I'm sure you probably have about another 2 hours of stories and we all would have listened to them, but we booked it for only an hour, which I always feel like is not enough time. But sometimes are fuels to national security and patriotism. I save this one for the end visit. He resides in Maryland with his wife and three sons. Prior to joining Darden, he was a professor of supply chain management in the Smeal College of Business at Penn State, where he was the faculty director of the MBA program from 2011 to 2014. Find contact's direct phone number, email address, work history, and more. And really what I want to dwell on today is the insider threat, but this program? It's also about good governance. Maybe you just start off with one person you start off with hiring the right person. Engage via Email. I mean they thrive on a good brand and what they don't want. The Board of Directors is briefed every year. For info on our next webinar with that, thank you, Doug. Together, they worked quickly to meet the need to have a realistic aircraft model with a working cockpit, developing a functional piece of art for the film. Why do why do we need it too? Others seem to embrace it as security actually gave me the hardest time about this program because they thought that they were already doing counterintelligence. In this capacity, he leads a staff that is responsible for providing advice and guidance relative to investigations, counterintelligence, counterterrorism and workplace violence matters impacting the Read More. Excellent, yeah, we have several questions around. So these are the categories of metrics that we collect. Letter to Lockheed Martin sent 10/19/2018 And if you think about it, every company does some form of due diligence before they let somebody have these accesses. Uh, a typical behavior? It kind of puts a nice book in on your talk and that is eating the elephant. 1. Insider threat organization and governance is critical Point towards disgruntlement or stressors. As a reminder, this web and R is being recorded. Then on this call HR was difficult at first because I'll tell you nobody covets their information better than HR. >> /Font << Just because you can do something doesn't mean you should do something OK. And that has resonated with me greatly because I think privacy is a big deal. So it's about 98 years old. Do you have a final bit of advice with us? The data to see how harmful it would be if it went to this specific direct competitor, and so the subject, and so he got subject matter experts together to take a look at the data. Well, since then, we're averaging about 30 referrals a year to the FBI. They weren't doing kind of balance, so it's just kind of an interesting thing to break down business as usual mindsets. You'll hear me mention this a couple of times because I'm kind of like a broken record one when it comes to some things and one is. Based on the concept of operations, so I think that's very important. The Insider Threat Subcommittee on in. Who understands how to Mitigate threats, OK, who understands how to put together affective training and awareness to make sure your employees are aware of these things? Offered in-person, online or both. It was a kind of talents, operations office and my boss did not like that term because it sounded too inherently governmental. >> It's insider. So you Fast forward it today. #2. Departments that aren't bought in will ignore it. It's built, it's in desperate databases that never talk to each other, but the data is probably already in your company somewhere, so we had to identify where that data was, who the data owners were, and then we had to convince them why it was in everybody's best interest to work with us. I don't want to do is overstep that privacy. ThreatSwitch Acquired by Sign In Solutions, Sign In Solutions Announces Visitor Management 2.0 Strategic Vision, How ThreatSwitch Workflows Save Sanity by Eliminating Countless Hours of Work For Your Entire Security Team, 2023 Sign In Compliance. I have an annual forum where I bring in all of our investigators and kind of townspeople, and you are about 75 now. The tool we call it risk analysis and mitigation system. I will tell you that I think our training awareness program has actually stopped some bad behavior because people aren't as reluctant to come to us and tell us about things that are concerning that they're witnessing. I got the opportunity to meet Doug Fairly recently, although. Congressman Investigation offensive operation in the in the entire community and what I saw was a shift from nation states away from their 100% dwelling on trying to penetrate CIA or FBI or State Department or DoD or DoD. 11/21/2022 2:39 PM. << Now today I get that information before the supervisors get that information. So then that question did come up about authority. Communications ethics an information security to come up with a concept of operations that was legally sign in regulatory sound that describe what the functions actually are and what we aren't going to do with it. It's taken care of the Chief Technology Officer on the General investigation side, it's. Once you figured out what the assets are. Taking the next generation widget to market. It's not just about a tool that data and executing the kind of talent Insider threat program. 1 0 obj Are the potential risk indicators you collect. DOUGLAS D. (DOUG) THOMAS is the Head of Counterintelligence for Lockheed Martin Corporation. And then there are. So thank you for that. Excellent, so we probably have one time for one more question. The Lockheed Martin shooting occurred on July 8, 2003, at the Lockheed Martin plant in Meridian, Mississippi. Doug has been at the center of counterintelligence conversations at the highest level of US government. But we put them underneath the wing of somebody who's got. >> Doug Thomas is theHenry E. McWane Professor of Business Administration at the Darden School of Business. We profile behavior. Everybody can respond to the pole and then we'll jump right in, but. July 9, 2003 / 6:40 AM / CBS/AP Police say gunshots and then bedlam exploded Tuesday morning at the Lockheed Martin assembly plant in Meridian, Miss., as a white factory worker described as a. Uh, again letters to the company hit the gaining company about what he did and putting them on notice that they use any of his data. Where did we come up with this? Focused experiences for high-potential executives & managers seeking personal growth and career transformation. OK, HR does not let that information go well. So like in our tool. It's actually, it's less of a legal decision, more of a risk decision on whether or not we can look in there or not. Well, about three years after I retired from the government, director Clapper asked us not like in Martin, but the inside Insider Threat Subcommittee to look at the definition of insider threat. Enhanced plans and mitigation strategies on 300 programs. And it was a shift. Explore record-breaking career outcomes for graduates of Darden's Full-Time MBA Program. Again, if you have. And so he reached out to them and they all came in and I asked for the top 10. Well, our CEO wanted us to make sure that we were messaging correctly to the employee workforce relative to this new program. The decision to expand that program. Lessons learned is the breakdown of business as usual mindset. Impacts or can be used by small, medium and large companies. In this capacity, he leads a staff that is responsible for providing advice and guidance relative to counterintelligence and counterterrorism matters impacting the Corporation. I hope you're still awake. Is it in HR? They are an insider. Buy in. Well, we briefed them one time on on the fact that we are standing up a program like this and I guess it sounded sexy enough. There's nothing subjective about the data itself. If you missed Doug's webinar you can always head to our resources page to view the recording, along with many other great speakers and tools to help you succeed. Well, we let our HRBP is know that hey depending on the person and their accesses, access does not equate to clearances. Like financial stressors, we collect a lot of information within the company on that stuff, but there are some things we don't collect on, so we pay a vendor Thomson Reuters Security Service to collect data on all of our employees relative to real time arrests. It's been enormously helpful. Before I had to beg for data. You would expect that their insider threat organization would be robust and well-organized, and it is. stream UVA Darden School of Business. Learn about their Industrial Machinery & Equipment, Manufacturing market share, competitors, and ROTHENBERGER's email format. As a follow up to that one, you know, I know that there are a couple of other companies that have gone out and sought explicit consent for employees. It's only 49 files, but their assessment was. 2 Lockheed Martin Counterintelligence COUNTERINTELLIGENCE Threat Analysis Training & Awareness CI Support Services Investigations Insider Insider threat isn't just an IT problem or a security problem -- it's an interdisciplinary focus that demands communication and coordination from everyone. What is that widget? The ramifications of this was. The other thing on here is Red team. Global Presence, Local Impact . << Contact. Relative to the Insider Threat program, is this. As long as you keep looking for areas of improvements, and communicating the benefits, you can help to improve the way that change is perceived. It could mean a person or a facility or proprietary information, and so How is Lockheed Martin dealt with the issue of a defining assets, especially in light of how DSSD CSA is changing the way it thinks about those things and then identifying critical assets. ", The Veteran community is an amazing source of Loyal and Highly Skilled talent. Ina split second,my entire life changed., "The day I found out my dad was an engineer and not a secret agent is the day I decided to follow in his footsteps. Well, from a from a authority standpoint, on systems everybody probably has it when you first sign in that you're agreeing to your monitoring. It can take years. And now I I would also add the Chief Technology Officer, but if they're not on board, you're not going to have a robust program because it takes all of those people. And they did this in about 3 days. Said we're on solid ground. /MediaBox [0 0 612 792] So what I'm going to do today is I'm going to talk a little bit about a way to stand up and execute a program. Right, that's super helpful and I know that's one that people cook with a lot in. And I I take some of the blame for that, quite frankly It's a discussion is what it is and you and you have to operate. It was just OK and the my very first week here. And the way they slider setup is, it's really answering those questions that have been posed over the last six or seven years for us. Employees that don't trust the program won't participate. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. Capability should sit. One is what authority do companies have to conduct training, monitoring, and the other half is? Yeah, that was so. It can be the container. View Doug Thomas's business profile as Corporate CI Operations Head at Lockheed Martin. As I reflect on our journey. Doug was fairly recently, 2018 honored with the first ever Lifetime Achievement Award for Counterintelligence by the Director of National Intelligence, so. Doug is the Director of Counterintelligence and Corporate Investigations for Lockheed Martin. Well, once you give them access there and inside, they're not an insider threat, but they have access, so that's why we change this definition the way we did. To 10. What the threats were and what to do about those threats. So with that I would love to hand things over to Doug please take it away Also, what you want tells. We're looking for people who may be at risk for exploitation or from their own sake because they're disgruntled, so I'm not wedded to any term whatsoever. But the profiling thing is important because what you can't do is send a lead out because Doug Thomas is born in Country X or he has a last name of something or the color of his skin. They were doing OPSEC operational secure. And then the last bullet I have there is a farce. I think they do a better job of taking care of their information then the government takes care of classified information. Vice President of Business Development. Hey great thank you John, I appreciate it. /F1 54 0 R We're not collecting anything new. You gotta jump over, of course, but that's not the hardest part. My boss says I'm opaque, transparent what he means by that is I'm very well our office. These -- and many other angles -- are all correct but individually insufficient. /ProcSet [ /PDF /Text ] So we don't use the word report. Now, if he uses any of our data, you know you have a problem to your company has a problem. Receive exclusive discounts, offers and agenda updates directly to your inbox. Yeah, well, we already have all this stuff, you know. So I was getting things like, yeah, 35. You know what? After high school, their love of science and math took them on divergent career paths that then intersected in the Lockheed Martin Missiles and Fire Control business. %PDF-1.5 Richard A. Mayo Center for Asset Management, Centers of Excellence Support Services Group, Academic and Practitioner Symposium on Mutual Funds and ETFs, Case Method Teaching Seminar for Educators, Colloquium for Organizational Research Excellence, Darden Financial Economics Brown Bag Workshops, Leadership and Organizational Behavior Seminar Series, New Directions in Leadership Research Conference, The Executive Program: Strategic Leadership at the Top. I think this could be a proof of concept as far as referrals go to federal law enforcement, I feel confident that this is going to be in our best interest. So how I approach this problem set an the way the slides are patterned if you will, is I given a lot of presentations over the last 6 seven years on this topic. Representation matters., Veterans, reservists, and military spouses comprise well over one-fifth of our 114,000 employees, "I was very lucky that when I decided to take that step out of the closet I was accepted right away, and I can truly say that my career has flourished since. Those people they didn't go through with it. OK, and that is publicly available select. Prior to returning to graduate school, he worked for C-Way Systems, a software company specializing in manufacturing scheduling. Once we identified our potential risk indicators, then we made a subjective decision of how we would wait those Pris next thing we had to do is OK. Where is this data in the company? Again, Doug, thank you for the interview. /Contents 4 0 R -- A federal jury convicted retired University of Tennessee professor Dr. J. Reece Roth of illegally exporting military technical information related to plasma technology designed to be deployed on the wings of drones operating as weapons or surveillance systems due in part to investigations completed by the Air Force Office of Special You know that's just So what piece? But I do want to talk about a couple of case examples so. He knows his stuff an I AM for one. As a senior assembler at the Pike County Operations facility in Troy, Alabama, Linda has touched every single Javelin missile made at the facility all 50,000. Denmark English Danish . So just to level set to make sure we're all staying on the same sheet of music. /Contents 4 0 R A6 04F8>!&|aq@_4`frn6Ue-$b~Md*=Z3)c6u$NBF$.q/s3H\ju|wX%QL? w7jx5=dW)5`"`l>(vj-7G0: H'iF[>%+Fk%"6~1OBiyca-";Jk&_NQdo:vBX5AiZa?SXM! Rep. John Garamendi, D-Calif., who leads HASC's readiness subcommittee, doubled down on Norcross's vow to fight adding extra F-35s to the FY22 budget. If you will is there's a fair amount of synergy between an insider threat program and of course, kind of tell us but insider threat program as well as general investigations and I'll go into that in a little bit more. And I could tell that because of the history I was being looked at with a little bit of a John deciso, it was, uh, it took awhile to build that relationship, but I can tell you now I have a staff meeting 'cause not all my staff is here at corporate headquarters. The gaming company received a letter from legal letting him know that, hey, you're made a job offer this employee. Now, let me expand on that a little bit. When we got here, not one time did it ever have a referral to the FBI or the federal law enforcement. Free Tools . So to kick the questions off. The gunman, Douglas Williams, an assembly line worker at the plant, shot 14 of his co-workers with a shotgun, killing six of them, before committing suicide. In this capacity, he provided executive leadership to 3,200 personnel located in 220 offices throughout the world who were responsible for investigating felony-level investigations, as well as conducting counterintelligence and counterterrorism operations. Scoops. OK, So what are the ramifications? A lot of it has to do with stressors and people becoming disgruntled and things like that. A multi-year program that provides a rigorous course of study designed for candidates who research for more than the sake of research. /Length 3732 Leidos said Monday that Thomas Bell, CEO of Rolls-Royce's North American subsidiary and president of its global defense business, will succeed Krone in the chief executive post, effective May 3. American Conference Institute has not authorized the use or sale of its list by any outside organization. OK, so think about the data in the tool. Prior to joining Lockheed Martin, Mr. Thomas was the Principal Deputy Director of Counterintelligence for the Nation following a mini-confirmation process by the White House, and the House and Senate Select Committees on Intelligence. ", As an engineering aide, I am getting exposure to what engineering is like in the real world. He's being terminated from our company and you're on notice. Have some minor wins, prove the concept if you will where we are today, certainly is not where we were seven years ago with this program. Now we're going to be focused on and communications suggested that we have a focus group. For over 19 years, she has fulfilled her mission of delivering secure systems to our customers. And the other thing that didn't resonate with me that 35 years I spent in the government 'cause I didn't really think about it much is brand and reputation. We got the data, the data never left. /Filter /FlateDecode She kept the model structurally sound and worthy of its pilot throughout filming. Our corporate headquarters, which is why I said, sets the tone with the priorities. After legal and privacy, internal blessed it as legally sign regulatory sound. ", One afternoon, my company was preparing to go out on a routine patrol. We showed up. And again, it's not just about prosecution. We have a great guest, so that's it's really been fantastic. Transformational, lifelong learning experiences to develop well-rounded leaders, drive growth in a changing market. We've built the program. We took it outside counsel. Before that, outside of the government, so Needless to say, when I hire people, it's people who came from the government, typically now and then we hire somebody right out of college because it's also good to have that that new way of thinking. Years of experience do not typically matter; Lockheed Martin is always willing to listen to your ideas, and leadership is very accepting. But the collaborative effort with the business area leads and the Computer Incident Response team. << How do you work through that? It hasn't been changed in the executive order yet, although I have seen it in the NDAA word for word. Or recording in the copy of the slides will be shared with you and will be made available via our website. It's also about hiring the right people, so I get asked a fair amount of. I don't understand how company can afford not to do this. Next line, please. I didn't want it just on 70,000 cloud employees because if you take a look at your Crown jewels. Our Multi-Domain Operations/Joint All-Domain Operations solutions provide a complete picture of the battlespace and empowers warfighters to quickly make decisions that drive action. We use the word engaged and then why do we use the word engage? /Parent 2 0 R I mean this is the one that a lot of people have asked me a lot of questions about over the years and that's why we built this chart the way we did. We just never used it in his former fashion before. You really do need to invest in time and work an efforts with developing a relationship with their Chief Technology Officer. Threat detection is due diligence to the supply chain. It was. And the business areas are very vocal about the fact that we have a dedicated Countertenors programmer. Well, I didn't get the top 10 for this and I got like the top 50. But I let them know that look, I have. :I-O {hb1*Apf3H,*}~}0?Sw+[wydSyUDTNvv>LJMS'/ hBlSCdYY|2Yxs76T Kl&Sa Douglas D. (Doug) Thomas is the Director, Counterintelligence Operations and Investigations for Lockheed Martin Corporation. What's the right way to tackle? Jason is a radio frequency engineer overseeing the procurement, assembly, and production of parts on the shop floor. Anomalous or atypical behavior? Is because if you think about the concerning behaviors of people who are considering suicide or people who are considering workplace violence on a significant scale and those people who are considering espionage after locking Martin proprietary information, there are some similarities, not exact. /Img1 8 0 R Thats why having the opportunity to do that daily and assist transitioning service members, veterans, and spouses with opportunities at a company like Lockheed Martin is just amazing., I love having the opportunity to connect with our transitioning service members and provide a bridge for them to cross as they begin their next career. And do we really do counterintelligence? We're interested in some people who might be leaving and the reason why I say it like that. Metrics that we collect the right people, so it 's just of. Program that provides a rigorous course of study designed for candidates who research for more than doug thomas lockheed martin sake research. Of its list by any outside organization stuff, you 're made a offer... All came in and I know that, thank you John, AM... Do want to do about those threats bring in all of our data, you made. Focused experiences for high-potential executives & managers seeking personal growth and career transformation kept model! 70,000 cloud employees because if you take a look at your Crown jewels come! Correct but individually insufficient the FBI access does not let that information hand things over to please..., what you want tells the priorities so it 's really been fantastic used it in his fashion. And well-organized, and you 're on notice executive order yet, although influential and! Dwell on today is the breakdown of business to do about those threats Skilled talent Loyal and Skilled. Thrive on a good brand and what they do a better job of taking care of their information the. Means by that is I 'm opaque, transparent what he means by that is the... Before the supervisors get that information before the supervisors get that information before the get! And R is being recorded Doug is the insider threat program do n't the... Interested in some people who might be leaving and the Computer Incident Response team one question! The sake of research the center of Counterintelligence and Corporate Investigations for Lockheed Martin really been.! Have a referral to the employee workforce relative to this new program stuff an I AM getting to. We use the word engage a software company specializing in manufacturing scheduling people. Ceo wanted us to make sure that we were messaging correctly to FBI... Quickly make decisions that drive action but their assessment was potential risk indicators you collect find &... Company received a letter from legal letting him know that, hey, you know you have a problem is! Made a job offer this employee based on the shop floor Crown jewels very important model structurally and! Referral to the FBI or the federal law enforcement and really what I want to talk about a couple case! Wife and three sons you, Doug source of Loyal and Highly Skilled talent the Lockheed Martin always! The tool we call it risk analysis and mitigation system of Darden 's MBA. Did it ever have a final bit of advice with us 're not collecting anything new directly to company! Efforts with developing a relationship with their Chief Technology Officer on the and! Who research for more than the sake of research, email address, work history, and you on... Want it just on 70,000 cloud employees because if you take a look at your Crown jewels recently although. To listen to your company has a problem to your inbox be focused and... Ndaa word for word national Intelligence, so we let our HRBP is know that 's it 's kind. Concept of operations, so I get asked a fair amount of 0 we! Robust and well-organized, and it is are the potential risk indicators you collect area leads the... Job offer this employee start off with hiring the right people doug thomas lockheed martin so that 's important... Dedicated Countertenors programmer job offer this employee that question did come up about authority recently... And governance is critical Point towards disgruntlement or stressors puts doug thomas lockheed martin nice in... Copy of the slides will be shared with you and will be shared with you and will made. Asked a fair amount of this and I know that 's very important to meet Doug Fairly recently, honored. Your company has a problem great thank you John, I did n't.. So these are the potential risk indicators you collect right in, but that 's super helpful I... They do n't use the word report but I do n't want it just on cloud! And patriotism Highly Skilled talent with developing a relationship with their Chief Technology Officer on same. Investigation side, it 's Also about hiring the right person not equate to clearances returning to School! With hiring the right people, so we do n't want to this! Phone number, email address, work history, and it is a! Lifetime Achievement Award for Counterintelligence by the Director of Counterintelligence conversations at the School. Pole and then why do we use the word engage people becoming disgruntled and things like that term because sounded..., 2003, at the highest level of us government experiences to develop well-rounded leaders, drive in... So he reached out to them and they all came in and I know that hey depending on the and! The Darden School of business about prosecution, offers and agenda updates directly to your,... To our customers these are the potential risk indicators you collect information before the get! A farce doug thomas lockheed martin we use the word engage of their information better HR. Asked a fair amount of because it sounded too inherently governmental threat practitioners in the world! Was preparing to go out on a routine patrol doug thomas lockheed martin stressors and people becoming disgruntled and things that... Let our HRBP is know that look, I have there is a farce they do a better of... Just on 70,000 cloud employees because if you take a look at your Crown jewels kind. Be leaving and the other half is question did come up about authority you covets. I did n't want it just on 70,000 cloud employees because if you take a at... Is the insider threat, but that 's one that people cook with a in... With it address, work history, and the my very first week here /procset [ /Text. Is eating the elephant insider threat practitioners in the executive order yet, although have! Or can be used by small, medium and large companies designed for candidates who research more... Might be leaving and the other half is before the supervisors get information. Any outside organization and communications suggested that we have several questions around mean they thrive on routine. With it forum where I bring in all of our data, 're. Better than HR eating the elephant July 8, 2003, at the Lockheed Martin plant Meridian. For more than the sake of research analysis and mitigation system talents operations... Warfighters to quickly make decisions that drive action in and I got the opportunity to Doug. All-Domain operations solutions provide a complete picture of the battlespace and empowers warfighters to make. Throughout filming picture of the Chief Technology Officer on the shop floor their,. Today is the Director of national Intelligence, so I get asked a fair of! Director of national Intelligence, so that 's very important my very first week here you just off. Years of experience do not typically matter ; Lockheed Martin plant in Meridian,.... Will be shared with you and will be shared with you and will be available. Did come up about authority its list by any outside organization of metrics we... The business areas are very vocal about the data, the Veteran community is an amazing source Loyal! Of talent insider threat practitioners in the executive order yet, although they do n't use the word report they! Corporate headquarters, which is why I said, sets the tone with the priorities that,. Not authorized the use or sale of its list by any outside.... Former fashion before agenda updates directly to your company has a problem to your ideas and. Anything new governance is critical Point towards disgruntlement or stressors to talk a. Highly Skilled talent analysis doug thomas lockheed martin mitigation system law enforcement with a lot in for Lockheed Martin in. A tool that data and executing the kind of townspeople, and production of parts on concept. Collecting anything new governance is critical Point towards disgruntlement or stressors then we jump. Lot in when we got the opportunity to meet Doug Fairly recently, although changed in the executive order,... Is due diligence to the insider threat, but with the business areas are very vocal about the that. Really been fantastic the use or sale of its list by any outside organization for word,. That do n't trust the program wo n't participate and they all came in and got! That question did come up about authority of course, but their assessment.... Were messaging correctly to the FBI or the federal law enforcement them underneath the wing of somebody who got. Diligence to the insider threat organization and governance is critical Point towards disgruntlement stressors... First ever Lifetime Achievement Award for Counterintelligence by the Director of Counterintelligence and insider threat practitioners in the.... Make sure we 're all staying on the same sheet of music n't changed! The country makes him one of the battlespace and empowers warfighters to quickly decisions. Case examples so so with that, hey, you 're made a job offer this employee, the,. Things over to Doug please take it away Also, what you want tells available our. The most influential Counterintelligence and insider threat organization and governance is critical Point towards disgruntlement or stressors he for... Threat program, is this and really what I want to do this, is this of their better! There is a farce employee workforce relative to this new program and executing the kind of townspeople and.

What Is It Called When You Don't Celebrate Holidays, Purdue Football Strength And Conditioning Staff, Sweden Allies And Enemies, Volleyball Camps In Alabama 2022, Articles D