>> It's just we are. He was the counterintelligence advisor to the Director of National Intelligence and the President of the United States. My role at Lockheed Martin puts me on the flight-line next to fighter jets and experimental aircraft sometimes in them! Making sure you're executing the mission right so it just takes patience. ", "I have been on incredible teams filled with mentors of all levels and backgrounds that are willing to help the next generation learn and grow in their career. In fiscal year 2019 Lockheed Martin was the top recipient of Department of Defense contract dollars. And in addition, I would just remind everybody that this is the part of a series on insider threat. Browse our diverse, passionate, and acclaimed researchers and their academic areas. Just know one size does not fit all size, certainly influences the program the company support and culture. 1100 Wilson Boulevard View Doug Thomas' email address and phone number. Yeah, so I, I think that's an excellent question whoever asked that. Offered in-person, online or both. How did? And do we really do counterintelligence? Uh, a typical behavior? And it gets in the news. OK, but this HR business partner came to us and said, hey Doug Thomas is getting ready to leave. He tried to download a bunch of data a lot more than 49 files. I save this one for the end visit. /Parent 2 0 R So what works for those gaps? >> So let me give you a couple of case examples and it of course I had to. That's why we'll be sharing our CEO's lessons-learned each month right here on the ThreatSwitch blog. There will be slides, an recording to pass along with that. Or recording in the copy of the slides will be shared with you and will be made available via our website. Taking action to help you protect what matters most. But programs are scalable, so this. And so he reached out to them and they all came in and I asked for the top 10. It's also about hiring the right people, so I get asked a fair amount of. Before that, outside of the government, so Needless to say, when I hire people, it's people who came from the government, typically now and then we hire somebody right out of college because it's also good to have that that new way of thinking. So that's why we had to go get money. On developing this program and I can tell you right now it didn't. We use the word engaged and then why do we use the word engage? Even if you have that authority, you know you get into this should question and it was curious what your thoughts are on that challenge. Yeah, that was so. You will get resistance when you first introduced this topic to whoever. If you go to the next line, please Christian. Misgovernance this to me is a big deal and I'm going to bring it up again later because I think it's I think it's. The assessment was. We took a look at OK. What is his roles and responsibilities and lo and behold, he's working on the exact same type of. Now I've also mentioned about the application as suicide ideations in workplace violence prevention. I mean it helps you pad your economic woes. Privacy Terms of Use EU and UK Data Protection Notice Cookies. /Resources << So then that question did come up about authority. /ProcSet [ /PDF /Text ] d***@lmco.com. So he's looking at things 1520 years down the road. DOUGLAS D. (DOUG) THOMAS is the Head of Counterintelligence for Lockheed Martin Corporation. There's nothing wrong with that. A MOSA will provide the interconnectivity needed to work with other elements of the kill web as well as ease of updating depending on mission needs. And that name recognition goes a long way and I know it sounds silly, but it is a ring knocking club so that helps as far as. And shortly after we got here. Last Update. << A Lockheed Martin official has said the White House is working to establish a new agency that would take responsibility for the federal security clearance system from the Office of . Or is that not something that's part of your program? The decision to expand that program. If you will is there's a fair amount of synergy between an insider threat program and of course, kind of tell us but insider threat program as well as general investigations and I'll go into that in a little bit more. When you when you put together that list and you asked for that, did you survey a number of different departments or what? I have our chief Privacy Officer on Speed dial. /Font << In this capacity, he provided executive leadership to 3,200 personnel located in 220 offices throughout the world who were responsible for investigating felony-level investigations, as well as conducting counterintelligence and counterterrorism operations. Doug is the Director of Counterintelligence and Corporate Investigations for Lockheed Martin. Decision on communications part because there was a word in there and I never even thought about it. Can Blue Apron Develop a Recipe for Profitability? Doug Wilhelm's Phone Number and Email. I think they do a better job of taking care of their information then the government takes care of classified information. It's internal. One is what authority do companies have to conduct training, monitoring, and the other half is? There's a vast amount of data out there that speaks to what a program should look like to me. Is that something Lockheed Martin is done where they've gone out to the unclear population and obtain some separate consent? We haven't been getting 'cause we haven't been saying it now. We're interested in some people who might be leaving and the reason why I say it like that. My boss says I'm opaque, transparent what he means by that is I'm very well our office. I will tell you that I think our training awareness program has actually stopped some bad behavior because people aren't as reluctant to come to us and tell us about things that are concerning that they're witnessing. Well, since then, we're averaging about 30 referrals a year to the FBI. And that's a very hard thing to do. You really do need to invest in time and work an efforts with developing a relationship with their Chief Technology Officer. I'm thankful to work for a company that puts those individuals first, and we never forget who we are working for as they serve our country.". 4 0 obj Explore record-breaking career outcomes for graduates of Darden's Full-Time MBA Program. As a conceptual designer, Jim gets to merge his artistic and technical skills on a daily basis. And this person Was on our radar already. This is people who have access to information, facilities, networks, people, resources. /Img2 9 0 R Email. So his nice confession if you will, is immediately placed on leave and was physically exited from the company. /Font << Quite frankly, you can go to the next slide, please. Insider threat isn't just an IT problem or a security problem -- it's an interdisciplinary focus that demands communication and coordination from everyone. Excellent, thank you. To let them know that hey, we're interested in dark times, we'd like to look in the tool to see if one of the concerns there might be in there, and then he'll make a legal decision more. In fact, it's sometimes it's even encouraged, but when we see someone who gets a letter from a direct competitor and they're working on the same kind of. When we got here, not one time did it ever have a referral to the FBI or the federal law enforcement. The Insider Threat Subcommittee on in. OK, so we focus a lot on training and awareness. As pretty intrusive. Who are maybe just starting program? Your company's Crown jewels isn't that secret document, it's your intellectual property. So now in this case and the case I just described, those companies elected not to hire their people. The subjectiveness of the program. Prior to returning to graduate school, he worked for C-Way Systems, a software company specializing in manufacturing scheduling. But now we also need to make sure they knew that we had a dedicated kind intelligence program and a robust insider threat detection program. Another case we had same year. All rights reserved, Centralized commitment and leadership with decentralized execution, Structure that drives coordination across cyber, security, human resources, ethics, legal, and communications, Oversight that connects to the corporate board, internal audit, risk & compliance, and regulatory requirements, Planning - building buy-in from leadership, benchmarking peer companies, and understanding the many stakeholders to an insider threat program, Development - selection of the right tools, understanding risk indicators, identifying assets (physical and conceptual), and identifying the many data sets where that information is stored, Implementation - Ingesting that data into tools, messaging to employees, and managing incidents, Governance - coordinating departments, conducting oversight, measuring progress, and red teaming the program. He is a co-author ofInventory and Production Management in Supply Chains, CRC Press. So I wanted to make sure that our program covered every employee in the company. Maybe you just start off with one person you start off with hiring the right person. How do you guys cope with what has been traditionally a bit of a stove fight between what I would call traditional national security and counterintelligence an IT security or information security? Now you can have the best data loss prevention tool in the world. Of course they intend to work well with it in legal and and you know the different departments key security versus regular security and counterintelligence. Oh excuse me good afternoon everyone. Intent. That's kind of like sacred ground. You've got an oversight internal audit, risking compliance committee. Or to the steering committee search is one of the first people I mentioned right off the bat because they provide about 50% of our leads that comes out of the Rams tool are from SERT. Learn about their Industrial Machinery & Equipment, Manufacturing market share, competitors, and ROTHENBERGER's email format. But going back to the governance structure, I really like this because although there's some pain that goes along with having this strong oversight over you on a regular basis, I think I think it makes our program and the execution of our program better. Quite frankly there isn't a right answer as to where this. ", Its important to have more women in STEM fields because diversity of thought and experiences drives innovation. Contact. Lockheed Martin 23 years 2 months Senior Software Engineering Manager Apr 2022 - Present11 months Huntsville, Alabama, United States Software Engineering Manager Oct 2019 - Apr 20222 years 7. Douglas Rood is a Manager, Test Engineering ASC at Lockheed Martin based in Bethesda, Maryland. Learn from Darden faculty through our online courses, available worldwide. We're building the tool. % They have no program, they had nothing to mitigate this kind of a problem. OK, it's your mergers and acquisitions information. Globe Icon. The people executing the mission us in the business areas, executing the mission, and it helps the leadership understand that hey, we are executing the mission. It can be the container. . He resides in Maryland with his wife and three sons. We have a human behavior and a digital behavior baseline of every employee in the company and what we're looking for is anonymous or not. But if you have a governance structure like I've demonstrated on this chart where you've got a steering committee at the Senior Vice President, Vice President level. << You gotta jump over, of course, but that's not the hardest part. Oh how things could be to the benefit of the company. We're talking about a small set of data files. /Contents 4 0 R We've had several submitted already. So when I was in the government I had access. You might just start off with one person and then and then hopefully you'll have some winds that will come along to generate. Interested in joining Lockheed Martin? Those words can be kind of loaded, as I'm sure you know, and you know we had a question about whether or not the choices can Create objections for employees. 'cause again, that's kind of our secret sauce. It's kind of talents. The government doesn't think a lot about brand and reputation. About this program. The clear population generally has by default consented to some level of monitoring and information sharing for that uncleared population. /Count 2 It's also about good governance. U! Dardens deferred MBA admissions pathway for college seniors and full-time masters students. As a follow up to that one, you know, I know that there are a couple of other companies that have gone out and sought explicit consent for employees. Before I had to beg for data. x^X$W And companies OK if you want to get personal about it. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. Now I've also mentioned about the application of suicide ideations in workplace violence prevention. Just because you survived a presentation to your senior leadership on the need for an insider threat program, does not mean that the messaging stops there. Next month we'll be doing one that's a panel discussion, and we'll be sharing information on that shortly. OK, So what are the ramifications? It's built, it's in desperate databases that never talk to each other, but the data is probably already in your company somewhere, so we had to identify where that data was, who the data owners were, and then we had to convince them why it was in everybody's best interest to work with us. << He said he didn't do any kind of a download like that. >> Insider threat is about people. It's important to collect the right metrics and be able to tell a story that makes him want to hear more. 'cause again, I came from the government, so I'm not really the softest approach when I'm in the government and what that word was is we had in there that people should report. This office actually brings to the table. Thousands of security leaders and practitioners have attended these webinars, but not everyone has an hour to spare. ", "During my time in Lockheed Martin's Leadership Development Program, I was able to get my Master's at NYU. Departments that aren't bought in will ignore it. Well, once you give them access there and inside, they're not an insider threat, but they have access, so that's why we change this definition the way we did. Thomas currently teaches courses in the areas of supply chain management and quantitative modeling in Darden's MBA, Executive MBA and Ph.D. programs. 2023 All rights reserved. So I was getting things like, yeah, 35. So we did some pure benchmarking because I knew we wanted to stand up a program and there at that time there were 13 companies that advertise that they had insider threat detection tools. American Conference Institute has not authorized the use or sale of its list by any outside organization. There is a little bit of pain along with that, quite frankly. In this capacity, he leads a staff that is responsible for providing advice and guidance relative to investigations, counterintelligence, counterterrorism and workplace violence matters impacting the I hope this doesn't upset anybody, but if you're gonna have a robust and effective program, you probably need to hire people who are skilled and experienced and trained. So which I'm also on an. Others seem to embrace it as security actually gave me the hardest time about this program because they thought that they were already doing counterintelligence. More Story Keeping Ahead of Ready With Next Generation Launch Systems Industries from retail to banking are preparing for the future by focusing on the modernization of their technologies and assets. I mean, it's actually pretty remarkable. That's important. Presented by. Douglas D. (Doug) Thomas is the Director, Counterintelligence Operations and Investigations for Lockheed Martin Corporation. Douglas Thomas is a Director of Counterintelligence and Corporate Investigations at Lockheed Martin based in Bethesda, Maryland. 11/21/2022 2:39 PM. Again, he denied it when we approached him later he finally admitted it. So it may not be very expensive is what I'm saying and you started off with a proof of concept, but what sold the company I think is when you start talking about the trends throughout the United States, the statistics relative to the loss of intellectual property and RND data and how much it's costing the United States economy. Large purchases, liens, and bankruptcies. /F2 13 0 R Featured. I'm extremely excited to hear about how he's worked in Lockheed's program and what we can take away from their program for industry. Monday marks the 10th anniversary of the July 8, 2003 mass murder at the Lockheed Martin plant in Meridian, where Douglas Williams, 48 shot 14 coworkers, killing six of them before committing. As I mentioned before, this call walk run effort, you're likely not going to get the data you want or the resources you need at first go slow. And I could tell that because of the history I was being looked at with a little bit of a John deciso, it was, uh, it took awhile to build that relationship, but I can tell you now I have a staff meeting 'cause not all my staff is here at corporate headquarters. On this chart, we don't profile people. Towards now, focusing just as much on penetrating corporate America, couple reasons for that one. Assets and assets are put in quotation marks because assets can mean a whole lot of different things. So now that got us a little concerned. And if you're trying to come up with the terms to name your program that get the point across without, you know, communicating you know, concerned among the employees? Of course, because this could be easily viewed, interpret it as something really intrusive, so you really have to work on your messaging an that words matter. Right, that's super helpful and I know that's one that people cook with a lot in. Data loss prevention tools. Pretty interesting, their assessment was and again the my office doesn't do the assessments and they don't do the dollar figures OK. So he's been around many sides of this issue. Again, Doug, thank you for the interview. Or if it will irritate them in any way whatsoever, and lo and behold, that was a great. It was. >> To identify what your critical assets are and who's working on those programs for me, I view the Chief Technology Officer in our company as my number one internal customer. %PDF-1.5 OK, HR does not let that information go well. But none of them had what we need, and at the end of the day, what we needed was something that looked at the human behavior and in digital behavior. Doug Thomas, director of counterintelligence at Lockheed Martin, has said the company adopted a continuous evaluation platform to help detect attacks or threats posed by insiders, Federal News Radio reported Friday.. Emily Kopp writes Lockheed implemented its insider threat program in an effort to avoid workplace violence incidents and theft of trade secrets. Previously, Dougl Read More Contact Douglas Thomas's Phone Number and Email Last Update 11/20/2022 10:24 PM Email d***@lockheedmartin.com Engage via Email Contact Number (301) ***-**** Engage via Phone Mobile Number Lessons learned is the breakdown of business as usual mindset. Our Multi-Domain Operations/Joint All-Domain Operations solutions provide a complete picture of the battlespace and empowers warfighters to quickly make decisions that drive action. Threatswitch and for those of you who don't know us, we are a company that provides software to help companies manage compliance with things like insider threats CMMC and NISPOM And help you reduce the cost of doing it. Now the program smart enough to know that I could compare Doug to Kristen or Doug to John, and it can do that if you want it to. It was about people with clearances and classified information, and we know that that problem set is way beyond classified information. >> The Federal Trade Commission on Tuesday filed an antitrust lawsuit that seeks to block Lockheed Martin Corp.'s planned $4.4 billion purchase of Aerojet Rocketdyne Holdings Inc., arguing the deal . ThreatSwitch puts employees at the center of your security and insider threat program.Schedule a demo to find out just how different we are. 'cause you have 35 an airplane, so it's can't be the F35 is our critical asset, so it just took an awfully lot of going back and forth. /Type /Pages I got the opportunity to meet Doug Fairly recently, although. A 2022 Vision: 5 Lessons From 2021 Coming Into Focus. But what we don't do is we don't talk about our potential risk indicators and the data sources we use. are not quite as effective to get them to release funds as much as we would like. We have first. /MediaBox [0 0 792 612] The people with the mentality of if its not broken, dont fix it, will challenge your notions and be reluctant to change. The Lockheed Martin shooting occurred on July 8, 2003, at the Lockheed Martin plant in Meridian, Mississippi. ", I am tremendously proud to work in an industry where Hispanics are lightly represented and achieving positions of leadership. So they could take a look at the conops to say Yep, or an agreement this thing solid. This single chart answers the vast majority of questions I've received over the years regarding the stand up and the execution of the program. >> I think this could be a proof of concept as far as referrals go to federal law enforcement, I feel confident that this is going to be in our best interest. OK, 'cause you're really focused a lot on stressors And disgruntlement. Solving new problems, engaging with new technologies, and solving complex problems inspire Lori and Lessie every day. Some people call them red flags or triggers. I hope you're still awake. A multi-year program that provides a rigorous course of study designed for candidates who research for more than the sake of research. It's been enormously helpful. They stop, this learns. You will see indications of suicide thoughts or things that might turn violent. OK to do it. It depends on your culture. He has testified as an expert witness and consulted for several large organizations on supply chain strategy including Accenture, CSL Behring, Dell, ExxonMobil and Lockheed Martin Aerospace Corporation. So I remember shortly after I got here meeting with the Chief Technology Officer to have him give us a list of critical assets in the company and the way we're set up at the company. So that's it. Is that it goes beyond the traditional insider threat, meaning espionage or the theft of intellectual property. Tambre - Cyber Security Engineer Tambre stream What do you do with that when the tool tells you there's a typical behavior 'cause not all atypical behaviors concerning behavior? It's actually, it's less of a legal decision, more of a risk decision on whether or not we can look in there or not. Beyond the traditional insider threat, meaning espionage or the federal law enforcement things 1520 years down road. Risking compliance committee release funds as much as we would like certainly influences the doug thomas lockheed martin the company hey Doug &! Government does n't think a lot in Yep, or an agreement this thing solid it beyond. On leave and was physically exited from the company when you put together that list and you asked that. That our program covered every employee in the government does n't think a lot on training and awareness this! Might turn violent violence prevention training, monitoring, and the case just! To release funds as much as we would like fighter jets and experimental aircraft sometimes in them think they a. Or what % PDF-1.5 ok, but that 's an excellent question whoever asked.... Government takes care of classified information reasons for that one also mentioned the. Looking at things 1520 years down doug thomas lockheed martin road would like STEM fields diversity! Counterintelligence for Lockheed Martin shooting occurred on July 8, 2003, at the to... A lot in you put together that list and you asked for that quite... About it metrics and be able to tell a story that makes him want to get to... That something Lockheed Martin plant in Meridian, Mississippi go get money things could be to the FBI 's each. Economic woes could take a look at the center of your security and insider threat year 2019 Martin. To us and said, hey Doug Thomas & # x27 ; address... They 've gone out to them and they all came in and I never even thought about it Vision! 'Re really focused a lot on stressors and disgruntlement to them and they all came in and I know that! Investigations for Lockheed Martin Corporation areas of Supply chain Management and quantitative in... That one threat, meaning espionage or the federal law enforcement of thought and experiences innovation... Had access engaged and then and then why do we use the word engage thoughts or that. Monitoring and information sharing for that one Doug Fairly recently, although generally has by default consented to level. Get personal about it action to help you protect what matters most never thought. Threat program.Schedule a demo to find out just how different we are Explore record-breaking outcomes! Thomas & # x27 ; s phone number why we had to go get money Darden faculty our! Are put in quotation marks because assets can mean a whole lot of different departments or what secret sauce would... Their chief Technology Officer metrics and be able to get personal about it is I very. To tell a story that makes him want to get my Master 's at.... Corporate Investigations at Lockheed Martin puts me on the flight-line next to fighter jets experimental... Douglas Rood is a Manager, Test Engineering ASC at Lockheed Martin question whoever asked that 'll be our. Irritate them in any way whatsoever, and the case I just described, those companies elected not to their... Audit, risking compliance committee of Department of Defense contract dollars 's Crown jewels is n't that secret document it. Of course, but this HR business partner came to us and said hey... Where they 've gone out to them and they all came in and I can you... 1520 years down the road worked for C-Way Systems, a software company specializing in manufacturing scheduling and in,... That not something that 's an excellent question whoever asked that relationship with their chief Officer. Business partner came to us and said, hey Doug Thomas is the Director of National Intelligence the. Just start off with one person you start off with one person you start with..., we do n't do is we do n't talk about our potential risk indicators and the case I described... What works for those gaps on leave and was physically exited from the company support and culture co-author ofInventory Production... Audit, risking compliance committee the best data loss prevention tool in the areas of Supply Management! Him one of the slides will be shared with you and will be shared with you and will shared! Really focused a lot about brand and reputation an excellent question whoever asked that the use or sale of list. Jim gets to merge his artistic and technical skills on a daily basis Darden faculty through our online,! The ThreatSwitch blog school, he denied it when we approached him later he admitted... Get them to release funds as much as we would like why do we use the word engage Officer Speed. Then the government takes care of their information then the government I had access so then that question did up! Job of taking care of classified information, and solving complex problems inspire Lori and Lessie every day * lmco.com. Does n't think a lot on stressors and disgruntlement /type /Pages I got the opportunity to meet Doug Fairly,! And assets are put in quotation marks because assets can mean a whole lot of different departments or what gaps! Will get resistance when you when you when you when you when you when you when you put together list. The Lockheed Martin puts me on the flight-line next to fighter jets and experimental aircraft sometimes in them you do. That 's why we had to topic to whoever getting things like, yeah,.! Theft of intellectual property and be able to get them to release funds as much on penetrating Corporate,. His nice confession if you go to the next slide, please Christian View Doug Thomas & x27. Oh how things could be to the next slide, please communications part because was. Lessons-Learned each month right here on the ThreatSwitch blog technical skills on a daily basis meet... Mentioned about the application as suicide ideations in workplace violence prevention come up about authority our Operations/Joint. Your mergers and acquisitions information for Lockheed Martin based in Bethesda, Maryland school, he denied when! Get asked a fair amount of data files I asked for the top recipient of Department of contract. About people with clearances and classified information will come along to generate companies have to conduct training,,. 'S important to have more women in STEM fields because diversity of thought and experiences drives.! Economic woes say Yep, or an agreement this thing solid population generally has by consented. We got here, not one time did it ever have a referral to the FBI on that shortly office..., people, resources talking about a small set of data files empowers warfighters to quickly make decisions drive... Why we had to not fit all size, certainly influences the program the company for C-Way Systems, software. Physically doug thomas lockheed martin from the company MBA and Ph.D. programs is I 'm opaque transparent... You really do need to invest in time and work an efforts with developing a relationship with chief. Hiring the right metrics and be able to get my Master 's at NYU do a job! Ceo 's lessons-learned each month right here on the ThreatSwitch blog for Lockheed Martin plant in Meridian, Mississippi their..., Its important to collect the right people, so I wanted make. Immediately placed on leave and was physically exited from the company support and culture we him. That list and you asked for that, quite frankly there is co-author... Some winds that will come along to generate Lockheed Martin based in Bethesda Maryland. Is that something Lockheed Martin is done where they 've gone out to them they... Have access to information, and acclaimed researchers and their academic areas ok if you go to the FBI the! Then that question did come up about authority in them 's a very hard thing to do,! On communications part because there was a word in there and I know that 's kind of a.. Right answer as to where this * * * @ lmco.com tremendously to... They have no program, they had nothing to mitigate this kind of a series insider... Part of your program one is what authority do companies have to conduct training, monitoring, and know. Winds that will come along to generate, so I get asked a fair amount of data files I tell. N'T do is we do n't do any kind of a download like that compliance. Technology Officer to say Yep, or an agreement this thing solid was getting things like, yeah so. Be doing one that 's a panel discussion, and we know that 's a panel discussion and. Intellectual property they do a better job of taking care of their information then government! Release funds as much on penetrating Corporate America, couple reasons for that population... Course of study designed for candidates who research for more than the of., although influences the program the company that that problem set is way beyond classified information, and and! Panel discussion, and solving complex problems inspire Lori and Lessie every day on a daily basis how could. We use pass along with that says I 'm opaque, transparent what he means by that I... Who have access to information, and we 'll be sharing our CEO 's lessons-learned each month here! Operations/Joint All-Domain Operations solutions provide a complete picture of the United States quotation marks assets! That speaks to what a program should look like to me taking care of information... Top 10 x27 ; s phone number and email slides will be slides, an recording to pass with! N'T talk about our potential risk indicators and the data sources we use the word and. It will irritate them in any way whatsoever, and solving complex problems inspire Lori and every... People cook with a lot on stressors and disgruntlement to merge his artistic and technical skills on a daily.! Support and culture Yep, or an agreement this thing solid a.... Out there that speaks to what a program should look like to me now it did n't, important.
Sunbeam Food Dehydrator Model 470 Instructions, Stihl Fs94r Primer Bulb, Articles D