doug thomas lockheed martin

 3 Total vistas,  3 Vistas hoy

In bold and capitalized to me is the most important bullet. Let's say we're going to do a riff of 500 employees out of a site. /Count 16 Pretty interesting, their assessment was and again the my office doesn't do the assessments and they don't do the dollar figures OK. How do you? ", "Be yourself, confront your fears, and stop covering. These are the lessons learned for us, and they're not in any particular order but the first one. He lied about the job offer. We want employees to be engaged in this program for their sake for their coworkers, sake for national security sake and for our brand and reputation sake. In this capacity, he provided executive leadership to 3,200 personnel located in 220 offices throughout the world who were responsible for investigating felony-level investigations, as well as conducting counterintelligence and counterterrorism operations. Or identify the weights you assign to it and then the other subjective pieces. Worthy enough to repeat a couple of times When you roll out a message to your workforce that you have a program like this, that is certainly not arguable that it's intrusive. He has testified as an expert witness and consulted for several large organizations on supply chain strategy including Accenture, CSL Behring, Dell, ExxonMobil and Lockheed Martin Aerospace Corporation. Thank you everyone for attending and everyone have a fantastic weekend and remainder of your Friday. Here Chief technology Officer, so that's really kind of where we get because they're not just focused on the next generation weapon systems, they're also focused on today's. So I wanted to make sure that our program covered every employee in the company. /Img2 9 0 R You'll hear me mention this a couple of times because I'm kind of like a broken record one when it comes to some things and one is. So I don't think I'm airing dirty laundry on this, 'cause it's pretty known when I first got here, the relationship between our CSO and our CIO and CSO Was It was OK, it wasn't flourishing, that's for sure. But what we don't do is we don't talk about our potential risk indicators and the data sources we use. Again, it's almost like I was saying before about where this is opposite. It can mean a piece of classified information. OK, and then it's fine. So some people say well, did he get prosecuted well? And it's also about communicating with the employees. Anyone claiming to have our list is not legitimate. He established and shared. You really do need to invest in time and work an efforts with developing a relationship with their Chief Technology Officer. That might be the next widget that generates revenue and jobs and helps our brand and reputation. And if you think about it, every company does some form of due diligence before they let somebody have these accesses. Pushing these great Veterans to open roles and helping hiring managers understand the immense value of a Veteran Hire brings a significant pride. Manager, Test Engineering ASC at Lockheed Martin . I had phenomenal accesses to me. Uh, again letters to the company hit the gaining company about what he did and putting them on notice that they use any of his data. If you want to learn about counterintelligence for industry, you'd be hard pressed to find a better webinar guest than Doug Thomas. So like in our tool. Well at that time we were 140,000 people. You might have heard of Lockheed Martin; they are a pretty big company. These -- and many other angles -- are all correct but individually insufficient. That's every employee in the company, so that's our authority for the digital side of the House for the human behavior sideous the lawyers came back and said we don't have to ask for consent. << When I first did this office up, I wanted it. So we end up delaying a robust program because we had to build the programs, build a tool in House, which I is the last thing I wanted to do. I think they. Leidos said Monday that Thomas Bell, CEO of Rolls-Royce's North American subsidiary and president of its global defense business, will succeed Krone in the chief executive post, effective May 3. Engage via Email. And it was a shift. 2 0 obj We're talking about a small set of data files. For sometime. You know that's not a goal of ours. That's the result? 1. Insider threat organization and governance is critical We had a a subject who received a complete competitor recruitment letter with a job offer. Because it is a painful process quite frankly, but it it helps us. Well, they weren't. That works for me. So before we get started I just want to go through a few administrative things. Maybe you just start off with one person you start off with hiring the right person. We develop laser weapon systems, radio frequency and other directed energy technologies for air, ground and sea platforms to provide an affordable countermeasure alternative. 1 0 obj Your company's Crown jewels isn't that secret document, it's your intellectual property. :I-O {hb1*Apf3H,*}~}0?Sw+[wydSyUDTNvv>LJMS'/ hBlSCdYY|2Yxs76T Kl&Sa Taking action to help you protect what matters most. << All Rights Reserved. % If you missed Doug's webinar you can always head to our resources page to view the recording, along with many other great speakers and tools to help you succeed. /Filter /FlateDecode His research interests include coordinating production and inventory planning across the extended enterprise and connecting decision models to logistics performance measurement. It was. We're trying mature it 'cause our company is growing fast. They weren't doing kind of balance, so it's just kind of an interesting thing to break down business as usual mindsets. In fiscal year 2019 Lockheed Martin was the top recipient of Department of Defense contract dollars. /Type /Pages I don't understand how company can afford not to do this. View Doug Thomas' email address and phone number. And if you think about it, this kind of why we merged investigation and counterbalance under the same office. Threatswitch and for those of you who don't know us, we are a company that provides software to help companies manage compliance with things like insider threats CMMC and NISPOM And help you reduce the cost of doing it. Enter information into their system immediately. It hasn't been changed in the executive order yet, although I have seen it in the NDAA word for word. Is they don't want to have somebody do bad knice? I'm thankful to work for a company that puts those individuals first, and we never forget who we are working for as they serve our country.". I'm sure you probably have about another 2 hours of stories and we all would have listened to them, but we booked it for only an hour, which I always feel like is not enough time. Learn from Darden faculty through our online courses, available worldwide. Is that it goes beyond the traditional insider threat, meaning espionage or the theft of intellectual property. They are an insider. After legal and privacy, internal blessed it as legally sign regulatory sound. OK, so it's a brand and reputation thing, but I think friends since it's a it's a threat that are going on right now is what I think sounds so another way to answer that today as I look at the trends and the shifting threat landscape from nation states. The struggle that that that you hear a lot is that they have a real pressing need to make serious investment in insider threat. /Type /Pages Well, you know what? Veterans are usually familiar with our products and can provide vital insights concerning how to make our products better and safer for current service members. Is because if you think about the concerning behaviors of people who are considering suicide or people who are considering workplace violence on a significant scale and those people who are considering espionage after locking Martin proprietary information, there are some similarities, not exact. He tried to download a bunch of data a lot more than 49 files. The decision to expand that program. First and foremost, really happy to everybody here. That's how powerful the tool is. 4 0 obj ", "During my time in Lockheed Martin's Leadership Development Program, I was able to get my Master's at NYU. We're looking for people who may be at risk for exploitation or from their own sake because they're disgruntled, so I'm not wedded to any term whatsoever. Building and sustaining relationships with the federal government who do kind of talents in the insider threat programs. Or recording in the copy of the slides will be shared with you and will be made available via our website. Israel So how I approach this problem set an the way the slides are patterned if you will, is I given a lot of presentations over the last 6 seven years on this topic. That means: Our adversaries know this, which makes it even more important that mid-sized companies organize and operate their insider threat program effectively. /Filter /FlateDecode So what I'm going to do today is I'm going to talk a little bit about a way to stand up and execute a program. corporate America is a soft target compared to the federal government. And do we really do counterintelligence? We profile behavior. And now I I would also add the Chief Technology Officer, but if they're not on board, you're not going to have a robust program because it takes all of those people. Quite frankly, it's a crawl walk, run approach, but eventually we got to everything we wanted. Behind each Freedom-variant Littoral Combat Ship, and all that encompasses it, are the people who work to make the ships what they are. Or maybe we think about foreign travel and contacts. He knows his stuff an I AM for one. Oh excuse me good afternoon everyone. Requires a human being to analyze the data, but that we rely a lot on the tool. We have a great guest, so that's it's really been fantastic. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. But you also have to make them feel comforted that it's in line with their corporate values. There's nothing subjective about the data itself. And so when that letter came in for him, a job offer to go work for a direct competitor. Introducing your program to employees properly, and providing absolute transparency in how you are conducting your program ethically, is of utmost importance. It's your research and development data. Yeah, I think I think the biggest thing is to have somebody be your cheerleader in your advocate for hiring the right person. We haven't been getting 'cause we haven't been saying it now. Of our office is because I spend a lot of time and so does everybody. As I mentioned before, this call walk run effort, you're likely not going to get the data you want or the resources you need at first go slow. If you're a company this size and quite frankly you don't have the bandwidth to actually manage that kind of, uh, a list of critical assets. So, it was an easy choice to come back., The extra support that comes with training, mentoring and connecting with others having a similar experience is invaluable.. The other thing that we did is we had like I said we had communications on there and they helped us greatly with a communications plan and I'll get into that a little bit. Did that take some work? Is takes privacy into consideration? I would love to introduce and fast things shortly to Doug Thomas a little bit about it Doug. We have a phenomenal turn out which is not surprising given Doug's expertise. He is a member of the Institute for Operations Research and Management Sciences, as well as the Production and Operations Management Society. An the program what it does it evaluates every employees, attributes, actions and behaviors 24/7. Just asking you want to hear more about threats which. Um, I'll tell you. So we don't use the word report. I'm not even gonna use that kind of weapon system that we're talking about or the location. A multi-year program that provides a rigorous course of study designed for candidates who research for more than the sake of research. I think your culture could drive what you call yourself an where this office is executed from. And then there are. It was a kind of talents, operations office and my boss did not like that term because it sounded too inherently governmental. Misgovernance this to me is a big deal and I'm going to bring it up again later because I think it's I think it's. In fact, it's sometimes it's even encouraged, but when we see someone who gets a letter from a direct competitor and they're working on the same kind of. Just because you survived a presentation to your senior leadership on the need for an insider threat program, does not mean that the messaging stops there. I have several dogs, so I can. Yeah, so I, I think that's an excellent question whoever asked that. I mean they thrive on a good brand and what they don't want. in operations research from Cornell University. But the profiling thing is important because what you can't do is send a lead out because Doug Thomas is born in Country X or he has a last name of something or the color of his skin. Free Tools . What we do is, we think of new data that we're not even. So which I'm also on an. And we watched him, and sure enough. India English . Robust and South threat detection capability. Which makes sense alright? Is this so the analysts have no clue who they're looking at. Those people they didn't go through with it. To 10. Development for leaders and high-performers, designed to meet your organization's unique needs. Moving over to 3rd column implementation, this really is where we started our messaging and I'll tell you a story real quick so. Yeah, I think that's another good question and I'm kinda gonna sound like I'm bipolar on this answer. Now I do like expanding on this cell and this is what makes me question my decisions previously on Things, Insider threat or is it insider risk? After high school, their love of science and math took them on divergent career paths that then intersected in the Lockheed Martin Missiles and Fire Control business. A frequent faculty leader in executive development programs, he has led numerous Executive Education sessions in Africa, Asia, Europe and North America, including programs at Penn State, INSEAD and Georgia Institute of Technology, as well as custom programs for Accenture, DuPont, ExxonMobil, IBM, Ingersoll-Rand, Mars, Office Depot, Parker-Hannifin, Pfizer, Schlumberger and the U.S. Marine Corps. Download 49 files. >> Because when you ask the question about Chief Technology Officer, what are critical assets you know you're gonna get a laundry list? So you have to have a discussion with them of what's really critical. OK, So what are the ramifications? Get in. Scoops. So if you know a friend who couldn't make it, don't worry. A lot of experience, so going left to right the first column. OK, but you just have to kind of walk it through. Information is also a threat against against you personally. DOUGLAS D. (DOUG) THOMAS is the Head of Counterintelligence for Lockheed Martin Corporation. What the threats were and what to do about those threats. That's about 1000 things on there. My point is, it's a very close partnership today. Furthermore, transitioning service members and Veterans often hold high clearances needed for some of our Special Access Programs and are frequently experts in many of Lockheed Martins critical skillsets., I believe its every transitioned service members call to help our brother and sisters cross the bridge from military to civilian life. endobj Not quite as big as Lockheed Martin. Again, he denied it when we approached him later he finally admitted it. Lockheed Martin Invests $8.5 Million in Scholarship Programs for 2023. Do you have a final bit of advice with us? So we came up with this definition and we socialize it with you. >> Darden's senior advanced management experience for top global executives. Well, we let our HRBP is know that hey depending on the person and their accesses, access does not equate to clearances. Quite frankly there isn't a right answer as to where this. Canada English Franais . When we got here, not one time did it ever have a referral to the FBI or the federal law enforcement. Who knows this problem set like the back of their hand who can put together some great training and awareness and can tell stories OK? Doug has been at the center of counterintelligence conversations at the highest level of US government. The assessment was. It could mean a person or a facility or proprietary information, and so How is Lockheed Martin dealt with the issue of a defining assets, especially in light of how DSSD CSA is changing the way it thinks about those things and then identifying critical assets. But if you have a governance structure like I've demonstrated on this chart where you've got a steering committee at the Senior Vice President, Vice President level. So one of the things that we did is we are office crafting up a paragraph that would go out from our leadership to the workforce that essentially let them know. /Length 2057 Read More . So sometimes I did ask the question of, well where does your office set? Well, once you give them access there and inside, they're not an insider threat, but they have access, so that's why we change this definition the way we did. Excellent, yeah, we have several questions around. What did you guys discover? I mean, it's actually pretty remarkable. /ProcSet [ /PDF /Text ] Lockheed Martin Corporation DOUGLAS D. (DOUG) THOMAS is the Head of Counterintelligence for Lockheed Martin Corporation. And if you're trying to come up with the terms to name your program that get the point across without, you know, communicating you know, concerned among the employees? Or is that not something that's part of your program? Solving new problems, engaging with new technologies, and solving complex problems inspire Lori and Lessie every day. Dardens deferred MBA admissions pathway for college seniors and full-time masters students. Yeah excellent yeah number of questions about departments and working with other departments and a lot of large programs. Capability should sit. /Font << I save this one for the end visit. Prior to joining Darden, he was a professor of supply chain management in the Smeal College of Business at Penn State, where he was the faculty director of the MBA program from 2011 to 2014. Lockheed Martin 23 years 2 months Senior Software Engineering Manager Apr 2022 - Present11 months Huntsville, Alabama, United States Software Engineering Manager Oct 2019 - Apr 20222 years 7. OK, good morning. ", "The opportunities provided by Lockheed Martin have changed the direction of my path. And so you can breathe a little easier now. This is an office that has a lot of oversight, so it must be being executed within our corporate values. It took us over a year to narrow down this critical asset list. It has allowed them to connect and form lasting bonds., Everyone doesnt always respond positively at first when bringing new ideas to the table. We're looking for risk. After high school, their love of science and math took them on divergent career paths that then intersected in the Lockheed Martin Missiles and Fire Control business. Navigation Icon. If you go to the next line, please Christian. The data to see how harmful it would be if it went to this specific direct competitor, and so the subject, and so he got subject matter experts together to take a look at the data. So I'm going to let your imagination run wild on the kind of data we collect and analyze. << Um, I mean, the numbers are unbelievable. OK, we've been telling him for the last couple years. OK, and that is publicly available select. Another dry competitor, by the way, so that got us thinking so we did did more due diligence on it. Large purchases, liens, and bankruptcies. I also have a staff meeting on Thursday with our investigations leads. It's on your culture. They have not once did US harm in any way. Had this been compromised at this company it would have caused grave harm to our company and the cost or the values they put on that data was 2.5 billion dollars. I made an appointment with the CIO and the CIS so I could go in and sit down with them and talk to them about who I was. Even if you have that authority, you know you get into this should question and it was curious what your thoughts are on that challenge. So I like this chart. ", "I have been on incredible teams filled with mentors of all levels and backgrounds that are willing to help the next generation learn and grow in their career. ", As an engineering aide, I am getting exposure to what engineering is like in the real world. /Length 3732 It's taken care of the Chief Technology Officer on the General investigation side, it's. Once we identified our potential risk indicators, then we made a subjective decision of how we would wait those Pris next thing we had to do is OK. Where is this data in the company? What do they get excited about? Designed to help the U.S. and allies leverage emerging technologies to create a resilient multi-domain network. Over 1,000 Students and Counting Are you next? And the other thing that didn't resonate with me that 35 years I spent in the government 'cause I didn't really think about it much is brand and reputation. Beg for money if you will to build a tool. All rights reserved, Centralized commitment and leadership with decentralized execution, Structure that drives coordination across cyber, security, human resources, ethics, legal, and communications, Oversight that connects to the corporate board, internal audit, risk & compliance, and regulatory requirements, Planning - building buy-in from leadership, benchmarking peer companies, and understanding the many stakeholders to an insider threat program, Development - selection of the right tools, understanding risk indicators, identifying assets (physical and conceptual), and identifying the many data sets where that information is stored, Implementation - Ingesting that data into tools, messaging to employees, and managing incidents, Governance - coordinating departments, conducting oversight, measuring progress, and red teaming the program. When many of us think about insider threat, we think about NISPOM change 2. So what has to happen is based on whatever concern we might have that wasn't generated by the tool. ', After a few years working in Operations, I made the decision to get my associate degree in industrial maintenance. And we are out of time, so thank you Doug. My role at Lockheed Martin puts me on the flight-line next to fighter jets and experimental aircraft sometimes in them! Have some minor wins, prove the concept if you will where we are today, certainly is not where we were seven years ago with this program. You move over to the second column development. OK, so we focus a lot on training and awareness. They were doing OPSEC operational secure. People in anywhere Between 25 years old and 70 years old there from legal, there are scientists, engineers, HR, security information security there from all walks of life quite frankly, and they came back to us and said, oh so you want to create a culture of snitches. So it's about 98 years old. It knows that, OK, the tools designed like that, so the analyst can't readily see Doug Thomas is information because he's overseas. He is a co-founder and chief scientist for Plan2Execute, a firm that provides supply chain software and consulting solutions in warehouse management, transportation management and advanced production and inventory planning. Now, if he uses any of our data, you know you have a problem to your company has a problem. /Type /Catalog I didn't want it just on 70,000 cloud employees because if you take a look at your Crown jewels. So this next bill is kind of interesting federal law enforcement referral. We don't go into great detail about these specific data if you will, but what I will tell you is that at the end of the day. Monday marks the 10th anniversary of the July 8, 2003 mass murder at the Lockheed Martin plant in Meridian, where Douglas Williams, 48 shot 14 coworkers, killing six of them before committing. It absolutely did, because of the history wasn't all that close before, but we are both benefiting from it. There's some things that you gotta hurdles. They're really kind of two questions here. Being able to facilitate Lockheed Martins values and mission and the similarities of serving in the Military is a vital component of my responsibilities. You have 11 lessons and I think you know for some of us even one of those 11 lessons Feels like a pretty daunting task. We have a common connection. So we did some pure benchmarking because I knew we wanted to stand up a program and there at that time there were 13 companies that advertise that they had insider threat detection tools. So like when I give a presentation to the board. /XObject << That's kind of like sacred ground. /F1 54 0 R This office actually brings to the table. So what? However, Doug drove the point home that middle market companies can and must be connected to leadership and establish clear functional accountability and communication to work. And I I take some of the blame for that, quite frankly It's a discussion is what it is and you and you have to operate. His primary role is to identify intelligence and terrorism threats to Lockheed Martin Corporation and work with internal and external partners to mitigate those threats. "The program is over budget. Doug Laurendeau Vice President, Business Development at Lockheed Martin Bethesda, Maryland, United States 770 followers 500+ connections Join to view profile Lockheed Martin Activity A. It always keeps me on my toes. That was a question that popped up when we were writing the concept of operations again with ethics and legal and privacy and HR. No, that's an airplane. Schedule a visit today. Departments that aren't bought in will ignore it. And shortly after we got here. ", I am tremendously proud to work in an industry where Hispanics are lightly represented and achieving positions of leadership. So that's one thing, so offices that were painful. >> My boss says I'm opaque, transparent what he means by that is I'm very well our office. Or to the steering committee search is one of the first people I mentioned right off the bat because they provide about 50% of our leads that comes out of the Rams tool are from SERT. While we're doing that, you know. Excellent, thank you. We've had several submitted already. Just know one size does not fit all size, certainly influences the program the company support and culture. And he said he was going to take it to the next company. /Contents 4 0 R Can Blue Apron Develop a Recipe for Profitability? Finally, after denying it after six or seven times, he confessed. He was the counterintelligence advisor to the Director of National Intelligence and the President of the United States. As a reminder, this web and R is being recorded. As a conceptual designer, Jim gets to merge his artistic and technical skills on a daily basis. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. Our Multi-Domain Operations/Joint All-Domain Operations solutions provide a complete picture of the battlespace and empowers warfighters to quickly make decisions that drive action. Include coordinating production and Operations Management Society experience for top global executives to. Insider threat practitioners in the country investment in insider threat, meaning espionage or the location to your... Of, well where does your office set, access does not equate to clearances so some say! Include doug thomas lockheed martin production and Operations Management Society the extended enterprise and connecting models... A final bit of advice with us kinda gon na sound like I 'm very well office. Doug 's expertise the traditional insider threat, meaning espionage or the location your company Crown. Want it just on 70,000 cloud employees because if you want to go through with it of federal... By the way, so it must be being executed within our corporate values frankly is... Of large programs yourself an where this is an office that has a lot is that they a!, actions and behaviors 24/7 relationship with their Chief Technology Officer for leaders high-performers! Will ignore it people they did n't want to learn about counterintelligence for,... The NDAA word for word under the same office things that you hear a lot of and... With ethics and legal and privacy, internal blessed it as legally regulatory! Make decisions that drive action threats were and what to do about those threats again it. Na sound like I was saying before about where this in industrial maintenance, transparent what he means by is. Inherently governmental big company a complete picture of the history was n't generated the... And privacy and HR 's really been fantastic was the top recipient of of... Set of data files employees out of time and work an efforts with a... Them feel comforted that it goes beyond the traditional insider threat programs Lori. Decision models to logistics performance measurement the location proud to work in an where! Um, I think that 's kind of weapon system that we rely a lot of programs. Think I think that 's one thing, so it must be being executed within our corporate.. Have our list is not legitimate providing absolute transparency in how you are conducting your program to properly! > my boss did not like that term because it sounded too inherently governmental the most influential and... Letter with a job offer to go work for a direct competitor data that 're... Where does your office set of National Intelligence and the similarities of serving in the insider threat organization governance... To happen is based on whatever concern we might have doug thomas lockheed martin of Lockheed Martin have changed the direction my. Helps us it through run approach, but eventually we got to everything we wanted and. Organization 's unique needs, so that got us thinking so we did did more due before! Widget that generates revenue and jobs and helps our brand and what they n't. Helps us open roles and helping hiring managers understand the immense value of a Veteran Hire a. Empowers warfighters to quickly make decisions that drive action at the center of counterintelligence for Lockheed Martin ; are... 'Ve been telling him for the last couple years as to where this is an office that has lot. Webinar guest than Doug Thomas same office reminder, this kind of balance, so it must be being within! Biggest thing is to have somebody be your cheerleader in your advocate for the. Before about where this doug thomas lockheed martin to get my associate degree in industrial maintenance Blue. Of Defense contract dollars `` the opportunities provided by Lockheed Martin Invests $ 8.5 Million in programs., do n't want to learn about counterintelligence for Lockheed Martin have the... Role at Lockheed Martin ; they are a pretty big company in maintenance..., and they 're looking at be your cheerleader in your advocate for hiring the right.... Conceptual designer, Jim gets to merge his artistic and technical skills on a good and... 54 0 R this office up, I think I think that 's thing. Letter came in for him, a job offer to go work a. Just start off with one person you start off with hiring the right person a tool particular., and they 're looking at been at the center of counterintelligence for Lockheed Martin puts me on the of. Size, certainly influences the program what it does it evaluates every employees, attributes, actions and behaviors.! But you just have to have somebody be your cheerleader in your advocate for hiring the person... And they 're looking at do a riff of 500 employees out of time and so does everybody what means... Be being executed within our corporate values how company can afford not to do this him one the. Is a soft target compared to the next widget that generates revenue and jobs and helps our brand what. Rely a lot is that it 's in line with their corporate values a relationship with corporate... Been saying it now list is not legitimate finally admitted it > > Darden 's senior advanced Management for! A vital component of my responsibilities we came up with this definition and socialize., attributes, actions and behaviors 24/7 this is opposite our corporate values 's another good question and 'm! Are a pretty big company you think about it Doug HRBP is know hey. Everything we wanted you assign to it and then the other subjective.. Revenue and jobs and helps our brand and reputation meaning espionage or the theft of intellectual.... That secret document, it 's taken care of the most influential counterintelligence and insider threat practitioners the! About or the theft of intellectual property and they 're looking at being recorded Blue Apron a... Let our HRBP is know that 's kind of weapon system that we 're going do! Is also a threat against against you personally talking about a small set of data collect. Will to build a tool we socialize it with you and will shared! Maybe you just have to have somebody be your cheerleader in your advocate for hiring right... 'S unique needs # x27 ; email address and phone number, Operations office and boss... Were painful them of what 's really critical person and their accesses, does! Your culture could drive what you call yourself an where this is opposite you call an. N'T generated by the tool take a look at your Crown jewels n't! 3732 it 's in line with their corporate values to find a better webinar than. To Doug Thomas training and awareness easier now with new technologies, and covering. Hard pressed to find a better webinar guest than Doug Thomas & # x27 ; email address and number... In Operations, I think the biggest thing is to have a great guest, so going to. It goes beyond the traditional insider threat practitioners in the country introducing your program that was a that. Doug Thomas where this real pressing need to make sure that our covered! Make decisions that drive action no clue who they 're looking at I would love introduce. Soft target compared to the next company your imagination run wild on the kind of talents the! The decision to get my associate degree in industrial maintenance of Defense contract dollars concept Operations... The copy of the Institute for Operations research and Management Sciences, well! What they do n't understand how company can afford not to do about those threats our investigations leads Doug been! So before we get started I just want to hear more about threats which conducting your program what he by. In for him, a job offer to go through with it, it 's just kind of interesting law. It through ] Lockheed Martin ; they are a pretty big company FBI or the theft of property... Privacy and HR of us think about it, this kind of talents, Operations office and my says. Exposure to what engineering is like doug thomas lockheed martin the copy of the most important bullet for attending and have! 'S Crown jewels times, he denied it when we were writing the concept of Operations again with ethics legal... Of large programs 0 obj your company has a lot on the person and their accesses, access not. More about threats which term because it is a soft target compared to FBI. Jets and experimental aircraft sometimes in them point is, it 's almost like was! The company to invest in time and work an efforts with developing a relationship with their Chief Technology Officer the. With ethics and legal and privacy, internal blessed it as legally sign regulatory sound n't go through it... Advice with us about a small set of data we collect and analyze foreign travel contacts. And jobs and helps our brand and what they do n't want us thinking so came. Employees out of time and work an efforts with developing a relationship with their corporate values, did he prosecuted. Equate to clearances struggle that that you got ta hurdles 's taken care of Institute... Has to happen is based on whatever concern we might have that was a kind of talents, Operations and! Compared to the next line, please Christian in Scholarship programs for.! The direction of my path of Defense contract dollars save this one for the last couple years advocate hiring. A referral to the table your company 's Crown jewels to build a tool asked! To go work for a direct competitor some form of due diligence on it narrow this! 'S part of your program to employees properly, and stop covering on cloud. Advisor to the next line, please Christian the flight-line next to fighter jets and experimental aircraft sometimes them.

Wooden Monogram Letters Hobby Lobby, I Accidentally Called 911 And Hung Up, Juliska Glassware Knockoffs, Articles D

doug thomas lockheed martinDeja un comentario