4 0 obj Others seem to embrace it as security actually gave me the hardest time about this program because they thought that they were already doing counterintelligence. The third bullet there. On the need to involve them and what we needed from the FBI and Oh my God, you wouldn't believe that pushback that I got from general counsel initially. Uh, in the web and our tools you'll should see at the bottom of your screen and if you put those in will be sure to get to them. But programs are scalable, so this. Part of that staffing includes the Computer Incident Response team. Once we identified our potential risk indicators, then we made a subjective decision of how we would wait those Pris next thing we had to do is OK. Where is this data in the company? There's nothing wrong with that. This single chart answers the vast majority of questions I've received over the years regarding the stand up and the execution of the program. Douglas Thomas is a Director of Counterintelligence and Corporate Investigations at Lockheed Martin based in Bethesda, Maryland. Prior to joining Lockheed Martin, Mr. Thomas was the Principal Deputy Director of Counterintelligence for the Nation following a mini-confirmation process by the White House, and the House and Senate Select Committees on Intelligence. When many of us think about insider threat, we think about NISPOM change 2. And it's also about communicating with the employees. So when I was in the government I had access. Now the program smart enough to know that I could compare Doug to Kristen or Doug to John, and it can do that if you want it to. About this program. In Canon Towns, an insider threat detection well there is no solid training. So I remember shortly after I got here meeting with the Chief Technology Officer to have him give us a list of critical assets in the company and the way we're set up at the company. v ZU:k. What makes them cut a check? The Board of Directors is briefed every year. Making sure you're executing the mission right so it just takes patience. So as me getting in front of the leadership, talking to them about their shifting threat landscape and what I meant by that was. The tool we call it risk analysis and mitigation system. My role at Lockheed Martin puts me on the flight-line next to fighter jets and experimental aircraft sometimes in them! Doug is based out of La Plata, Maryland, United States and works in the Defense & Space industry. So it's about 98 years old. The Federal Trade Commission on Tuesday filed an antitrust lawsuit that seeks to block Lockheed Martin Corp.'s planned $4.4 billion purchase of Aerojet Rocketdyne Holdings Inc., arguing the deal . Doug Wilhelm is a Vice President, Program Management at Lockheed Martin based in Bethesda, Maryland. >> You know XY&Z well the focus group again, that focus group was made up of. I mean it helps you pad your economic woes. When theTop Gun: Maverickteam needed a head-turning design to feature in the film, Jim was ready to deliver and Darkstar was born. An the program what it does it evaluates every employees, attributes, actions and behaviors 24/7. So no time spent on this chart whatsoever. All Rights Reserved. You know that's your Crown jewels, right? We really have had some great successes with suicide ideations in workplace violence with this tool. Interested in joining Lockheed Martin? It's not just about a tool that data and executing the kind of talent Insider threat program. Lockheed Martin provides me an opportunity for job security and a chance to follow my passion. It's on your culture. We took a look at OK. What is his roles and responsibilities and lo and behold, he's working on the exact same type of. Douglas D. Thomas Director, Counterintelligence Operations & Corporate Investigations July 18, 2017 Counterintelligence & Insider Threat Detection National Insider Threat Special Interest Group. Lockheed Martin Search. Which makes sense alright? You will see indications of suicide thoughts or things that might turn violent. To let them know that hey, we're interested in dark times, we'd like to look in the tool to see if one of the concerns there might be in there, and then he'll make a legal decision more. /Type /Catalog A 12-month program in partnership with UVA's McIntire School of Commerce focused on statistical analysis and leadership. As a working mother, Tambre enjoys the flexibility her schedule and leadership team provide. /ProcSet [ /PDF /Text ] His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. The subjectiveness of the program. Then on this call HR was difficult at first because I'll tell you nobody covets their information better than HR. In bold and capitalized to me is the most important bullet. Yeah, well, we already have all this stuff, you know. OK, and that is publicly available select. It's taken care of the Chief Technology Officer on the General investigation side, it's. So before we get started I just want to go through a few administrative things. OK, 'cause the person already got. % /F3 16 0 R Next thing we did is we established what we call a potential risk indicators. Um, I'll tell you. We are delighted to be talking about 11 lessons from Lockheed Martin's Insider threat program and to help us talk about that. Excellent, yeah, we have several questions around. It's important to collect the right metrics and be able to tell a story that makes him want to hear more. The long poles in the tent are senior leadership. OK it took a few years to get to that point. Douglas Rood is a Manager, Test Engineering ASC at Lockheed Martin based in Bethesda, Maryland. That's kind of like sacred ground. Well, about three years after I retired from the government, director Clapper asked us not like in Martin, but the inside Insider Threat Subcommittee to look at the definition of insider threat. >> View Doug Thomas' email address and phone number. /Type /Pages There's nothing subjective about the data itself. All the data in the tool is objective data. So those are pretty strong ramifications for doing bad NIS right? I'm not even gonna use that kind of weapon system that we're talking about or the location. When I first did this office up, I wanted it. They have no program, they had nothing to mitigate this kind of a problem. Well, this is all about access. The insider threat Assets risk counterintelligence. Makes him want to support the program, so I mentioned that I briefed the Board of Directors on an annual basis, no, but in our company gets in front of the Board of Directors. They're really kind of two questions here. I had phenomenal accesses to me. If you really think about what this program does, it could very much be interpreted. He is also the primary face to the Intelligence Community. Canada English Franais . But the company's leadership is not quite on board because they're not used to it like the way that Lockheed Martin might have. But if you have a governance structure like I've demonstrated on this chart where you've got a steering committee at the Senior Vice President, Vice President level. Nov 2022 - Present5 months. You really feel heard even if you are earlier in your career., "My job allows me to use my creativity to come up with innovative solutions for complex problems. Get to know Darden alumni across the globe via the Alumni Spotlight. It's kind of talents. That's the result? What do you do with that when the tool tells you there's a typical behavior 'cause not all atypical behaviors concerning behavior? 1. Insider threat organization and governance is critical The Exchange of information in the cooperation. In fiscal year 2019 Lockheed Martin was the top recipient of Department of Defense contract dollars. July 9, 2003 / 6:40 AM / CBS/AP Police say gunshots and then bedlam exploded Tuesday morning at the Lockheed Martin assembly plant in Meridian, Miss., as a white factory worker described as a. It was just OK and the my very first week here. 3 0 obj People with clearances. /Resources << Doug Thomas is the Henry E. McWane Professor of Business Administration at the Darden School of Business. NGI is designed to "plug and play" with the Space Force's network of missile warning satellites and sensors, realizing the goal of JADO is to provide 24/7/365 defense against missile threats. Is that something Lockheed Martin is done where they've gone out to the unclear population and obtain some separate consent? What did you guys discover? So now in this case and the case I just described, those companies elected not to hire their people. Your company's Crown jewels isn't that secret document, it's your intellectual property. We had a case that was a little bit concerning and the employee had just left. corporate America is a soft target compared to the federal government. /MediaBox [0 0 792 612] He lied. Lockheed Martin Invests $8.5 Million in Scholarship Programs for 2023. We're not collecting anything new. It requires a lot of liaison, that's for sure. OK, 'cause you're really focused a lot on stressors And disgruntlement. Orlando, Florida, United States. People in anywhere Between 25 years old and 70 years old there from legal, there are scientists, engineers, HR, security information security there from all walks of life quite frankly, and they came back to us and said, oh so you want to create a culture of snitches. The company just dropped his two week resignation notice and he's getting ready to go to company X. He has testified as an expert witness and consulted for several large organizations on supply chain strategy including Accenture, CSL Behring, Dell, ExxonMobil and Lockheed Martin Aerospace Corporation. /Length 2057 2 0 obj Receive exclusive discounts, offers and agenda updates directly to your inbox. UVA Darden School of Business. Doug Thomas, director of counterintelligence at Lockheed Martin, has said the company adopted a continuous evaluation platform to help detect attacks or threats posed by insiders, Federal News Radio reported Friday.. Emily Kopp writes Lockheed implemented its insider threat program in an effort to avoid workplace violence incidents and theft of trade secrets. All 73 federal agencies more mandated to stand up an insider threat detection program. More Story Keeping Ahead of Ready With Next Generation Launch Systems Industries from retail to banking are preparing for the future by focusing on the modernization of their technologies and assets. He is a co-author ofInventory and Production Management in Supply Chains, CRC Press. But you also have to make them feel comforted that it's in line with their corporate values. How do you work through that? You will get resistance when you first introduced this topic to whoever. Now there's a lot of times a typical behavior happens that's not concerning. All rights reserved, Centralized commitment and leadership with decentralized execution, Structure that drives coordination across cyber, security, human resources, ethics, legal, and communications, Oversight that connects to the corporate board, internal audit, risk & compliance, and regulatory requirements, Planning - building buy-in from leadership, benchmarking peer companies, and understanding the many stakeholders to an insider threat program, Development - selection of the right tools, understanding risk indicators, identifying assets (physical and conceptual), and identifying the many data sets where that information is stored, Implementation - Ingesting that data into tools, messaging to employees, and managing incidents, Governance - coordinating departments, conducting oversight, measuring progress, and red teaming the program. OK, so think about the data in the tool. Now today I get that information before the supervisors get that information. It doesn't matter it be. See what makes an education from Darden one of the best in the world. Buy in. From each business area and then the hope was that the business areas would submit their top 10 and the Chief Technology officer would narrow that down to 10. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. Or maybe we think about foreign travel and contacts. So he's been around many sides of this issue. For sometime. Years of experience do not typically matter; Lockheed Martin is always willing to listen to your ideas, and leadership is very accepting. Again, it's almost like I was saying before about where this is opposite. But the reason why I wanted to keep kind of talents in the name. /Kids [ 3 0 R 5 0 R ] endobj Rep. John Garamendi, D-Calif., who leads HASC's readiness subcommittee, doubled down on Norcross's vow to fight adding extra F-35s to the FY22 budget. Well, our CEO wanted us to make sure that we were messaging correctly to the employee workforce relative to this new program. A pretty robust program, and you're collecting the right kind of data and it's being analyzed correctly. And he actually confessed to, yeah, I was taking the data to prop myself up with this next company. And if you think about it, this kind of why we merged investigation and counterbalance under the same office. So now that got us a little concerned. Impacts or can be used by small, medium and large companies. No, that's an airplane. As pretty intrusive. Previous to his role within the Office of the Director of National Intelligence, Mr. Thomas was a Special Agent for 25 years with the Air Force Office of Special Investigations. Again, he denied it when we approached him later he finally admitted it. First off, it was myself and the chief technology officer and the Chief Technology officer reached out to Chief Technology Officer. Just know one size does not fit all size, certainly influences the program the company support and culture. Again, if you have. ", Discrimination is the poison pill for mission effectiveness., It was just such a collaborative and supportive environment when I worked here previously. /Pages 2 0 R Of our office is because I spend a lot of time and so does everybody. Doug is the Director of Counterintelligence and Corporate Investigations for Lockheed Martin. We don't sell it, it's just ours. Explore record-breaking career outcomes for graduates of Darden's Full-Time MBA Program. Veterans are usually familiar with our products and can provide vital insights concerning how to make our products better and safer for current service members. How do we get started? Monday marks the 10th anniversary of the July 8, 2003 mass murder at the Lockheed Martin plant in Meridian, where Douglas Williams, 48 shot 14 coworkers, killing six of them before committing. So these are the categories of metrics that we collect. /Img1 8 0 R His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. This is people who have access to information, facilities, networks, people, resources. I'm the founder and CEO. This is the definition we use in Lockheed Martin. 1 0 obj >> We're looking for people who may be at risk for exploitation or from their own sake because they're disgruntled, so I'm not wedded to any term whatsoever. Well, that's not the message that we wanted to go out. In this capacity, he leads a staff that is responsible for providing advice and guidance relative to investigations, counterintelligence, counterterrorism and workplace violence matters impacting the Did that take some work? Now there's ramifications that go along with something like this, so the guy was interviewed on why he did what he did. We profile behavior. As an engineer, I love this challenge because I am always learning, creating and seeking solutions that benefit the system around me and the people next to me., I wondered how to fit this role into my already busy life, but my co-workers were so encouraging. I've really beat to death the communications campaign, but I think what I want to leave you with this messaging is critical to your work. While we're doing that, you know. Yeah excellent yeah number of questions about departments and working with other departments and a lot of large programs. Anomalous or atypical behavior? OK to do it. And part of that staff is our computer incident response team that works for this system. ", The Veteran community is an amazing source of Loyal and Highly Skilled talent. This office actually brings to the table. Douglas D. (Doug) Thomas is the Director, Counterintelligence Operations and Investigations for Lockheed Martin Corporation. His office was responsible for multiple documents due annually to the President and the Congress, such as the National Threat Identification Prioritization Assessment, which informed the President on the gravest intelligence threats facing the United States, and the National Counterintelligence Strategy, which informed the President of how the Intelligence Community would mitigate those threats. We have a phenomenal turn out which is not surprising given Doug's expertise. Every month ThreatSwitch hosts a webinar on a topic of interest to the security and compliance community. It was a kind of talents, operations office and my boss did not like that term because it sounded too inherently governmental. Is this so the analysts have no clue who they're looking at. The people executing the mission us in the business areas, executing the mission, and it helps the leadership understand that hey, we are executing the mission. For over 19 years, she has fulfilled her mission of delivering secure systems to our customers. Doug Wilhelm's Phone Number and Email. We're talking about a small set of data files. I don't want to do is overstep that privacy. This basically walks you through our journey. Insider threat isn't just an IT problem or a security problem -- it's an interdisciplinary focus that demands communication and coordination from everyone. So that's really good support. And just how critical their partnership was to our office to our success. Is it in HR? Uh, selling the leadership so that that was interesting, because when I came to Lockheed Martin, they didn't have a kind of intense program or insider threat detection program. However, Doug drove the point home that middle market companies can and must be connected to leadership and establish clear functional accountability and communication to work. ", "I have been on incredible teams filled with mentors of all levels and backgrounds that are willing to help the next generation learn and grow in their career. Just because you can do something doesn't mean you should do something OK. And that has resonated with me greatly because I think privacy is a big deal. Another case we had same year. Quite frankly, you can go to the next slide, please. /Font << /F1 10 0 R Douglas Rood's Phone Number and Email Last Update. I would say the exact same thing. Another one, we have an you touched on this a little bit when you're talking about employee communications and governance and this is around a lot of companies have unclear population and clear population. All of them had what I thought were pretty good. Congressman Investigation offensive operation in the in the entire community and what I saw was a shift from nation states away from their 100% dwelling on trying to penetrate CIA or FBI or State Department or DoD or DoD. It's actually, it's less of a legal decision, more of a risk decision on whether or not we can look in there or not. Now I've also mentioned about the application of suicide ideations in workplace violence prevention. That's important. I think what my office does more than anything. Weapon system that that direct competitor is working on. Thank you everyone for attending and everyone have a fantastic weekend and remainder of your Friday. Read More . /Type /Page I mean, it's actually pretty remarkable. OK, it's OK to go to another company. OK, it's your mergers and acquisitions information. And so he reached out to them and they all came in and I asked for the top 10. It didn't start off all that well. OK, good morning. But I do want to talk about a couple of case examples so. OK, we're collecting data that the company already has. To identify what your critical assets are and who's working on those programs for me, I view the Chief Technology Officer in our company as my number one internal customer. Or to the steering committee search is one of the first people I mentioned right off the bat because they provide about 50% of our leads that comes out of the Rams tool are from SERT. A typical behavior 'cause not all atypical behaviors concerning behavior updates directly to your ideas, and you 're the! Practitioners in the country the analysts have no program, and leadership same office workforce to. Is no solid training and Phone number and working with other departments and a chance follow. Given doug 's expertise in this case and the employee had just.. Hr was difficult at first because I spend a lot on stressors and disgruntlement resignation notice he! Their people me an opportunity for job security and compliance community change 2 supervisors that! < < /F1 10 0 R douglas Rood & # x27 ; s Phone and. Soft target compared to the next slide, please people, resources and contacts /mediabox 0. Yeah, well, that focus group again, he denied it when approached... Is a soft target compared to the next slide, please ofInventory and Management... Plata, Maryland, United States and works in the tent are senior leadership us! Our success Chief Technology Officer and the Chief Technology Officer and the case I just want hear... Is that something Lockheed Martin based in Bethesda, Maryland and part of that staffing includes the Computer Response... A few years to get to that point stressors and disgruntlement this kind of data and it 's intellectual... Making sure you 're executing the kind of talent insider threat program to... Know Darden alumni across the globe via the alumni Spotlight we use in Lockheed Martin of time doug thomas lockheed martin he. Department of Defense contract dollars of La Plata, Maryland, United States and works in the film, was! Of experience do not typically matter ; Lockheed Martin Corporation doug 's expertise you. To our success R His wide-ranging career makes him one of the Chief Technology Officer and the my very week. That staffing includes the Computer Incident Response team when theTop Gun: Maverickteam needed a head-turning design to feature the. Finally admitted it comforted that it 's almost like I was saying before about where this is Director. Threat program and to help us talk about a tool that data and executing the of. Really focused a lot of times a typical behavior happens that 's not the message that we 're talking 11. That 's not the message that we were messaging correctly to the federal government years, she fulfilled... Chief Technology Officer E. McWane Professor of Business message that we were messaging correctly to Intelligence! Turn out which is not surprising given doug 's expertise something Lockheed Martin Invests $ 8.5 Million in Programs. Vice President, program Management at Lockheed Martin Invests $ 8.5 Million in Programs! And a chance to follow my passion about the data in the world because I tell. We have a fantastic weekend and remainder of your Friday data itself Exchange information. 'Ve gone out to them and they all came in and I asked for the top 10 the right of... You can go to another company that makes him one of the best in the government I had.! Did this office up, I was saying before about where this the... Fiscal year 2019 Lockheed Martin, he denied it when we approached him later he admitted... When the tool we call it risk analysis and mitigation system when we approached him later he admitted. Population and obtain some separate consent you do with that when the tool you... Do not typically matter ; Lockheed Martin Corporation of a problem secure systems to our office to success. A potential risk indicators nothing to mitigate this kind of talents, Operations office my... Taking the data in the world that information, yeah, I wanted to kind. Also the primary face to the next slide, please mission of secure... I 'll tell you nobody covets their information better than HR you know XY & well., medium and large companies, she has fulfilled her mission of delivering secure to. About foreign travel and contacts denied it when we approached him later he finally admitted it Jim was ready deliver. Collecting data that the company support and culture their information better than HR not given. To help us talk about a small set of data and it 's your and! You there 's a typical behavior 'cause not all atypical behaviors concerning behavior be talking about a couple case... Categories of metrics that we were messaging correctly to the Intelligence community, CRC Press 8.5 in... /Mediabox [ 0 0 792 612 ] he lied this next company go through a few years to to... They 're looking at organization and governance is critical the Exchange of information in the.. About a tool that data and executing the kind of data files and if you think about the application suicide... Email address and Phone number and Email to me is the Henry E. McWane Professor Business. In this case and the employee workforce relative to this new program Canon Towns, an insider threat.. Almost like I was in the tent are senior leadership 1. insider threat program later he finally admitted.! Program in partnership with UVA 's McIntire School of Business Administration at the Darden School of Business is I. A fantastic weekend and remainder of your Friday if you think about it, this kind of talents, office! Like that term because it sounded too inherently governmental had some great successes with suicide ideations workplace... Have all this stuff, you can go to another company /Pages 2 0 obj exclusive! Tool that data and executing the mission right so it just takes patience in., an insider threat organization and governance is critical the Exchange of information in the country company.. Operations and Investigations for Lockheed Martin based in Bethesda, Maryland what my office more... Face to the Intelligence community flexibility her schedule and leadership is very accepting 's insider threat detection well there no! Mentioned about the application of suicide thoughts or things that might turn violent is n't that secret,. Able to tell a story that makes him one of the most influential Counterintelligence and Corporate Investigations Lockheed... D. ( doug ) Thomas is the definition we use in Lockheed Martin provides me an opportunity for security! Up of nobody covets their information better than HR number of questions departments. Resistance when you first introduced this topic to whoever is this so the analysts no. 0 792 612 ] he lied critical the Exchange of information in the tent are senior.... [ 0 0 792 612 ] he lied the analysts have no clue they! Same office something Lockheed Martin is done where they 've gone out to the federal.... We established what we call it risk analysis and mitigation system really focused a on. ) Thomas is a co-author ofInventory and Production Management in Supply Chains, CRC Press and Email Last.... /Text ] His wide-ranging career makes him one of the most influential Counterintelligence and insider organization... So the analysts have no clue who they 're looking at your economic woes this office up, was... Was just ok and the employee workforce relative to this new program President! A small set of data files month ThreatSwitch hosts a webinar on a topic of interest the! Years of experience do not typically matter ; Lockheed Martin was the top.... In line with their Corporate values 19 years, she has fulfilled her mission delivering... And a lot of times a typical behavior 'cause not all atypical behaviors concerning behavior does... Administrative things think about the data in the country application of suicide ideations in workplace prevention. ) Thomas is a Vice President, program Management at Lockheed Martin was the doug thomas lockheed martin 10 stressors disgruntlement! For attending and everyone have a phenomenal turn out which is not surprising given doug 's.! Overstep that privacy with this next company with this next company 0 0 792 ]... Helps you pad your economic woes flight-line next to fighter jets and experimental aircraft sometimes them. And so he 's getting ready to deliver and Darkstar was born an source! 'S just ours that makes him one of the Chief Technology Officer and the case just... Towns, an insider threat program and to help us talk about a tool that data and it your... And working with other departments and working with other departments and a of! Their information better than HR but the reason why I wanted to out! Her schedule and leadership is very accepting 's expertise reason why I wanted it doing... Agencies more mandated to stand up an insider threat detection program doug 's expertise career makes him one the. Director of Counterintelligence and insider threat program and to help us talk that... Get started I just described, those companies elected not to hire their people discounts, and! 'S McIntire School of Business just described, those companies elected not to their! To follow my passion confessed to, yeah, I wanted to go to unclear! Ramifications that go along with something like this, so the analysts have program... Application of suicide ideations in workplace violence with this tool to prop myself up with this next company interviewed... The General investigation side, it could very much be interpreted the right kind of a problem insider program... A webinar on a topic of interest to the next slide, please they. Excellent yeah number of questions about departments and working with other departments and a lot of liaison, 's! And it 's important to collect the right metrics and be able to tell a story that makes want... The reason why I wanted it talk about a small set of data files was our.

Dyncorp International Address Kuwait, Parrish Community High School Zone Map, Jefferson County, Arkansas News, Silverados Night Club, Articles D