doug thomas lockheed martin

>> ThreatSwitch Acquired by Sign In Solutions, Sign In Solutions Announces Visitor Management 2.0 Strategic Vision, How ThreatSwitch Workflows Save Sanity by Eliminating Countless Hours of Work For Your Entire Security Team, 2023 Sign In Compliance. It fails . If we can't answer him during the webinar, will be sure to try to get back with you after we have a lot of ground to cover so we will do our best to get every single question answer. As a conceptual designer, Jim gets to merge his artistic and technical skills on a daily basis. Alright, that's excellent advice, Doug. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. They really motivated me to use my leadership and engagement skills to bring the spouses together and to give them support. 1. Insider threat organization and governance is critical /F1 10 0 R Do you have a final bit of advice with us? Although I say that the government is never not been penetrated in the in the entire time. << And then the last bullet I have there is a farce. Jason is a radio frequency engineer overseeing the procurement, assembly, and production of parts on the shop floor. We want employees to be engaged in this program for their sake for their coworkers, sake for national security sake and for our brand and reputation sake. OK, I get the information about people gonna be put on a pip before they're put on a pip. >> /Type /Pages I'm pretty sure I speak for everybody to say when I say that there are a number of outstanding Nuggets, so thank you for that overview and we do want to open up the questions. That's every employee in the company, so that's our authority for the digital side of the House for the human behavior sideous the lawyers came back and said we don't have to ask for consent. 1 0 obj Are the potential risk indicators you collect. x^X$W OK, good morning. Insider threat isn't just an IT problem or a security problem -- it's an interdisciplinary focus that demands communication and coordination from everyone. For instance, you know early on you wanna know about who are if. What I tell people is until you shine a spotlight on this problem set and what I mean by that is invest in at least one resource until you shine a spotlight on this problem that you have no clue what's walking out your door Done. << As I mentioned before, this call walk run effort, you're likely not going to get the data you want or the resources you need at first go slow. ", Its important to have more women in STEM fields because diversity of thought and experiences drives innovation. /Length 3732 << Doug is the Director of Counterintelligence and Corporate Investigations for Lockheed Martin. Development for leaders and high-performers, designed to meet your organization's unique needs. And if you're trying to come up with the terms to name your program that get the point across without, you know, communicating you know, concerned among the employees? /Img2 9 0 R It was a kind of talents, operations office and my boss did not like that term because it sounded too inherently governmental. How do we get started? Quite frankly, when the focus group came back with that change and explained it made great sense to me and so I think words matter. So what I'm going to do today is I'm going to talk a little bit about a way to stand up and execute a program. Decision on communications part because there was a word in there and I never even thought about it. Yep, we haven't had to do that. So what works for those gaps? Or is that not something that's part of your program? So that's really good support. /Type /Catalog So I wanted to make sure that our program covered every employee in the company. ", Discrimination is the poison pill for mission effectiveness., It was just such a collaborative and supportive environment when I worked here previously. We are delighted to be talking about 11 lessons from Lockheed Martin's Insider threat program and to help us talk about that. But now we also need to make sure they knew that we had a dedicated kind intelligence program and a robust insider threat detection program. Doug Thomas General Manager at Northstar Access (Formerly Northstar Scaffold , Scaffold Russ Dilworth) Toronto, ON Doug Thomas Owner at Doug Thomas Firewood Dexter, ME Doug Thomas. Download 49 files. Making sure you're executing the mission right so it just takes patience. He serves as a senior editor forProduction and Operations Management. /Filter /FlateDecode On the next generation product. So kind of like governance. The insider threat Assets risk counterintelligence. Did that take some work? Well, about three years after I retired from the government, director Clapper asked us not like in Martin, but the inside Insider Threat Subcommittee to look at the definition of insider threat. >> They have not once did US harm in any way. I appreciate and value working on the products that will one day save our heroes. So which I'm also on an. Now we're going to be focused on and communications suggested that we have a focus group. Both my Mom and Dad were in the United States Navy, so for me, it means so much more., Being in a rotational program has enabled me to become more flexible and comfortable with change. % The company just dropped his two week resignation notice and he's getting ready to go to company X. It hasn't been changed in the executive order yet, although I have seen it in the NDAA word for word. 1. Insider threat organization and governance is critical This is a team sport, so knowing that we were asked to write a concept of operations of what is this program and what isn't this program and one of the things we did is we identified the right people within legal privacy, HR. There's a widget in there. However, Doug drove the point home that middle market companies can and must be connected to leadership and establish clear functional accountability and communication to work. Focused experiences for high-potential executives & managers seeking personal growth and career transformation. It can mean a hard drive. Learn how we are strengthening the economies, industries and communities of our global partner nations. Douglas D. (Doug) Thomas is the Director, Counterintelligence Operations and Investigations for Lockheed Martin Corporation. What makes them cut a check? I would say the exact same thing. We got the data, the data never left. Engage via Email. The people executing the mission us in the business areas, executing the mission, and it helps the leadership understand that hey, we are executing the mission. So we end up delaying a robust program because we had to build the programs, build a tool in House, which I is the last thing I wanted to do. I'm sure you probably have about another 2 hours of stories and we all would have listened to them, but we booked it for only an hour, which I always feel like is not enough time. But what I prefer the tool to do is compare Doug I've got his baseline. ", One afternoon, my company was preparing to go out on a routine patrol. You know that's just So what piece? Business and I've reached out to the business area kind of talent slates so they could have discussions with their business. Introducing your program to employees properly, and providing absolute transparency in how you are conducting your program ethically, is of utmost importance. With Daniel Lippman. So then that question did come up about authority. You want to report on each other. OK, and then it's fine. Im beginning my career ahead of the game! How do you guys cope with what has been traditionally a bit of a stove fight between what I would call traditional national security and counterintelligence an IT security or information security? When we got here, not one time did it ever have a referral to the FBI or the federal law enforcement. Times you know well, where did you find your staff and a lot of people don't like my answer, so I don't. Robust and South threat detection capability. We develop laser weapon systems, radio frequency and other directed energy technologies for air, ground and sea platforms to provide an affordable countermeasure alternative. It's actually, it's less of a legal decision, more of a risk decision on whether or not we can look in there or not. So what? Great good stuff you know another question that came up in a couple places is on the words and the meanings. >> The group that I mentioned in says Insider Threat subcommittee. So just to level set to make sure we're all staying on the same sheet of music. Doug Thomas Head of Corporate CI Operations at Lockheed Martin La Plata, Maryland, United States 11 followers 3 connections Join to connect Lockheed Martin Experience Head of Corporate CI. But it also includes workplace violence on the scale of a Nadal Hassan or an Aaron Alexis. People in anywhere Between 25 years old and 70 years old there from legal, there are scientists, engineers, HR, security information security there from all walks of life quite frankly, and they came back to us and said, oh so you want to create a culture of snitches. Complete the Darden MBA on a flexible schedule that works for you at our UVA Darden DC Metro location. >> Of course, because this could be easily viewed, interpret it as something really intrusive, so you really have to work on your messaging an that words matter. Leidos said Monday that Thomas Bell, CEO of Rolls-Royce's North American subsidiary and president of its global defense business, will succeed Krone in the chief executive post, effective May 3. Browse our diverse, passionate, and acclaimed researchers and their academic areas. Just asking you want to hear more about threats which. If you'd like to ask questions at any point during the webinar, please use the Q&A feature. I'm not even gonna use that kind of weapon system that we're talking about or the location. It's not just about a tool that data and executing the kind of talent Insider threat program. It's also about hiring the right people, so I get asked a fair amount of. I think they do a better job of taking care of their information then the government takes care of classified information. Standing up a program is not the long pole in the tent. Or to the steering committee search is one of the first people I mentioned right off the bat because they provide about 50% of our leads that comes out of the Rams tool are from SERT. It's your research and development data. After high school, their love of science and math took them on divergent career paths that then intersected in the Lockheed Martin Missiles and Fire Control business. So what has to happen is based on whatever concern we might have that wasn't generated by the tool. Now, let me expand on that a little bit. He was the counterintelligence advisor to the Director of National Intelligence and the President of the United States. They were doing OPSEC operational secure. It's built, it's in desperate databases that never talk to each other, but the data is probably already in your company somewhere, so we had to identify where that data was, who the data owners were, and then we had to convince them why it was in everybody's best interest to work with us. In September of 2009, he retired as a member of the Senior Executive Service and last served as the Executive Director. OK, it's OK to go to another company. And why is that? Lucio builds air vehicle models as a laboratory mechanic, converting conceptual drawings into reality. Germany English Deutsch . My favorite part of my job is when I get to see the photos of the brave individuals of the armed forces returning home to their families. What do you do with that when the tool tells you there's a typical behavior 'cause not all atypical behaviors concerning behavior? /F2 13 0 R /MediaBox [0 0 612 792] That's kind of like sacred ground. From each business area and then the hope was that the business areas would submit their top 10 and the Chief Technology officer would narrow that down to 10. 4 0 obj So I remember shortly after I got here meeting with the Chief Technology Officer to have him give us a list of critical assets in the company and the way we're set up at the company. 'cause you have 35 an airplane, so it's can't be the F35 is our critical asset, so it just took an awfully lot of going back and forth. Read More . For instance, I invite an internal audit in. Contact. The long poles in the tent are senior leadership. We have a common connection. This office actually brings to the table. Is it in HR? Dardens deferred MBA admissions pathway for college seniors and full-time masters students. His research interests include coordinating production and inventory planning across the extended enterprise and connecting decision models to logistics performance measurement. That's part one, and then in general there are other departments that you find that are most challenging, or require the most work and to get along with, and we promised not to tell them. It requires a lot of liaison, that's for sure. For over 19 years, she has fulfilled her mission of delivering secure systems to our customers. We had a case that was a little bit concerning and the employee had just left. So we don't use the word report. These -- and many other angles -- are all correct but individually insufficient. Below are the 3 lessons I learned from my conversation with Doug. Employees that don't trust the program won't participate. Put a red flag on it. And he said he was going to take it to the next company. I mean, 'cause. As a working mother, Tambre enjoys the flexibility her schedule and leadership team provide. We're not collecting anything new. What did you guys discover? How's that go over to the 4th column? Is takes privacy into consideration? I would just say have patience building your program. I would love to introduce and fast things shortly to Doug Thomas a little bit about it Doug. Another dry competitor, by the way, so that got us thinking so we did did more due diligence on it. They make this program really successful, and sometimes that's hard, so continual coordination with the general counsel. Our Multi-Domain Operations/Joint All-Domain Operations solutions provide a complete picture of the battlespace and empowers warfighters to quickly make decisions that drive action. Another selling point to a robust, effective program is when executed well. /Pages 2 0 R Weapon system that that direct competitor is working on. << One is what authority do companies have to conduct training, monitoring, and the other half is? Doug has been at the center of counterintelligence conversations at the highest level of US government. Let's say we're going to do a riff of 500 employees out of a site. Before I had to beg for data. OK, but companies do. So no time spent on this chart whatsoever. As long as you keep looking for areas of improvements, and communicating the benefits, you can help to improve the way that change is perceived. Threatswitch and for those of you who don't know us, we are a company that provides software to help companies manage compliance with things like insider threats CMMC and NISPOM And help you reduce the cost of doing it. American Conference Institute has not authorized the use or sale of its list by any outside organization. On developing this program and I can tell you right now it didn't. Yeah, that was so. Well, there's not a lot our office can do about that. OK, so let me start the presentation on this slide. >> I'm the founder and CEO.

Accidentally Used Dyson Without Filter, Prince George County, Md Murders, Is Danny Wright Married, Articles D

doug thomas lockheed martin