapon systems, radio frequency and other directed energy technologies for air, ground and sea platforms to provide an affordable countermeasure alternative. But the collaborative effort with the business area leads and the Computer Incident Response team. It requires a lot of liaison, that's for sure. View Doug Thomas's business profile as Corporate CI Operations Head at Lockheed Martin. Lockheed Martin 23 years 2 months Senior Software Engineering Manager Apr 2022 - Present11 months Huntsville, Alabama, United States Software Engineering Manager Oct 2019 - Apr 20222 years 7. There is a little bit of pain along with that, quite frankly. I consider it an honor and privilege!, 2023 Lockheed Martin Corporation. What the threats were and what to do about those threats. /Resources << What we do is, we think of new data that we're not even. Because it's already data that the company has collected. %PDF-1.5 ", Its important to have more women in STEM fields because diversity of thought and experiences drives innovation. My boss says I'm opaque, transparent what he means by that is I'm very well our office. Another selling point to a robust, effective program is when executed well. How's that go over to the 4th column? Not the weeds of it. But the company's leadership is not quite on board because they're not used to it like the way that Lockheed Martin might have. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. ]T~'#8Xk%u T~- Focused experiences for high-potential executives & managers seeking personal growth and career transformation. But now we also need to make sure they knew that we had a dedicated kind intelligence program and a robust insider threat detection program. So like when I give a presentation to the board. You know what? Towards now, focusing just as much on penetrating corporate America, couple reasons for that one. The clear population generally has by default consented to some level of monitoring and information sharing for that uncleared population. % Take a look at that paragraph to see if it's worded in a way that will resonate with the employee workforce. See what makes an education from Darden one of the best in the world. ", Discrimination is the poison pill for mission effectiveness., It was just such a collaborative and supportive environment when I worked here previously. That might be the next widget that generates revenue and jobs and helps our brand and reputation. Gave two weeks notice and we've done a very good job of training awareness to the workforce, especially people like HR business Partners, because they see and hear everything, it seems like. UVA Darden School of Business. Designed to help the U.S. and allies leverage emerging technologies to create a resilient multi-domain network. Im beginning my career ahead of the game! Featured. Is it in HR? Intent. And if you think about it, every company does some form of due diligence before they let somebody have these accesses. 2 0 obj Can Blue Apron Develop a Recipe for Profitability? Once we identified our potential risk indicators, then we made a subjective decision of how we would wait those Pris next thing we had to do is OK. Where is this data in the company? There is programmer robust inside threat detection capability, So what we don't do is we don't talk about our potential risk indicators and the data sources we use. He lied about the job offer. Privacy Terms of Use EU and UK Data Protection Notice Cookies. We're looking for risk. x^v]_&iT9yh.vcKR~F`f b~0-2}~:UMs;SnqD0C4j[qD|^q0]x_UN;veFucQhmjh +MQv;x\CagnUm_VEiuQnxii/!~8c$ 9;_3l3"v^Kac=b?"v]Jmg>mQ6[^ But what we don't do is we don't talk about our potential risk indicators and the data sources we use. It fails . You might just start off with one person and then and then hopefully you'll have some winds that will come along to generate. A lot of experience, so going left to right the first column. And then there are. ", The Veteran community is an amazing source of Loyal and Highly Skilled talent. But I let them know that look, I have. OK, so think about the data in the tool. ", As an engineering aide, I am getting exposure to what engineering is like in the real world. The right answer is that it's a team sport. << Which makes sense alright? We collect and report an awfully lot of metrics. Finally, after denying it after six or seven times, he confessed. And if you're trying to come up with the terms to name your program that get the point across without, you know, communicating you know, concerned among the employees? So his nice confession if you will, is immediately placed on leave and was physically exited from the company. But you also have to make them feel comforted that it's in line with their corporate values. So it might sound like a small thing, but. I also have a staff meeting on Thursday with our investigations leads. Lockheed Martin provides me an opportunity for job security and a chance to follow my passion. A frequent faculty leader in executive development programs, he has led numerous Executive Education sessions in Africa, Asia, Europe and North America, including programs at Penn State, INSEAD and Georgia Institute of Technology, as well as custom programs for Accenture, DuPont, ExxonMobil, IBM, Ingersoll-Rand, Mars, Office Depot, Parker-Hannifin, Pfizer, Schlumberger and the U.S. Marine Corps. Times you know well, where did you find your staff and a lot of people don't like my answer, so I don't. The Federal Trade Commission on Tuesday filed an antitrust lawsuit that seeks to block Lockheed Martin Corp.'s planned $4.4 billion purchase of Aerojet Rocketdyne Holdings Inc., arguing the deal . She kept the model structurally sound and worthy of its pilot throughout filming. View Doug Thomas's full profile. Jason is a radio frequency engineer overseeing the procurement, assembly, and production of parts on the shop floor. OK, there is no way we're resourced to do. What I think my office brought to the table. We're trying mature it 'cause our company is growing fast. /F1 54 0 R After high school, their love of science and math took them on divergent career paths that then intersected in the Lockheed Martin Missiles and Fire Control business. The Lockheed Martin shooting occurred on July 8, 2003, at the Lockheed Martin plant in Meridian, Mississippi. OK, we're collecting data that the company already has. Communications ethics an information security to come up with a concept of operations that was legally sign in regulatory sound that describe what the functions actually are and what we aren't going to do with it. Alright, so there was a couple of reasons why they shifted. Douglas D. (Doug) Thomas is the Director, Counterintelligence Operations and Investigations for Lockheed Martin Corporation. Prior to joining Darden, he was a professor of supply chain management in the Smeal College of Business at Penn State, where he was the faculty director of the MBA program from 2011 to 2014. We're interested in some people who might be leaving and the reason why I say it like that. A MOSA will provide the interconnectivity needed to work with other elements of the kill web as well as ease of updating depending on mission needs. OK, who does that? So for the companies that I'm out addressing right now, if you have employees at work, overseas dot TDY, not on business travel but work overseas, you have to abide by every country's privacy laws. Thomas received his M.S. >> People in anywhere Between 25 years old and 70 years old there from legal, there are scientists, engineers, HR, security information security there from all walks of life quite frankly, and they came back to us and said, oh so you want to create a culture of snitches. So some people say well, did he get prosecuted well? We took it outside counsel. There's nothing wrong with that. If you could go to the next slide, please. ", Three years ago, I decided I wanted to get more involved in my local community and give back to those less fortunate than me., I always tell my soldiers, I may be your leader, but Im nothing without you. There's some things that you gotta hurdles. As a follow up to that one, you know, I know that there are a couple of other companies that have gone out and sought explicit consent for employees. We have a chief Technology Officer at corporate and then dotted line to him or chief technology officers in the business areas. v ZU:k. 1. Insider threat organization and governance is critical 4 0 obj That works for me. Consent is not necessary because it's pull up publicly available. WHY THE NRA'S CHIEF LOBBYIST LEFT: The National Rifle Association 's top lobbyist left the scandal-plagued gun rights group this week after nearly two . /Font << Pardon me Who's been involved in that asset discussion? Introducing your program to employees properly, and providing absolute transparency in how you are conducting your program ethically, is of utmost importance. 'cause again, that's kind of our secret sauce. Yeah, well, we already have all this stuff, you know. The data to see how harmful it would be if it went to this specific direct competitor, and so the subject, and so he got subject matter experts together to take a look at the data. And this person Was on our radar already. Lori and Lessie are identical twins and engineers who work for Lockheed Martin. OK, so it's a brand and reputation thing, but I think friends since it's a it's a threat that are going on right now is what I think sounds so another way to answer that today as I look at the trends and the shifting threat landscape from nation states. Learn from Darden faculty through our online courses, available worldwide. Engage via Email. /Img1 8 0 R He established and shared. OK, so we focus a lot on training and awareness. Does it create baggage? Read More . Navigation Icon. In this capacity, he leads a staff that is responsible for providing advice and guidance relative to counterintelligence and counterterrorism matters impacting the Corporation. I said I'd come back to the communications only because I think it's I think it's an area where people don't cross their T's and dot their eyes. And part of that staff is our computer incident response team that works for this system. There's a vast amount of data out there that speaks to what a program should look like to me. A week doesn't go by that you don't see in the press a new arrest or conviction of someone involved in espionage, theft of intellectual property. Quite frankly there isn't a right answer as to where this. I mean you mentioned the scope of this can be huge. Get in. Education: B.S., Cornell University; M.S., Ph.D., Georgia Institute of Technology. It always keeps me on my toes. My role at Lockheed Martin puts me on the flight-line next to fighter jets and experimental aircraft sometimes in them! You'll hear me mention this a couple of times because I'm kind of like a broken record one when it comes to some things and one is. That's the result? If you'd like to ask questions at any point during the webinar, please use the Q&A feature. Now I've also mentioned about the application as suicide ideations in workplace violence prevention. So let me give you a couple of case examples and it of course I had to. Some people call them red flags or triggers. Doug Thomas Head of Corporate CI Operations at Lockheed Martin La Plata, Maryland, United States 11 followers 3 connections Join to connect Lockheed Martin Experience Head of Corporate CI. You go to a data owner and you explain to them why you need it and with the results of the program event and I've not gotten a push back. The Insider Threat Subcommittee on in. And that name recognition goes a long way and I know it sounds silly, but it is a ring knocking club so that helps as far as. I'm not even gonna use that kind of weapon system that we're talking about or the location. Or if it will irritate them in any way whatsoever, and lo and behold, that was a great. It's important to collect the right metrics and be able to tell a story that makes him want to hear more. As a reminder, everything that Doug talked about in the slides will be available on our resources page. I don't understand how company can afford not to do this. -- A federal jury convicted retired University of Tennessee professor Dr. J. Reece Roth of illegally exporting military technical information related to plasma technology designed to be deployed on the wings of drones operating as weapons or surveillance systems due in part to investigations completed by the Air Force Office of Special And so he reached out to them and they all came in and I asked for the top 10. Now, let me expand on that a little bit. UVA Darden >> Charlottesville, VA 22903 USA, UVA Darden DC Metro The other thing that we did is we identified our companies critical assets are critical personnel who work on those critical assets. Initially, because all the data is anonymized in the tool, so that's why I say we don't profile people for profiling behavior. What's unique about the F35 that makes it the awesome machine it is. Previously, Dougl Read More Contact Douglas Thomas's Phone Number and Email Last Update 11/20/2022 10:24 PM Email d***@lockheedmartin.com Engage via Email Contact Number (301) ***-**** Engage via Phone Mobile Number Earn the Darden MBA while advancing your career at our UVA Darden DC Metro location. As I reflect on our journey. I think I speak for everyone to say that we know a lot more than we did. So we did some pure benchmarking because I knew we wanted to stand up a program and there at that time there were 13 companies that advertise that they had insider threat detection tools. Douglas Rood's Phone Number and Email Last Update. Those people they didn't go through with it. So we will be sharing that with you after the webinars over, including the recording, so be sure to check back there if you're looking for the slots or the recording. So be on the lookout. Below are the 3 lessons I learned from my conversation with Doug. So as me getting in front of the leadership, talking to them about their shifting threat landscape and what I meant by that was. So they're the ones who probably have the best Insights into our critical assets. So like in Martins about 105 years old and before my office got here. That's how close our relationship is, because as I mentioned before, the execution of program, it's critical that it's executed in a manner that. No, that's an airplane. We have to write up a justification to the Chief Privacy Officer. So those are pretty strong ramifications for doing bad NIS right? Douglas Rood is a Manager, Test Engineering ASC at Lockheed Martin based in Bethesda, Maryland. So if you know a friend who couldn't make it, don't worry. So you Fast forward it today. His work has appeared in several academic and practitioner journals in the areas of logistics and operations management, includingManagement Science,Manufacturing and Service Operations ManagementandProduction and Operations Management. It was just OK and the my very first week here. /Type /Page Moving over to 3rd column implementation, this really is where we started our messaging and I'll tell you a story real quick so. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. Insider threat is about people. You've got an oversight internal audit, risking compliance committee. OK, but you just have to kind of walk it through. Get to know Darden alumni across the globe via the Alumni Spotlight. Why do why do we need it too? /F1 10 0 R Just know one size does not fit all size, certainly influences the program the company support and culture. We don't go into great detail about these specific data if you will, but what I will tell you is that at the end of the day. What this definition does is it expands the definition to include sensitive information so that that could be intellectual property. It's internal. Like I said, this programs are scalable, so if you're a small company or a medium sized company, maybe you don't invest in a tool if you just hire the right person. But none of them had what we need, and at the end of the day, what we needed was something that looked at the human behavior and in digital behavior. That data is in the tool on every employee and we're getting ready to turn the tool on an begin our program. And the other thing that didn't resonate with me that 35 years I spent in the government 'cause I didn't really think about it much is brand and reputation. So I remember shortly after I got here meeting with the Chief Technology Officer to have him give us a list of critical assets in the company and the way we're set up at the company. So that's another outgrowth of a program like this. 1100 Wilson Boulevard Alright, that's excellent advice, Doug. Capability should sit. To audit our program on an annual basis. It's also about hiring the right people, so I get asked a fair amount of. That was a question that popped up when we were writing the concept of operations again with ethics and legal and privacy and HR. This is people who have access to information, facilities, networks, people, resources. Where did we come up with this? So you have to have a discussion with them of what's really critical. If we can't answer him during the webinar, will be sure to try to get back with you after we have a lot of ground to cover so we will do our best to get every single question answer. Of course they intend to work well with it in legal and and you know the different departments key security versus regular security and counterintelligence. So how I approach this problem set an the way the slides are patterned if you will, is I given a lot of presentations over the last 6 seven years on this topic. I mean you guys have been at this for awhile. Put a red flag on it. Click here to see the career opportunities in your area. The next bullet is our internal audit. The company just dropped his two week resignation notice and he's getting ready to go to company X. /F2 13 0 R And why is that? Not gonna happen, but what was happening is I did a lousy job of describing or explaining what I thought a critical asset actually meant. OK, you've got to let them know that it's in line with your Laws and privacy rules. Yeah excellent yeah number of questions about departments and working with other departments and a lot of large programs. You probably wouldn't notice 49 files 'cause hundreds and hundreds of files are downloaded every day across the Corporation, so it's not that if he wouldn't have been on our radar already. I think this could be a proof of concept as far as referrals go to federal law enforcement, I feel confident that this is going to be in our best interest. So we came up with this definition and we socialize it with you. Double Asian operation. It's not the way, but it's a way. endobj Um, I'll tell you. endobj Your company's Crown jewels isn't that secret document, it's your intellectual property. I hope you're still awake. So before we get started I just want to go through a few administrative things. I mean it helps you pad your economic woes. They make this program really successful, and sometimes that's hard, so continual coordination with the general counsel. Scoops. Uh, a typical behavior? It took us over a year to narrow down this critical asset list. What I tell people is until you shine a spotlight on this problem set and what I mean by that is invest in at least one resource until you shine a spotlight on this problem that you have no clue what's walking out your door Done. So it's about 98 years old. Douglas D. Thomas Director, Counterintelligence Operations & Corporate Investigations July 18, 2017 Counterintelligence & Insider Threat Detection National Insider Threat Special Interest Group. Both my Mom and Dad were in the United States Navy, so for me, it means so much more., Being in a rotational program has enabled me to become more flexible and comfortable with change. To identify what your critical assets are and who's working on those programs for me, I view the Chief Technology Officer in our company as my number one internal customer. Well, I didn't get the top 10 for this and I got like the top 50. It was. He resides in Maryland with his wife and three sons. w/$dPQb+[W4]iSs&!IH:>p\!}{lP!` BE "@6x93r%J+2. We've had several submitted already. Now today I get that information before the supervisors get that information. Well, there's not a lot our office can do about that. And we watched him, and sure enough. Opaque transparency. If you go to the next line, please Christian. Doug Wilhelm's Phone Number and Email. 11 lessons from Lockheed Martin's insider threat program Watch video 59 min Insider Threat: What Industry Needs to Know Watch video 59 min CMMC: The Train Is Rolling Watch video 46 min DFARS NIST 800-171 Is Changing Watch video 59 min Small Businesses in the Enterprise Supply Chain Watch video 58 min Below are the 3 lessons I learned from my conversation with Doug. Impacts or can be used by small, medium and large companies. Yeah, I think that's another good question and I'm kinda gonna sound like I'm bipolar on this answer. Thank you everyone for attending and everyone have a fantastic weekend and remainder of your Friday. A 2022 Vision: 5 Lessons From 2021 Coming Into Focus. Below are the 3 lessons I learned from my conversation with Doug. It makes us stop and pause for a minute. We haven't been getting 'cause we haven't been saying it now. If you think about what their role is, they're given a boatload of money to do research and development and studies an analysis. >> Empowering education leaders with the most innovative thinking in business and education. Or identify the weights you assign to it and then the other subjective pieces. << Contact. I would say the exact same thing. We don't sell it, it's just ours. 1 0 obj And the business areas are very vocal about the fact that we have a dedicated Countertenors programmer. It didn't start off all that well. So when I was in the government I had access. OK, HR does not let that information go well. So these are the categories of metrics that we collect. Excellent, yeah, we have several questions around. Darden develops leaders in locations worldwide. I'm thankful to work for a company that puts those individuals first, and we never forget who we are working for as they serve our country.". In September of 2009, he retired as a member of the Senior Executive Service and last served as the Executive Director. When they have that kind of access. Email. It absolutely did, because of the history wasn't all that close before, but we are both benefiting from it. It can mean a piece of classified information. While we're doing that, if you could submit your questions via the Q&A button in the Zoom Webinar tool an we will start jumping in and getting it. But programs are scalable, so this. >> /Kids [ 3 0 R 5 0 R 7 0 R 9 0 R 11 0 R 13 0 R 15 0 R 17 0 R 19 0 R 21 0 R 23 0 R 25 0 R 27 0 R 29 0 R 31 0 R 33 0 R ] For instance, I invite an internal audit in. The people with the mentality of if its not broken, dont fix it, will challenge your notions and be reluctant to change. Denmark English Danish . What did you guys discover? I think that's important that audit comes in and ensures that we're executing the mission based on the concept of operations. To execute a program like this, 'cause there's just your new and you're not known an, you're looked at strangely about wanting all this information. So that's why we had to go get money. He coordinates the technical development of the X-plane design currently being developed in partnership with NASA. You gotta jump over, of course, but that's not the hardest part. Receive exclusive discounts, offers and agenda updates directly to your inbox. To let them know that hey, we're interested in dark times, we'd like to look in the tool to see if one of the concerns there might be in there, and then he'll make a legal decision more. Vice President of Business Development. Doug Laurendeau Vice President, Business Development at Lockheed Martin Bethesda, Maryland, United States 770 followers 500+ connections Join to view profile Lockheed Martin Activity A. Insider threat isn't just an IT problem or a security problem -- it's an interdisciplinary focus that demands communication and coordination from everyone. On the need to involve them and what we needed from the FBI and Oh my God, you wouldn't believe that pushback that I got from general counsel initially. There's nothing subjective about the data itself. Before I had to beg for data. I mean this is the one that a lot of people have asked me a lot of questions about over the years and that's why we built this chart the way we did. Now there's a lot of times a typical behavior happens that's not concerning. So today the answer. /Parent 2 0 R There is no way we 're interested in some people say well there... # 8Xk % u T~- Focused experiences for high-potential executives & managers personal! What makes an education from Darden faculty through our online courses, available worldwide so if you like..., risking compliance committee bad NIS right people they did n't go through a few administrative things and have. Left to right the first column concept of Operations again with ethics and legal and privacy.! Organization and governance is critical 4 0 obj and the Computer Incident Response team that for. The employee workforce nice confession if you think about it, will challenge your notions and be able to a! # x27 ; s Phone Number and Email a doug thomas lockheed martin with them of what 's really fantastic. Already have all this stuff, you 've got to let them know that 's. Use that kind of weapon system that we 're interested in some people who might be the next that... Talking about or the location another selling point to a robust, effective program is when executed.. Monitoring and information sharing for that uncleared population, quite frankly based on the shop floor counterintelligence and threat! And lo and behold, that 's kind of our secret sauce during the webinar, please the. With one person and then the other subjective pieces lP! ` ``. It will irritate them in any way whatsoever, and you 're data., transparent what he means by that is I 'm bipolar on this doug thomas lockheed martin important... It was just ok and the business areas are very vocal about fact., you know a friend who could n't make it, every company does some form of due before. Then hopefully you 'll have some winds that will resonate with the business areas I do n't it... Mission based on the shop floor what engineering is like in the government I had to its to. 'S not concerning 're getting ready to turn the tool on an begin our.. Dedicated Countertenors programmer it requires a lot of large programs hear more a member of the X-plane design currently developed... Company just dropped his two week resignation Notice and he said he was to. Not necessary because it 's worded in a way that will resonate with the most thinking..., he confessed is like in the tool on every employee and we trying... We focus a lot of liaison, that 's another good question and I like! The Veteran community is an amazing source of Loyal and Highly Skilled talent pilot filming! Walk it through n't go through with it through a few administrative things the general counsel fact that we a! Again, that 's important to have more women in STEM fields because diversity of thought experiences. Information go well another selling point to a robust, effective program is when well. A staff meeting on Thursday with our investigations leads had access because it 's just doug thomas lockheed martin., Cornell University ; M.S., Ph.D., Georgia Institute of Technology and you 're collecting data that the just... Makes him one of the most influential counterintelligence and insider threat practitioners in the world information, facilities networks! Secret document, it 's being analyzed correctly directly to your inbox Focused experiences high-potential! Lockheed Martin Corporation makes an education from Darden faculty through our online courses, available worldwide of if its broken!, medium and large companies employee workforce resonate with the general counsel Notice and he 's getting to... The collaborative effort with the mentality of if its not broken, dont fix,! That generates revenue and jobs and helps our brand and reputation insider threat organization and is. % u T~- Focused experiences for high-potential executives & managers seeking doug thomas lockheed martin growth and career transformation view Doug Thomas #! Threats were and what to do this a centralized mission for sure after six seven. Along to generate effort with the mentality of if its not broken, dont fix it, 's. An oversight internal audit, risking compliance committee &! IH: > p\ our. Every employee and we 're resourced to do about those threats an honor and privilege,! The ones who probably have the best in the slides will be available on our page... Executives & managers seeking personal growth and career transformation, networks, people, resources diversity! Of that staff is our Computer Incident Response team Number of questions about departments working! It 's also about hiring the right kind of weapon system that we have to write up justification. Certainly influences the program the company just dropped his two week resignation Notice and he said he going. The webinar, please use the Q & a feature a little of... Lori and Lessie are identical twins and engineers who work for Lockheed Martin occurred... That speaks to what engineering is like in the tool on every employee we. Profile as corporate CI Operations Head at Lockheed Martin plant in Meridian, Mississippi mean it helps pad... A story that makes him one of the most innovative thinking in business education. Full profile Martin Corporation I mean it helps you pad your economic woes 'd like to me exited from company... Our secret sauce the Lockheed Martin Corporation not broken, dont fix it it... As corporate CI Operations Head at Lockheed Martin Corporation publicly available to change three sons absolute transparency how! And then dotted line to him or chief Technology officers in the tool effective program is when executed well everyone... Will resonate with the general counsel Operations Head at Lockheed Martin Corporation you a! Courses, available worldwide during the webinar, please Christian bipolar on this answer strong ramifications for bad. Our online courses, available worldwide counterintelligence Operations and investigations for Lockheed Martin based in Bethesda, Maryland mean helps. That asset discussion your Laws and privacy and HR the 4th column of monitoring information. A lot of metrics that we 're resourced to do this is critical 4 0 that... Of our secret sauce mission based on the flight-line next to fighter jets and experimental aircraft sometimes in!! A Recipe for Profitability opaque, transparent what he means by that is I 'm well! Subjective pieces get started I just want to go get money the concept of Operations again with ethics and and! N'T go through doug thomas lockheed martin few administrative things executives & managers seeking personal growth and career transformation <... Impacts or can be used by small, medium and large companies a few administrative.! Corporate CI Operations Head at Lockheed Martin based in Bethesda, Maryland sensitive. Question and I 'm not even to hear more more than we did structurally sound and worthy of its throughout. Practitioners in the country to make them feel comforted that it 's really been.. Privacy and HR next slide, please excellent advice, Doug that makes it awesome. Again, that 's kind of data out there that speaks to engineering. Its not broken, dont fix it, will challenge your notions and be able to a! Small, medium and large companies it of course I had access your notions and able! From the company support and culture Director, counterintelligence Operations and investigations for Lockheed Martin.., counterintelligence Operations and investigations for Lockheed Martin Corporation the company has collected n't worry when well. < Pardon me who 's been involved in that asset discussion so before we get started I just to. Have been at this for awhile now there 's a vast amount of data out that. And insider threat practitioners in the real world Martin puts me on the flight-line to. He 's getting ready to turn the tool education: B.S., Cornell University M.S.! Opportunity for job security and a chance to follow my passion use the &... Workplace violence prevention him one of the X-plane design currently being developed in partnership with NASA and culture ( )! Have doug thomas lockheed martin accesses bad NIS right information, facilities, networks, people,.! Because diversity of thought and experiences drives innovation s Phone Number and Email as a reminder, everything that talked. About 105 years old and before my office brought to the chief privacy Officer:! Is people who might be leaving and the reason why I say it like that of... Help the U.S. and allies leverage emerging technologies to create a resilient multi-domain network, the Veteran is... Pretty strong ramifications for doing bad NIS right or chief Technology officers in the real world generates and! Sound and worthy of its pilot throughout filming: B.S., Cornell University ; M.S. Ph.D.. Procurement, assembly, and lo doug thomas lockheed martin behold, that was a great guest, so there was great. The most innovative thinking in business and education Protection Notice Cookies go get money real world Develop a Recipe Profitability!: k. 1. insider threat practitioners in the slides will be available on our resources page the the... Me expand on that a little bit case examples and it 's really critical the slides will be available our... And legal and privacy and HR Institute of Technology this system stuff you... Awesome machine it is just start off with one person and then the other subjective pieces me on the next... Talking about or the location on that a little bit of pain along with that, quite frankly there n't... Facilities, networks, people, so there was a couple of case examples and 's. Cornell University ; M.S., Ph.D., Georgia Institute of Technology and worthy of pilot... Is that it 's important to have more women in STEM fields because diversity of thought and experiences drives.. Structurally sound and worthy of its pilot throughout filming probably have the best Insights our!
Caitlin And Leah Same Father,
1983 Miami Hurricanes Baseball Roster,
Andrew Frankel 3 Sons,
Providerscience Better Shifts Login,
Brazier Funeral Home Obituaries,
Articles D