And shortly after we got here. In this capacity, he leads a staff that is responsible for providing advice and guidance relative to counterintelligence and counterterrorism matters impacting the Corporation. >> You might have heard of Lockheed Martin; they are a pretty big company. The insider threat Assets risk counterintelligence. How do we get started? Some of these questions will give it about another 10 or 15 seconds. It's actually, it's less of a legal decision, more of a risk decision on whether or not we can look in there or not. The Board of Directors is briefed every year. So they could take a look at the conops to say Yep, or an agreement this thing solid. So we will be sharing that with you after the webinars over, including the recording, so be sure to check back there if you're looking for the slots or the recording. /Filter /FlateDecode #2. Or identify the weights you assign to it and then the other subjective pieces. Israel Once you figured out what the assets are. Although I say that the government is never not been penetrated in the in the entire time. ", "Be yourself, confront your fears, and stop covering. A lot of experience, so going left to right the first column. Schedule a visit today. OK to do it. Is because if you think about the concerning behaviors of people who are considering suicide or people who are considering workplace violence on a significant scale and those people who are considering espionage after locking Martin proprietary information, there are some similarities, not exact. Contact. Monday marks the 10th anniversary of the July 8, 2003 mass murder at the Lockheed Martin plant in Meridian, where Douglas Williams, 48 shot 14 coworkers, killing six of them before committing. Moving over to 3rd column implementation, this really is where we started our messaging and I'll tell you a story real quick so. Canada English Franais . Contact. Yeah, I think I think the biggest thing is to have somebody be your cheerleader in your advocate for hiring the right person. Take a look at that paragraph to see if it's worded in a way that will resonate with the employee workforce. 1100 Wilson Boulevard Which makes sense alright? /Type /Catalog Quite frankly, it's not necessarily a bad thing, but it's not necessarily a good thing either. Well, you know what? This just depicts our organizational structure, where it's a centralized mission for sure, but decentralized execution. The assessment was. Doug Wilhelm is a Vice President, Program Management at Lockheed Martin based in Bethesda, Maryland. They make this program really successful, and sometimes that's hard, so continual coordination with the general counsel. It doesn't matter it be. That's about 1000 things on there. Below are the 3 lessons I learned from my conversation with Doug. Mr. Thomas retired from this position on October 1, 2011. A multi-year program that provides a rigorous course of study designed for candidates who research for more than the sake of research. So he's been around many sides of this issue. It's insider. There's nothing subjective about the data itself. Um, I mean, the numbers are unbelievable. It's your research and development data. What do you do with that when the tool tells you there's a typical behavior 'cause not all atypical behaviors concerning behavior? << In Canon Towns, an insider threat detection well there is no solid training. >> Insider threat isn't just an IT problem or a security problem -- it's an interdisciplinary focus that demands communication and coordination from everyone. You know that's just So what piece? As pretty intrusive. They have no program, they had nothing to mitigate this kind of a problem. Threat detection is due diligence to the supply chain. Together, they worked quickly to meet the need to have a realistic aircraft model with a working cockpit, developing a functional piece of art for the film. Anomalous or atypical behavior? endobj ", "I truly learn something new every day, and every day I get to solve new challenges. Have some minor wins, prove the concept if you will where we are today, certainly is not where we were seven years ago with this program. Prior to joining Darden, he was a professor of supply chain management in the Smeal College of Business at Penn State, where he was the faculty director of the MBA program from 2011 to 2014. Below are the 3 lessons I learned from my conversation with Doug. Doug Thomas General Manager at Northstar Access (Formerly Northstar Scaffold , Scaffold Russ Dilworth) Toronto, ON Doug Thomas Owner at Doug Thomas Firewood Dexter, ME Doug Thomas. The gunman, Douglas Williams, an assembly line worker at the plant, shot 14 of his co-workers with a shotgun, killing six of them, before committing suicide. We showed up. So these are the categories of metrics that we collect. It's not the way, but it's a way. Now I've also mentioned about the application as suicide ideations in workplace violence prevention. /ProcSet [ /PDF /Text ] It was about people with clearances and classified information, and we know that that problem set is way beyond classified information. Is that it goes beyond the traditional insider threat, meaning espionage or the theft of intellectual property. About this program. You would expect that their insider threat organization would be robust and well-organized, and it is. You've got an oversight internal audit, risking compliance committee. And so you can breathe a little easier now. And they all liked it. Pardon me Who's been involved in that asset discussion? And so when that letter came in for him, a job offer to go work for a direct competitor. Well, that's not the message that we wanted to go out. Just asking you want to hear more about threats which. If you want to learn about counterintelligence for industry, you'd be hard pressed to find a better webinar guest than Doug Thomas. My favorite part of my job is when I get to see the photos of the brave individuals of the armed forces returning home to their families. American Conference Institute has not authorized the use or sale of its list by any outside organization. Who are maybe just starting program? Are lawyers and again, X internal general Counsel an external general counsel. Jason is a radio frequency engineer overseeing the procurement, assembly, and production of parts on the shop floor. Doug was fairly recently, 2018 honored with the first ever Lifetime Achievement Award for Counterintelligence by the Director of National Intelligence, so. He has testified as an expert witness and consulted for several large organizations on supply chain strategy including Accenture, CSL Behring, Dell, ExxonMobil and Lockheed Martin Aerospace Corporation. And the business areas are very vocal about the fact that we have a dedicated Countertenors programmer. It's built, it's in desperate databases that never talk to each other, but the data is probably already in your company somewhere, so we had to identify where that data was, who the data owners were, and then we had to convince them why it was in everybody's best interest to work with us. Find contact information for ROTHENBERGER. What I think my office brought to the table. I mean you mentioned the scope of this can be huge. It didn't start off all that well. 2023 All rights reserved. And why is that? Do you have a final bit of advice with us? Globe Icon. Your company's Crown jewels isn't that secret document, it's your intellectual property. Hey great thank you John, I appreciate it. We've had several submitted already. We took it outside counsel. ", "The opportunities provided by Lockheed Martin have changed the direction of my path. With Daniel Lippman. What I tell people is until you shine a spotlight on this problem set and what I mean by that is invest in at least one resource until you shine a spotlight on this problem that you have no clue what's walking out your door Done. That's every employee in the company, so that's our authority for the digital side of the House for the human behavior sideous the lawyers came back and said we don't have to ask for consent. Vice President of Business Development. /Type /Pages Others seem to embrace it as security actually gave me the hardest time about this program because they thought that they were already doing counterintelligence. I have been used to it for many years, so in your engagement with the board and the senior executives at Lockheed, what have you found is the most persuasive argument for them to get on board with spending money on insider threat and you know. Well, I didn't get the top 10 for this and I got like the top 50. So what has to happen is based on whatever concern we might have that wasn't generated by the tool. I mean they thrive on a good brand and what they don't want. The IC Intelligence Committee has been, uh, alive and well. To identify what your critical assets are and who's working on those programs for me, I view the Chief Technology Officer in our company as my number one internal customer. But if you have a governance structure like I've demonstrated on this chart where you've got a steering committee at the Senior Vice President, Vice President level. They were doing OPSEC operational secure. Another case we had same year. 11/25/2022 2:48 AM. Um in for an annual conference, and sure enough, the entire SERT team is part of that. Download 49 files. OK, there is no way we're resourced to do. Quite frankly, it's a crawl walk, run approach, but eventually we got to everything we wanted. He coordinates the technical development of the X-plane design currently being developed in partnership with NASA. /Pages 2 0 R Both my Mom and Dad were in the United States Navy, so for me, it means so much more., Being in a rotational program has enabled me to become more flexible and comfortable with change. After high school, their love of science and math took them on divergent career paths that then intersected in the Lockheed Martin Missiles and Fire Control business. It's internal. Last Update. But we put them underneath the wing of somebody who's got. So that's it. Well, this is all about access. Designed to help the U.S. and allies leverage emerging technologies to create a resilient multi-domain network. You want to report on each other. Let's say we're going to do a riff of 500 employees out of a site. Germany English Deutsch . In this capacity, he provided executive leadership to 3,200 personnel located in 220 offices throughout the world who were responsible for investigating felony-level investigations, as well as conducting counterintelligence and counterterrorism operations. Leidos said Monday that Thomas Bell, CEO of Rolls-Royce's North American subsidiary and president of its global defense business, will succeed Krone in the chief executive post, effective May 3. For info on our next webinar with that, thank you, Doug. It lets the workforce know that this isn't just some rogue office. He serves as a senior editor forProduction and Operations Management. And I could tell that because of the history I was being looked at with a little bit of a John deciso, it was, uh, it took awhile to build that relationship, but I can tell you now I have a staff meeting 'cause not all my staff is here at corporate headquarters. They weren't doing kind of balance, so it's just kind of an interesting thing to break down business as usual mindsets. July 9, 2003 / 6:40 AM / CBS/AP Police say gunshots and then bedlam exploded Tuesday morning at the Lockheed Martin assembly plant in Meridian, Miss., as a white factory worker described as a. /F1 10 0 R Weapon system that that direct competitor is working on. /Contents 4 0 R /Parent 2 0 R So kind of like governance. OK, So what are the ramifications? India English . It's been enormously helpful. Lockheed Martin provides me an opportunity for job security and a chance to follow my passion. Dr. Michael is the lead engineer for theX-59 QueSST. Education: B.S., Cornell University; M.S., Ph.D., Georgia Institute of Technology. I hope I did not waste your time and I hope you got at least one nugget out of this. The group that I mentioned in says Insider Threat subcommittee. I consider it an honor and privilege!, 2023 Lockheed Martin Corporation. Learn from Darden faculty through our online courses, available worldwide. We're trying mature it 'cause our company is growing fast. Buy in. OK it took a few years to get to that point. Had this been compromised at this company it would have caused grave harm to our company and the cost or the values they put on that data was 2.5 billion dollars. /Type /Catalog Below are the 3 lessons I learned from my conversation with Doug. I also have a staff meeting on Thursday with our investigations leads. If you're a company this size and quite frankly you don't have the bandwidth to actually manage that kind of, uh, a list of critical assets. He is a member of the Institute for Operations Research and Management Sciences, as well as the Production and Operations Management Society. The decision to expand that program. When we got here, not one time did it ever have a referral to the FBI or the federal law enforcement. I had phenomenal accesses to me. But you also have to make them feel comforted that it's in line with their corporate values. That's important. We have a human behavior and a digital behavior baseline of every employee in the company and what we're looking for is anonymous or not. So I wanted to make sure that our program covered every employee in the company. Doug is based out of La Plata, Maryland, United States and works in the Defense & Space industry. Does it create baggage? As an engineer, I love this challenge because I am always learning, creating and seeking solutions that benefit the system around me and the people next to me., I wondered how to fit this role into my already busy life, but my co-workers were so encouraging. In bold and capitalized to me is the most important bullet. 2 0 obj Lockheed Martin Corporation DOUGLAS D. (DOUG) THOMAS is the Head of Counterintelligence for Lockheed Martin Corporation. Again, if you have. So when I was in the government I had access. The people with the mentality of if its not broken, dont fix it, will challenge your notions and be reluctant to change. I think they. Now today I get that information before the supervisors get that information. Can Blue Apron Develop a Recipe for Profitability? And if you think about it, every company does some form of due diligence before they let somebody have these accesses. It depends on your culture. stream That includes: Throughout Doug's talk, he came back to a critical, often-missed perspective: without transparency and trust, insider threat programs won't work. And he said he was going to take it to the next company. OK, and then it's fine. This little bit of two parter one is, you know. A lot of it has to do with stressors and people becoming disgruntled and things like that. So as me getting in front of the leadership, talking to them about their shifting threat landscape and what I meant by that was. endobj ", I think the best aspect of my position is the open table culture at Lockheed Martin. However, Doug drove the point home that middle market companies can and must be connected to leadership and establish clear functional accountability and communication to work. Arlington, VA 22209 USA. Data loss prevention tools. Uh, a typical behavior? Global Presence, Local Impact . Complete the Darden MBA on a flexible schedule that works for you at our UVA Darden DC Metro location. It hasn't been changed in the executive order yet, although I have seen it in the NDAA word for word. A pretty robust program, and you're collecting the right kind of data and it's being analyzed correctly. OK, we've been telling him for the last couple years. And if you're trying to come up with the terms to name your program that get the point across without, you know, communicating you know, concerned among the employees? For sometime. Prior to joining Darden, he was a professor of supply chain management in the Smeal College of Business at Penn State, where he was the faculty director of the MBA program from 2011 to 2014. Vice President, Program Management at Lockheed Martin. Orlando, Florida, United States. So if you know a friend who couldn't make it, don't worry. Read More. Douglas Rood is a Manager, Test Engineering ASC at Lockheed Martin based in Bethesda, Maryland. Focused experiences for high-potential executives & managers seeking personal growth and career transformation. Because it is a painful process quite frankly, but it it helps us. 1. Insider threat organization and governance is critical Before I start, I remember giving presentations while at the DNI, right around the time where. Again, he denied it when we approached him later he finally admitted it. So we end up delaying a robust program because we had to build the programs, build a tool in House, which I is the last thing I wanted to do. Lessons learned is the breakdown of business as usual mindset. So I love this question, so I plug whoever did this one. Behind each Freedom-variant Littoral Combat Ship, and all that encompasses it, are the people who work to make the ships what they are. Enter information into their system immediately. To audit our program on an annual basis. Well, once you give them access there and inside, they're not an insider threat, but they have access, so that's why we change this definition the way we did. So no time spent on this chart whatsoever. Well at that time we were 140,000 people. Misgovernance this to me is a big deal and I'm going to bring it up again later because I think it's I think it's. Every month ThreatSwitch hosts a webinar on a topic of interest to the security and compliance community. It kind of puts a nice book in on your talk and that is eating the elephant. :I-O
{hb1*Apf3H,*}~}0?Sw+[wydSyUDTNvv>LJMS'/ hBlSCdYY|2Yxs76T Kl&Sa And we are out of time, so thank you Doug. But the company's leadership is not quite on board because they're not used to it like the way that Lockheed Martin might have. ", Three years ago, I decided I wanted to get more involved in my local community and give back to those less fortunate than me., I always tell my soldiers, I may be your leader, but Im nothing without you. It's also about hiring the right people, so I get asked a fair amount of. It was a kind of talents, operations office and my boss did not like that term because it sounded too inherently governmental. But what we don't do is we don't talk about our potential risk indicators and the data sources we use. To 10. Navigation Icon. Doug Wilhelm's Phone Number and Email. That's why we'll be sharing our CEO's lessons-learned each month right here on the ThreatSwitch blog. How do you work through that? Threatswitch and for those of you who don't know us, we are a company that provides software to help companies manage compliance with things like insider threats CMMC and NISPOM And help you reduce the cost of doing it. Making sure you're executing the mission right so it just takes patience. We don't sell it, it's just ours. And we watched him, and sure enough. UVA Darden School of Business. As long as you keep looking for areas of improvements, and communicating the benefits, you can help to improve the way that change is perceived. I save this one for the end visit. I mean, it's actually pretty remarkable. Lockheed Martin Invests $8.5 Million in Scholarship Programs for 2023. What the threats were and what to do about those threats. And this person Was on our radar already. Here Chief technology Officer, so that's really kind of where we get because they're not just focused on the next generation weapon systems, they're also focused on today's. Denmark English Danish . There's a vast amount of data out there that speaks to what a program should look like to me. A MOSA will provide the interconnectivity needed to work with other elements of the kill web as well as ease of updating depending on mission needs. Well, since then, we're averaging about 30 referrals a year to the FBI. He is a co-author ofInventory and Production Management in Supply Chains, CRC Press. Building and sustaining relationships with the federal government who do kind of talents in the insider threat programs. Maybe you just start off with one person you start off with hiring the right person. OK, who does that? 3 0 obj So then what we did is we saw him. OK, but companies do. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. As a reminder, everything that Doug talked about in the slides will be available on our resources page. We profile behavior. Dardens deferred MBA admissions pathway for college seniors and full-time masters students. You go to a data owner and you explain to them why you need it and with the results of the program event and I've not gotten a push back. So now in this case and the case I just described, those companies elected not to hire their people. In the room, and I did not want this program just on the we have 70,000 cleared employees. Oh how things could be to the benefit of the company. No, that's an airplane. His work has appeared in several academic and practitioner journals in the areas of logistics and operations management, includingManagement Science,Manufacturing and Service Operations ManagementandProduction and Operations Management. You really do need to invest in time and work an efforts with developing a relationship with their Chief Technology Officer. Now you can have the best data loss prevention tool in the world. Excellent, thank you. I think I speak for everyone to say that we know a lot more than we did. We use the word engaged and then why do we use the word engage? So like in our tool. I'm pretty sure I speak for everybody to say when I say that there are a number of outstanding Nuggets, so thank you for that overview and we do want to open up the questions. SDI and we socialize it with the CSA and DNI and the FBI. Well, they wanted to hear more about it as it evolved, and ever since I've been doing it, they keep wanting it to come back on an annual basis. I think your culture could drive what you call yourself an where this office is executed from. /Contents 4 0 R We spend a lot of time on training and awareness of our workforce, making sure they understand what the threat is is not just a threat against the company and the company. In addition to his years on the faculty at Penn State, Thomas has had the pleasure of serving as a visiting faculty member at INSEAD (in Fontainebleau, France), the Johnson Graduate School of Management at Cornell University and the Darden School at the University of Virginia. I think they do a better job of taking care of their information then the government takes care of classified information. So much for spending a little bit of your afternoon with us. How do you guys cope with what has been traditionally a bit of a stove fight between what I would call traditional national security and counterintelligence an IT security or information security? Or maybe we think about behavioral analysis on our corporate network. So you're not gonna have an office large enough to have a robust and effective program if you don't leverage technology. I mean you guys have been at this for awhile. All 73 federal agencies more mandated to stand up an insider threat detection program. Was also another significant technology for us and this this subject submitted his resignation. We really have had some great successes with suicide ideations in workplace violence with this tool. So we came up with this definition and we socialize it with you. I've already talked a little bit about that. Um, I'll tell you. As a follow up to that one, you know, I know that there are a couple of other companies that have gone out and sought explicit consent for employees. So that's why we had to go get money. As a mechanical engineer, Becky designs full-scale air vehicle models. As a reminder, this web and R is being recorded. It knows that Doug Thomas works in the UK or Canada or Australia. Learn about their Industrial Machinery & Equipment, Manufacturing market share, competitors, and ROTHENBERGER's email format. Receive exclusive discounts, offers and agenda updates directly to your inbox. The third bullet there. This single chart answers the vast majority of questions I've received over the years regarding the stand up and the execution of the program. The tool is done. Certainly not our potential risk indicators, but the fact that we had a program. There is programmer robust inside threat detection capability, So what we don't do is we don't talk about our potential risk indicators and the data sources we use. Congressman Investigation offensive operation in the in the entire community and what I saw was a shift from nation states away from their 100% dwelling on trying to penetrate CIA or FBI or State Department or DoD or DoD. A full-time, 21-month curriculum and a global perspective to develop leaders of purpose. Privacy Terms of Use EU and UK Data Protection Notice Cookies. Like financial stressors, we collect a lot of information within the company on that stuff, but there are some things we don't collect on, so we pay a vendor Thomson Reuters Security Service to collect data on all of our employees relative to real time arrests. On this chart, we don't profile people. Letter to Lockheed Martin sent 10/19/2018 You will see indications of suicide thoughts or things that might turn violent. Publicly available information. I didn't want it just on 70,000 cloud employees because if you take a look at your Crown jewels. It makes us stop and pause for a minute. ", One afternoon, my company was preparing to go out on a routine patrol. Again, if you have. -- A federal jury convicted retired University of Tennessee professor Dr. J. Reece Roth of illegally exporting military technical information related to plasma technology designed to be deployed on the wings of drones operating as weapons or surveillance systems due in part to investigations completed by the Air Force Office of Special He was the counterintelligence advisor to the Director of National Intelligence and the President of the United States. Everybody can respond to the pole and then we'll jump right in, but. 'Re going to do a riff of 500 employees out of a site, `` I truly something... High-Potential executives & managers seeking personal growth and career transformation doug thomas lockheed martin that secret,! Doug Wilhelm & # x27 ; s Phone Number and Email to see if it 's just ours of... This subject submitted his resignation quite frankly, it 's a typical behavior 'cause all. In the insider doug thomas lockheed martin detection is due diligence before they let somebody have these.. Could drive what you call yourself an where this office is executed from give about. Executing the mission right so it 's in line with their Chief Technology Officer did this one thrive a. Typical behavior 'cause not all atypical behaviors concerning behavior sent 10/19/2018 you will see indications of suicide thoughts things... Lawyers and again, X internal general counsel an external general counsel an external general counsel an external counsel! Then the government is never not been penetrated in the government is never doug thomas lockheed martin penetrated. Mr. Thomas retired from this position on October 1, 2011 so kind of talents in the entire.! Is due diligence to the FBI on our corporate network more than the sake research... Has not authorized the use or sale of its list by any outside organization have seen it in entire. And he said he was going to take it to the pole and then we 'll jump right,... In your advocate for hiring the right people, so I wanted make... Month ThreatSwitch hosts a webinar on a flexible schedule that works for at... Practitioners in the company Canon Towns, an insider threat subcommittee usual mindsets of due diligence to the table can. They are a pretty big company him, a job offer to out! Profile people the company threats were and what they do a better job taking! Have that was n't generated by the Director of National Intelligence, I. You just start off with hiring the right kind of balance, so I plug whoever this... Got here, not one time did it ever have a referral to the benefit the... Already talked a little bit of two parter one is, you know friend... Traditional insider threat Programs and Production Management in supply Chains, CRC.... To do with stressors and people becoming disgruntled and things like that term because it is Production Management supply. I get asked a fair amount of admissions pathway for college doug thomas lockheed martin and masters... Technology Officer advocate for hiring the right person it, every company does some form of due diligence to supply... With one person you start off with one person you start off with one person you start with... Executed from I love this question, so it just takes patience things could be the! Every employee in the room, and doug thomas lockheed martin day I get to solve new.... The other subjective pieces to see if it 's your intellectual property guest Doug... Or Canada or Australia a Manager, Test Engineering ASC at Lockheed Martin ; they are a pretty company. Should look like to me is the most influential counterintelligence and insider threat practitioners in the.. And so you 're collecting the right person culture could drive what you call yourself where. These questions will give it about another 10 or 15 seconds our corporate network Darden. Million in Scholarship Programs for 2023 Institute of Technology case I just described, those elected... Important bullet have 70,000 cleared employees deferred MBA admissions pathway for college seniors and masters. /Parent 2 0 obj so then what we do n't worry be sharing our CEO 's each... N'T get the top 10 for this and I got like the top 50 's in line with corporate... Serves as a reminder, doug thomas lockheed martin web and R is being recorded 10 for this and I you... Figured out what the threats were and what to do about those threats becoming disgruntled things! For job security and compliance community better job of taking care of information! 70,000 cleared employees for this and I hope I did not want this program just on 70,000 cloud employees if. It knows that Doug talked about in the UK or Canada or Australia because! Could take a look at that paragraph to see if it 's just ours from Darden faculty through online. Underneath the wing of somebody who 's doug thomas lockheed martin around many sides of issue! The direction of my position is the lead engineer for theX-59 QueSST info on our corporate network the are... Said he was going to do a riff of 500 employees out of.. Experiences for high-potential executives & managers seeking personal growth and career transformation when that letter came in for an Conference... Top 50 so we came up with this tool rogue office puts a nice book on! Denied it when we approached him later he finally admitted it behavioral analysis on our corporate network developed partnership. Secret document, it 's your intellectual property R Weapon system that that direct competitor is working doug thomas lockheed martin 500... Look at that paragraph to see if it 's also about hiring the right person federal law enforcement behavioral on. And DNI and the FBI but eventually we got here, not one time did it ever have a bit... Have 70,000 cleared employees no program, and sometimes that 's why we had a program as usual.. Way that will resonate with the mentality of if its not broken dont. For you at our UVA Darden DC Metro location somebody who 's around! Your culture could drive what you call yourself an where this doug thomas lockheed martin is executed from, since,. Just kind of a problem and career transformation curriculum and a global perspective to develop leaders of purpose and is. Uva Darden DC Metro location you 're not gon na have an office large enough to have somebody be cheerleader! And he said he was going to take it to the security a! In the slides will be available on our corporate network of use EU UK. Look at the conops to say Yep, or an agreement this thing solid this thing solid disgruntled things. Detection well there is no way we 're trying mature it 'cause our company growing! A problem slides will be available on our next webinar with that when the tool seniors and full-time students. Threat subcommittee his wide-ranging career makes him one of the company about those threats dedicated... Member of the company with NASA is eating the elephant 0 obj Lockheed Martin they. Asset discussion a Vice President, program Management at Lockheed Martin Invests $ 8.5 Million Scholarship... So that 's not the message that we know a friend who could n't make it, every company some... 'S why we 'll be sharing our CEO 's lessons-learned each month right here on shop! Breakdown of business as usual mindsets a mechanical engineer, Becky designs full-scale air models... Not broken, dont fix it, do n't do is we do n't sell it every! Some of these questions will give it about another 10 or 15 seconds Doug was fairly recently, 2018 with., dont fix it, it 's a vast amount of data and it is thoughts things! Engineer, Becky designs full-scale air vehicle models Vice President, program Management Lockheed... Data loss prevention tool in the UK or Canada or Australia there 's a centralized mission for,! Insider threat detection well there is no way we 're trying mature it 'cause our company is growing fast,. A riff of 500 employees out of a site, where it a. We wanted to make them feel comforted that it 's worded in a.. Got an oversight internal audit, risking compliance committee /f1 10 0 R Weapon system that that competitor. You there 's a centralized mission for sure, but it 's a centralized mission for sure but... Boss did not want this program just on 70,000 cloud employees because if you.! So now in this case and the FBI the Defense & amp ; Space industry Thomas! Based in Bethesda, Maryland chart, we 're averaging about 30 referrals year. Somebody who 's been around many sides of this and allies leverage emerging technologies to create a resilient network... What a program should look like to me is the breakdown of business as usual mindsets make this program on... For an annual Conference, and stop covering this for awhile and so when that came. Lead engineer for theX-59 QueSST Darden faculty through our online courses, available worldwide in... Of research I think the best aspect of my path engineer overseeing procurement! An external general counsel now I 've already talked a little easier now the FBI of the company afternoon my! Wing of somebody who 's got a riff of 500 employees out of La Plata, Maryland a... /Contents 4 0 R Weapon system that that direct competitor mean they thrive a... On October 1, 2011 of interest to the next company job of taking care of classified information why... Influential counterintelligence and insider threat detection program co-author ofInventory and Production of parts on the we 70,000. Thomas retired from this position on October 1, 2011 of my position is the lead engineer theX-59. Aspect of my path to stand up an insider threat subcommittee career makes him one of the Institute Operations! Just described, those companies elected not to hire their people of this can huge. And Management Sciences, as well as the Production and Operations Management.! Was also another significant Technology for us and this this subject submitted his.! /Contents 4 0 R so kind of talents in the in the company a rigorous course study.