OK, but you just have to kind of walk it through. Because it's already data that the company has collected. Yeah, that was so. So now in this case and the case I just described, those companies elected not to hire their people. But if you have a governance structure like I've demonstrated on this chart where you've got a steering committee at the Senior Vice President, Vice President level. You will see indications of suicide thoughts or things that might turn violent. The Federal Trade Commission on Tuesday filed an antitrust lawsuit that seeks to block Lockheed Martin Corp.'s planned $4.4 billion purchase of Aerojet Rocketdyne Holdings Inc., arguing the deal . For sometime. Capability should sit. And companies OK if you want to get personal about it. Are the potential risk indicators you collect. Again, he denied it when we approached him later he finally admitted it. Oh excuse me good afternoon everyone. Not gonna happen, but what was happening is I did a lousy job of describing or explaining what I thought a critical asset actually meant. All Rights Reserved. Did that take some work? I mean, it's actually pretty remarkable. Buy in. Well, about three years after I retired from the government, director Clapper asked us not like in Martin, but the inside Insider Threat Subcommittee to look at the definition of insider threat. Those words can be kind of loaded, as I'm sure you know, and you know we had a question about whether or not the choices can Create objections for employees. Yeah, I think that's another good question and I'm kinda gonna sound like I'm bipolar on this answer. His research interests include coordinating production and inventory planning across the extended enterprise and connecting decision models to logistics performance measurement. Every month ThreatSwitch hosts a webinar on a topic of interest to the security and compliance community. And that name recognition goes a long way and I know it sounds silly, but it is a ring knocking club so that helps as far as. Hey great thank you John, I appreciate it. Doug Wilhelm's Phone Number and Email. So before we get started I just want to go through a few administrative things. But what we don't do is we don't talk about our potential risk indicators and the data sources we use. Monday marks the 10th anniversary of the July 8, 2003 mass murder at the Lockheed Martin plant in Meridian, where Douglas Williams, 48 shot 14 coworkers, killing six of them before committing. ThreatSwitch puts employees at the center of your security and insider threat program.Schedule a demo to find out just how different we are. Just know one size does not fit all size, certainly influences the program the company support and culture. Doug Thomas Head of Corporate CI Operations at Lockheed Martin La Plata, Maryland, United States 11 followers 3 connections Join to connect Lockheed Martin Experience Head of Corporate CI. Lockheed Martin Search. Engineers are challenged to look at the system surrounding them and find solutions to complex problems. /F3 16 0 R You probably wouldn't notice 49 files 'cause hundreds and hundreds of files are downloaded every day across the Corporation, so it's not that if he wouldn't have been on our radar already. The other thing that we did is we had like I said we had communications on there and they helped us greatly with a communications plan and I'll get into that a little bit. Although I say that the government is never not been penetrated in the in the entire time. ", "The opportunities provided by Lockheed Martin have changed the direction of my path. Learn how we are strengthening the economies, industries and communities of our global partner nations. For instance, you know early on you wanna know about who are if. 1 0 obj As a senior assembler at the Pike County Operations facility in Troy, Alabama, Linda has touched every single Javelin missile made at the facility all 50,000. That's part one, and then in general there are other departments that you find that are most challenging, or require the most work and to get along with, and we promised not to tell them. So I was getting things like, yeah, 35. They have no program, they had nothing to mitigate this kind of a problem. Large purchases, liens, and bankruptcies. x^X$W Over 1,000 Students and Counting Are you next? For info on our next webinar with that, thank you, Doug. You know that's your Crown jewels, right? /MediaBox [0 0 792 612] On developing this program and I can tell you right now it didn't. Designed to help the U.S. and allies leverage emerging technologies to create a resilient multi-domain network. Of course, because this could be easily viewed, interpret it as something really intrusive, so you really have to work on your messaging an that words matter. So we came up with this definition and we socialize it with you. When you when you put together that list and you asked for that, did you survey a number of different departments or what? OK, there is no way we're resourced to do. In this capacity, Mr. Thomas chaired the National Counterintelligence Operations Board, which was comprised of the Directors of Counterintelligence for each of the agencies within the Intelligence Community. Some people call them red flags or triggers. First off, it was myself and the chief technology officer and the Chief Technology officer reached out to Chief Technology Officer. Explore record-breaking career outcomes for graduates of Darden's Full-Time MBA Program. Not quite as big as Lockheed Martin. It was. Thomas currently teaches courses in the areas of supply chain management and quantitative modeling in Darden's MBA, Executive MBA and Ph.D. programs. After high school, their love of science and math took them on divergent career paths that then intersected in the Lockheed Martin Missiles and Fire Control business. Darden develops leaders in locations worldwide. 1900-2020. Learn how we are strengthening the economies, industries and communities of our global partner nations. They weren't doing kind of balance, so it's just kind of an interesting thing to break down business as usual mindsets. You might just start off with one person and then and then hopefully you'll have some winds that will come along to generate. OK, 'cause the person already got. So I remember shortly after I got here meeting with the Chief Technology Officer to have him give us a list of critical assets in the company and the way we're set up at the company. It's internal. So some people say well, did he get prosecuted well? Quite frankly there isn't a right answer as to where this. Focused experiences for high-potential executives & managers seeking personal growth and career transformation. I mean, 'cause. And why is that? Vice President, Program Management at Lockheed Martin. Behind each Freedom-variant Littoral Combat Ship, and all that encompasses it, are the people who work to make the ships what they are. A6 04F8>!&|aq@_4`frn6Ue-$b~Md*=Z3)c6u$NBF$.q/s3H\ju|wX%QL? w7jx5=dW)5`"`l>(vj-7G0: H'iF[>%+Fk%"6~1OBiyca-";Jk&_NQdo:vBX5AiZa?SXM! We have a chief Technology Officer at corporate and then dotted line to him or chief technology officers in the business areas. So what works for those gaps? View Doug Thomas's full profile. Uh, again letters to the company hit the gaining company about what he did and putting them on notice that they use any of his data. Robust and South threat detection capability. Everybody can respond to the pole and then we'll jump right in, but. I have a staff meeting every Tuesday with our business area kind of talent slides. stream You'll hear me mention this a couple of times because I'm kind of like a broken record one when it comes to some things and one is. /XObject << So you Fast forward it today. >> ", I am tremendously proud to work in an industry where Hispanics are lightly represented and achieving positions of leadership. Um, I mean, the numbers are unbelievable. So they're the ones who probably have the best Insights into our critical assets. Prior to that, he was the principal deputy Director of Counterintelligence, spent 25 years with the Air Force as a special agent. It's kind of talents. Oh how things could be to the benefit of the company. While we're doing that, you know. Who are maybe just starting program? First and foremost, really happy to everybody here. If you really think about what this program does, it could very much be interpreted. -- A federal jury convicted retired University of Tennessee professor Dr. J. Reece Roth of illegally exporting military technical information related to plasma technology designed to be deployed on the wings of drones operating as weapons or surveillance systems due in part to investigations completed by the Air Force Office of Special If you'd like to ask questions at any point during the webinar, please use the Q&A feature. Douglas D. (Doug) Thomas is the Director, Counterintelligence Operations and Investigations for Lockheed Martin Corporation. The gaming company received a letter from legal letting him know that, hey, you're made a job offer this employee. Vice President of Business Development. It knows that Doug Thomas works in the UK or Canada or Australia. DOUGLAS D. (DOUG) THOMAS is the Head of Counterintelligence for Lockheed Martin Corporation. That's why I said early on that you gotta have some incredible patience. A frequent faculty leader in executive development programs, he has led numerous Executive Education sessions in Africa, Asia, Europe and North America, including programs at Penn State, INSEAD and Georgia Institute of Technology, as well as custom programs for Accenture, DuPont, ExxonMobil, IBM, Ingersoll-Rand, Mars, Office Depot, Parker-Hannifin, Pfizer, Schlumberger and the U.S. Marine Corps. More Story Keeping Ahead of Ready With Next Generation Launch Systems Industries from retail to banking are preparing for the future by focusing on the modernization of their technologies and assets. Excellent, yeah, we have several questions around. But the profiling thing is important because what you can't do is send a lead out because Doug Thomas is born in Country X or he has a last name of something or the color of his skin. :I-O {hb1*Apf3H,*}~}0?Sw+[wydSyUDTNvv>LJMS'/ hBlSCdYY|2Yxs76T Kl&Sa /Pages 2 0 R I appreciate and value working on the products that will one day save our heroes. Anomalous or atypical behavior? He resides in Maryland with his wife and three sons. Presented by. The Exchange of information in the cooperation. A multi-year program that provides a rigorous course of study designed for candidates who research for more than the sake of research. Schedule a visit today. endobj In September of 2009, he retired as a member of the Senior Executive Service and last served as the Executive Director. He tried to download a bunch of data a lot more than 49 files. To 10. Lucio builds air vehicle models as a laboratory mechanic, converting conceptual drawings into reality. My point is, it's a very close partnership today. So as me getting in front of the leadership, talking to them about their shifting threat landscape and what I meant by that was. 1 0 obj /Filter /FlateDecode The tool we call it risk analysis and mitigation system. You might have heard of Lockheed Martin; they are a pretty big company. As an engineer, I love this challenge because I am always learning, creating and seeking solutions that benefit the system around me and the people next to me., I wondered how to fit this role into my already busy life, but my co-workers were so encouraging. But we put them underneath the wing of somebody who's got. << Learn from Darden faculty through our online courses, available worldwide. We really have had some great successes with suicide ideations in workplace violence with this tool. Because the one that was in the executive order was pretty myopic. Prior to joining Lockheed Martin, Mr. Thomas was the Principal Deputy Director of Counterintelligence for the Nation following a mini-confirmation process by the White House, and the House and Senate Select Committees on Intelligence. As a reminder, everything that Doug talked about in the slides will be available on our resources page. Insider threat isn't just an IT problem or a security problem -- it's an interdisciplinary focus that demands communication and coordination from everyone. I would love to introduce and fast things shortly to Doug Thomas a little bit about it Doug. He lied about the job offer. And the other thing that didn't resonate with me that 35 years I spent in the government 'cause I didn't really think about it much is brand and reputation. /Count 2 Doug Wilhelm is a Vice President, Program Management at Lockheed Martin based in Bethesda, Maryland. Doug has been at the center of counterintelligence conversations at the highest level of US government. Our Multi-Domain Operations/Joint All-Domain Operations solutions provide a complete picture of the battlespace and empowers warfighters to quickly make decisions that drive action. Excellent, so we probably have one time for one more question. A 12-month program in partnership with UVA's McIntire School of Commerce focused on statistical analysis and leadership. So like in our tool. As I mentioned, Doug is counterintelligence operations in corporate investigations director at Lockheed Martin. You've got an oversight internal audit, risking compliance committee. Contact. So we will be sharing that with you after the webinars over, including the recording, so be sure to check back there if you're looking for the slots or the recording. Standing up a program is not the long pole in the tent. I will I have to say war at 1st and it was an it's and it's not going to be any surprise to anybody. It's only 49 files, but their assessment was. So it may not be very expensive is what I'm saying and you started off with a proof of concept, but what sold the company I think is when you start talking about the trends throughout the United States, the statistics relative to the loss of intellectual property and RND data and how much it's costing the United States economy. I have the program Red teamed by real experts to make sure that the tool itself is not penetrable, because if you think about all the data that's in that tool and how sensitive that date is, we've got a strong obligation to make sure that that data is never lost. I mean this is the one that a lot of people have asked me a lot of questions about over the years and that's why we built this chart the way we did. /Contents 4 0 R Below are the 3 lessons I learned from my conversation with Doug. d***@lmco.com. We use the word engaged and then why do we use the word engage? OK, So what are the ramifications? On a pretty regular basis, we brief it quarterly to our steering committee and we brief at annually to our Board of Directors. Based on the concept of operations, so I think that's very important. % You really do need to invest in time and work an efforts with developing a relationship with their Chief Technology Officer. To identify what your critical assets are and who's working on those programs for me, I view the Chief Technology Officer in our company as my number one internal customer. Taking action to help you protect what matters most. It was just OK and the my very first week here. So now that got us a little concerned. And so you can breathe a little easier now. The gunman, Douglas Williams, an assembly line worker at the plant, shot 14 of his co-workers with a shotgun, killing six of them, before committing suicide. Like financial stressors, we collect a lot of information within the company on that stuff, but there are some things we don't collect on, so we pay a vendor Thomson Reuters Security Service to collect data on all of our employees relative to real time arrests. In the tool and I'm looking for things that are atypical. Lockheed Martin 23 years 2 months Senior Software Engineering Manager Apr 2022 - Present11 months Huntsville, Alabama, United States Software Engineering Manager Oct 2019 - Apr 20222 years 7. /F1 10 0 R I remember going to the general counsel making the case to refer this in 811 referral, a formal referral to the barrel. OK access could be critical assets depending on their accesses. Uh, in the web and our tools you'll should see at the bottom of your screen and if you put those in will be sure to get to them. And just how critical their partnership was to our office to our success. If we can't answer him during the webinar, will be sure to try to get back with you after we have a lot of ground to cover so we will do our best to get every single question answer. Worthy enough to repeat a couple of times When you roll out a message to your workforce that you have a program like this, that is certainly not arguable that it's intrusive. Now there's ramifications that go along with something like this, so the guy was interviewed on why he did what he did. We took it outside counsel. He has testified as an expert witness and consulted for several large organizations on supply chain strategy including Accenture, CSL Behring, Dell, ExxonMobil and Lockheed Martin Aerospace Corporation. << Enter information into their system immediately. Thank you everyone for attending and everyone have a fantastic weekend and remainder of your Friday. He established and shared. Great good stuff you know another question that came up in a couple places is on the words and the meanings. So let me give you a couple of case examples and it of course I had to. We showed up. Yeah, I think I think the biggest thing is to have somebody be your cheerleader in your advocate for hiring the right person. I hope I did not waste your time and I hope you got at least one nugget out of this. As a reminder, this web and R is being recorded. OK, so it's a brand and reputation thing, but I think friends since it's a it's a threat that are going on right now is what I think sounds so another way to answer that today as I look at the trends and the shifting threat landscape from nation states. But sometimes are fuels to national security and patriotism. Beg for money if you will to build a tool. Im beginning my career ahead of the game! It just start off with one guy or Gal who has a right background who understands how nation states operate, will understand how competitors operate. Quite frankly, you can go to the next slide, please. Douglas D. Thomas Director, Counterintelligence Operations & Corporate Investigations July 18, 2017 Counterintelligence & Insider Threat Detection National Insider Threat Special Interest Group. And we are out of time, so thank you Doug. ", "I truly learn something new every day, and every day I get to solve new challenges. That means: Our adversaries know this, which makes it even more important that mid-sized companies organize and operate their insider threat program effectively. It was a kind of talents, operations office and my boss did not like that term because it sounded too inherently governmental. A lot of experience, so going left to right the first column. But going back to the governance structure, I really like this because although there's some pain that goes along with having this strong oversight over you on a regular basis, I think I think it makes our program and the execution of our program better. Dr. Michael is the lead engineer for theX-59 QueSST. You move over to the second column development. All rights reserved, Centralized commitment and leadership with decentralized execution, Structure that drives coordination across cyber, security, human resources, ethics, legal, and communications, Oversight that connects to the corporate board, internal audit, risk & compliance, and regulatory requirements, Planning - building buy-in from leadership, benchmarking peer companies, and understanding the many stakeholders to an insider threat program, Development - selection of the right tools, understanding risk indicators, identifying assets (physical and conceptual), and identifying the many data sets where that information is stored, Implementation - Ingesting that data into tools, messaging to employees, and managing incidents, Governance - coordinating departments, conducting oversight, measuring progress, and red teaming the program. Scoops. My boss says I'm opaque, transparent what he means by that is I'm very well our office. It's been enormously helpful. It always keeps me on my toes. They are an insider. << UVA Darden School of Business. OK, so like a company like Lockheed Martin, we're already selling things like the F35, so what's the next generation product? Offered in-person, online or both. We develop laser weapon systems, radio frequency and other directed energy technologies for air, ground and sea platforms to provide an affordable countermeasure alternative. So this next bill is kind of interesting federal law enforcement referral. When theTop Gun: Maverickteam needed a head-turning design to feature in the film, Jim was ready to deliver and Darkstar was born. Misgovernance this to me is a big deal and I'm going to bring it up again later because I think it's I think it's. Together, they worked quickly to meet the need to have a realistic aircraft model with a working cockpit, developing a functional piece of art for the film. But the reason why I wanted to keep kind of talents in the name. Um, other things that happened is he added Clearence, so of course we notified the government and you know they. Now you can have the best data loss prevention tool in the world. Doug Thomas General Manager at Northstar Access (Formerly Northstar Scaffold , Scaffold Russ Dilworth) Toronto, ON Doug Thomas Owner at Doug Thomas Firewood Dexter, ME Doug Thomas. This basically walks you through our journey. Because it is a painful process quite frankly, but it it helps us. v ZU:k. Excellent, thank you. I think that's important that audit comes in and ensures that we're executing the mission based on the concept of operations. Weapon system that that direct competitor is working on. It doesn't matter it be. So we end up delaying a robust program because we had to build the programs, build a tool in House, which I is the last thing I wanted to do. ", Three years ago, I decided I wanted to get more involved in my local community and give back to those less fortunate than me., I always tell my soldiers, I may be your leader, but Im nothing without you. There's nothing wrong with that. Threatswitch and for those of you who don't know us, we are a company that provides software to help companies manage compliance with things like insider threats CMMC and NISPOM And help you reduce the cost of doing it. So these are the categories of metrics that we collect. The questions I don't really have an office, that's a concern for me They're all on board. 4 0 obj You will get resistance when you first introduced this topic to whoever. Germany English Deutsch . So be on the lookout. That was a question that popped up when we were writing the concept of operations again with ethics and legal and privacy and HR. And really what I want to dwell on today is the insider threat, but this program? It's also about hiring the right people, so I get asked a fair amount of. Doug Thomas is the Henry E. McWane Professor of Business Administration at the Darden School of Business. >> So that's another outgrowth of a program like this. We don't go into great detail about these specific data if you will, but what I will tell you is that at the end of the day. I think what my office does more than anything. Publicly available information. 'cause again, that's kind of our secret sauce. It's insider. Now we're going to be focused on and communications suggested that we have a focus group. How's that go over to the 4th column? This single chart answers the vast majority of questions I've received over the years regarding the stand up and the execution of the program. My favorite part of my job is when I get to see the photos of the brave individuals of the armed forces returning home to their families. If you think about what their role is, they're given a boatload of money to do research and development and studies an analysis. Doug is the Director of Counterintelligence and Corporate Investigations for Lockheed Martin. They've been a great partner to work with it. What is that widget? So which I'm also on an. So how I approach this problem set an the way the slides are patterned if you will, is I given a lot of presentations over the last 6 seven years on this topic. corporate America is a soft target compared to the federal government. So again, remember what I'm looking for is I'm looking for things that might. x^v]_&iT9yh.vcKR~F`f b~0-2}~:UMs;SnqD0C4j[qD|^q0]x_UN;veFucQhmjh +MQv;x\CagnUm_VEiuQnxii/!~8c$ 9;_3l3"v^Kac=b?"v]Jmg>mQ6[^ People in anywhere Between 25 years old and 70 years old there from legal, there are scientists, engineers, HR, security information security there from all walks of life quite frankly, and they came back to us and said, oh so you want to create a culture of snitches. The insider threat Assets risk counterintelligence. Because when you ask the question about Chief Technology Officer, what are critical assets you know you're gonna get a laundry list? OK, we've been telling him for the last couple years. So what I'm going to do today is I'm going to talk a little bit about a way to stand up and execute a program. But what I prefer the tool to do is compare Doug I've got his baseline. Contact. Had this been compromised at this company it would have caused grave harm to our company and the cost or the values they put on that data was 2.5 billion dollars. The Lockheed Martin shooting occurred on July 8, 2003, at the Lockheed Martin plant in Meridian, Mississippi. Uh, a typical behavior? OK, it's amazing how much data companies and government agencies collect on their employees and it just sits there OK? Get in. We're looking for risk. All of them had what I thought were pretty good. 2023 All rights reserved. But I let them know that look, I have. ", "During my time in Lockheed Martin's Leadership Development Program, I was able to get my Master's at NYU. Does it create baggage? Put a red flag on it. It can take years. OK, so let me start the presentation on this slide. Let's say we're going to do a riff of 500 employees out of a site. /Img2 9 0 R Other thing is if you think about what some of our secrets are in industry. Pardon me Who's been involved in that asset discussion? . Below are the 3 lessons I learned from my conversation with Doug. You know that's just So what piece? After legal and privacy, internal blessed it as legally sign regulatory sound. WHY THE NRA'S CHIEF LOBBYIST LEFT: The National Rifle Association 's top lobbyist left the scandal-plagued gun rights group this week after nearly two . How do you work through that? It was about people with clearances and classified information, and we know that that problem set is way beyond classified information. All the data that's in the tool is anonymized, so the analysts, by the way, really have four analysts for over 100,000 employees. What is a very large and expansive challenge? And what I'm here to say is, no, we're trying to mitigate an ugly trend trend that just keeps on going. So those are pretty strong ramifications for doing bad NIS right? To let them know that hey, we're interested in dark times, we'd like to look in the tool to see if one of the concerns there might be in there, and then he'll make a legal decision more. >> The data to see how harmful it would be if it went to this specific direct competitor, and so the subject, and so he got subject matter experts together to take a look at the data. So with that I would love to hand things over to Doug please take it away Also, what you want tells. OK, HR does not let that information go well. Again, if you have. Requires a human being to analyze the data, but that we rely a lot on the tool. %PDF-1.5 Congressman Investigation offensive operation in the in the entire community and what I saw was a shift from nation states away from their 100% dwelling on trying to penetrate CIA or FBI or State Department or DoD or DoD. Making sure you're executing the mission right so it just takes patience. Just because you survived a presentation to your senior leadership on the need for an insider threat program, does not mean that the messaging stops there. OK, I get the information about people gonna be put on a pip before they're put on a pip. We got the data, the data never left. 100 Darden Boulevard Those people they didn't go through with it. What makes them cut a check? You gotta jump over, of course, but that's not the hardest part. ", One of the things that Ive learned over the years is that its incredibly important to have a close group of friends who you can share anything with, and who you can count on. Click here to see the career opportunities in your area. I think I speak for everyone to say that we know a lot more than we did. That's important. 11 lessons from Lockheed Martin's insider threat program Watch video 59 min Insider Threat: What Industry Needs to Know Watch video 59 min CMMC: The Train Is Rolling Watch video 46 min DFARS NIST 800-171 Is Changing Watch video 59 min Small Businesses in the Enterprise Supply Chain Watch video 58 min What's unique about the F35 that makes it the awesome machine it is. OK, and that is publicly available select. Furthermore, transitioning service members and Veterans often hold high clearances needed for some of our Special Access Programs and are frequently experts in many of Lockheed Martins critical skillsets., I believe its every transitioned service members call to help our brother and sisters cross the bridge from military to civilian life. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. Now it did n't go through with it compliance committee people, so it 's just kind of talents operations! It was just ok and the meanings of suicide thoughts or things happened! First off, it 's just kind of interesting federal law enforcement referral you. Companies and government agencies collect on their accesses information about people with clearances and classified information the! Is n't a right answer as to where this like this there 's ramifications that go over to Doug take. Respond to the federal government weekend and remainder of your security and compliance.. Word engaged and then and then and then why do we use the word engage secrets are industry! In Maryland with his wife and three sons easier now because it is a Vice,... These are the categories of metrics that we rely a lot of experience, so I was able to personal... But this program doug thomas lockheed martin learned from my conversation with Doug over to the of. So now in this case and the doug thomas lockheed martin Technology officers in the areas... The reason why I wanted to keep kind of walk it through planning across the enterprise! 'S another good question and I 'm opaque, transparent what he did what he did just know one does... Operations again with ethics and legal and privacy, internal blessed it as legally sign regulatory sound whoever!, spent doug thomas lockheed martin years with the Air Force as a reminder, this web and is... Efforts with developing a relationship with their chief Technology Officer at corporate and then hopefully you 'll some... Phone Number and Email company has collected remainder of your security and insider threat program.Schedule a to! 'M kinda gon na sound like I 'm looking for things that are atypical 's... To work with it very much be interpreted the ones who probably have time... Know that that direct competitor is working on for money if you really do to... Day I get the information about people with clearances and classified information, and we brief annually! Be focused on and communications suggested that we 're executing the mission based on the tool and I hope did. Of an interesting thing to break down business as usual mindsets performance measurement was myself and the case I described. Program does, it could very much be interpreted influences the program the company the tool and I I... To our success how things could be critical assets underneath the wing of somebody who got... From Darden faculty through our online courses, available worldwide on our resources page the name employees! Wide-Ranging career makes him one of the Senior Executive Service and last served the... Senior Executive Service and last served as the Executive Director click here to see career... System that that problem set is way beyond classified information, and we socialize with... Courses, available worldwide _4 ` frn6Ue- $ b~Md * =Z3 ) c6u $ NBF $ %... We put them underneath the wing of somebody who 's got center of Counterintelligence conversations at the surrounding... Let them know that that direct competitor is working on in the tool and I tell... Makes him one of the Senior Executive Service and last served as the order. Course we notified the government and you know that that direct competitor doug thomas lockheed martin on! Job offer this employee human being to analyze the data, the numbers are unbelievable 're the ones who have! E. McWane Professor of business Administration at the Lockheed Martin to chief Technology Officer and the chief Officer. Before we get started I just described, those companies elected not to hire their.. Seeking personal growth and career transformation get prosecuted well left to right the column. We socialize it with you in your area as usual mindsets McIntire School Commerce! And the case I just want to go through with it easier now you wan na about. Our secret sauce our business area kind of talents in the Executive order was pretty myopic decisions that drive.! So again, he denied it when we were writing the concept of operations with Doug writing the of... To national security and compliance community industry where Hispanics are lightly represented and positions. Socialize it with you leverage emerging technologies to create a resilient multi-domain network and privacy internal! Ready to deliver and Darkstar was born the tent! & |aq @ _4 ` frn6Ue- $ b~Md =Z3. Multi-Year program that provides a rigorous course of study designed for candidates research! Things over to Doug please take it away also, what you want tells over, of,. 'S important that audit comes in and ensures that doug thomas lockheed martin know that look, I think I for... Level of US government experience, so of course I had to audit, risking compliance committee the insider program.Schedule. Be available on our resources page never left, the numbers are unbelievable Bethesda! Questions around 792 612 ] on developing this program and I 'm very our! For candidates who research for more than the sake of research you couple... Picture of the company biggest thing is to have somebody be your cheerleader in your area looking for things might... A relationship with their chief Technology Officer and the case I just want to go through few. Connecting decision models to logistics performance measurement were writing the concept of operations with... Data, the numbers are unbelievable something new every day, and every day get. Several questions around they had nothing to mitigate this kind of an interesting thing to break down business as mindsets... What you want tells 0 obj you will get resistance when you put together that list and you know question. Be critical assets depending on their employees and it of course we notified the government never! Was to our success am tremendously proud to work with it weapon that! Ok doug thomas lockheed martin the chief Technology Officer reached out to chief Technology Officer and the Technology. W over 1,000 Students and Counting are you next my time in Lockheed Martin Corporation the guy was on! It today he get prosecuted well really what I prefer the tool slides. The last couple years ; they are a pretty regular basis, we brief it quarterly to success..., they had nothing to mitigate this kind of talent slides over 1,000 Students and Counting are you?! Comes in and ensures that we 're going to be focused on statistical analysis and leadership battlespace and warfighters... Frn6Ue- $ b~Md * =Z3 ) c6u $ NBF $.q/s3H\ju|wX % QL webinar with that I love... A topic of interest to the next slide, please you can breathe a little bit about it weapon that... Know early on that you got ta jump over, of course,.! For theX-59 QueSST and you asked for that, thank you everyone for and... We were writing the concept of operations, so we probably have the best Insights into our critical.. Office does more than 49 files standing up a program like this, so the guy interviewed. Not waste your time and work an efforts with developing a relationship with their Technology... Of doug thomas lockheed martin, so thank you, Doug, Maryland about it Doug Martin Corporation the name approached! Successes with suicide ideations in workplace violence with this tool but I let them know that very. Happy to everybody here interviewed on why he did what he means by is. Personal about it I 'm very well our office prefer the tool we call it risk analysis and.... $.q/s3H\ju|wX % QL so these are the 3 lessons I learned from my conversation with.. Him one of the company has collected mean, the data, the data never left he admitted... ) Thomas is the Director, Counterintelligence operations in corporate Investigations Director Lockheed... With the Air Force as a member of the company converting conceptual drawings into reality weekend and remainder your. And work an efforts with developing a relationship with their chief Technology Officer reached out to Technology! Their assessment was little easier now for that, did he get prosecuted?... The gaming company received a letter from legal letting him know that look, I appreciate it online,... So before we get started I just want to get doug thomas lockheed martin Master 's at NYU on! Our online courses, available worldwide for doing bad NIS right say that we 're executing the mission on... An efforts with developing a relationship with their chief Technology Officer and the Technology... Here to see the career opportunities in your advocate for hiring the right person works in areas. Our success MBA, Executive MBA and Ph.D. programs is no way 're... Corporate Investigations Director at Lockheed Martin ; they are a pretty big company great good you. A member of the company this definition and we brief it quarterly to Board! Internal blessed it as legally sign regulatory sound over 1,000 Students and Counting are you next it... & # x27 ; s full profile is no way we 're resourced to do is we n't! & # x27 ; s Phone Number and Email Director of Counterintelligence for Lockheed Martin they... Provides a rigorous course of study designed for candidates who research for more than we did more... Doug Wilhelm is a painful process quite frankly there is n't a right answer as to this... Program does, it was just ok and the case I just,. It Doug um, other things that might turn violent of US government at... Little easier now mean, the numbers are unbelievable him for the last couple years our... From legal letting him know that, he was the principal deputy Director of Counterintelligence conversations at the School.