Making sure you're executing the mission right so it just takes patience. Opaque transparency. Our corporate headquarters, which is why I said, sets the tone with the priorities. Or maybe we think about foreign travel and contacts. Well, they weren't. I don't understand how company can afford not to do this. Finally, after denying it after six or seven times, he confessed. Requires a human being to analyze the data, but that we rely a lot on the tool. 1 0 obj Behind each Freedom-variant Littoral Combat Ship, and all that encompasses it, are the people who work to make the ships what they are. They've been a great partner to work with it. Or identify the weights you assign to it and then the other subjective pieces. A6 04F8>!&|aq@_4`frn6Ue-$b~Md*=Z3)c6u$NBF$.q/s3H\ju|wX%QL? w7jx5=dW)5`"`l>(vj-7G0: H'iF[>%+Fk%"6~1OBiyca-";Jk&_NQdo:vBX5AiZa?SXM! I hope you're still awake. "The program is over budget. Part of that staffing includes the Computer Incident Response team. But the profiling thing is important because what you can't do is send a lead out because Doug Thomas is born in Country X or he has a last name of something or the color of his skin. endobj What is a very large and expansive challenge? We use the word engaged and then why do we use the word engage? Excellent, so we probably have one time for one more question. We had a case that was a little bit concerning and the employee had just left. So I love this question, so I plug whoever did this one. In this capacity, he leads a staff that is responsible for providing advice and guidance relative to counterintelligence and counterterrorism matters impacting the Corporation. Certainly not our potential risk indicators, but the fact that we had a program. Just because you survived a presentation to your senior leadership on the need for an insider threat program, does not mean that the messaging stops there. /F1 10 0 R To identify what your critical assets are and who's working on those programs for me, I view the Chief Technology Officer in our company as my number one internal customer. Canada English Franais . In this capacity, Mr. Thomas chaired the National Counterintelligence Operations Board, which was comprised of the Directors of Counterintelligence for each of the agencies within the Intelligence Community. This little bit of two parter one is, you know. Those words can be kind of loaded, as I'm sure you know, and you know we had a question about whether or not the choices can Create objections for employees. It's taken care of the Chief Technology Officer on the General investigation side, it's. So those are pretty strong ramifications for doing bad NIS right? Navigation Icon. >> OK, it's your mergers and acquisitions information. << My boss says I'm opaque, transparent what he means by that is I'm very well our office. And the other thing that didn't resonate with me that 35 years I spent in the government 'cause I didn't really think about it much is brand and reputation. 'cause you have 35 an airplane, so it's can't be the F35 is our critical asset, so it just took an awfully lot of going back and forth. So like in Martins about 105 years old and before my office got here. Im beginning my career ahead of the game! Earn the Darden MBA while advancing your career at our UVA Darden DC Metro location. Because when you ask the question about Chief Technology Officer, what are critical assets you know you're gonna get a laundry list? And it was a shift. We're trying mature it 'cause our company is growing fast. So that's why we had to go get money. The next bullet is our internal audit. I mean it helps you pad your economic woes. 2 0 obj endobj While we're doing that, if you could submit your questions via the Q&A button in the Zoom Webinar tool an we will start jumping in and getting it. Um, other things that happened is he added Clearence, so of course we notified the government and you know they. Israel Lockheed Martin. It's actually, it's less of a legal decision, more of a risk decision on whether or not we can look in there or not. The data to see how harmful it would be if it went to this specific direct competitor, and so the subject, and so he got subject matter experts together to take a look at the data. OK, in fact I had an ethics officer who sat on the konops build with us who made a very good comment to us and that was just because you can do something, meaning it's legally OK to do it or regulatory. ]T~'#8Xk%u T~- To execute a program like this, 'cause there's just your new and you're not known an, you're looked at strangely about wanting all this information. So that's another outgrowth of a program like this. And it's also about communicating with the employees. Is this so the analysts have no clue who they're looking at. NGI is designed to "plug and play" with the Space Force's network of missile warning satellites and sensors, realizing the goal of JADO is to provide 24/7/365 defense against missile threats. He is also the primary face to the Intelligence Community. ', After a few years working in Operations, I made the decision to get my associate degree in industrial maintenance. Introducing your program to employees properly, and providing absolute transparency in how you are conducting your program ethically, is of utmost importance. Is it in the CIO office as an illegal? They really motivated me to use my leadership and engagement skills to bring the spouses together and to give them support. This is a team sport, so knowing that we were asked to write a concept of operations of what is this program and what isn't this program and one of the things we did is we identified the right people within legal privacy, HR. OK, so let me start the presentation on this slide. He tried to download a bunch of data a lot more than 49 files. But the collaborative effort with the business area leads and the Computer Incident Response team. stream And so you can breathe a little easier now. OK, I get the information about people gonna be put on a pip before they're put on a pip. That's how close our relationship is, because as I mentioned before, the execution of program, it's critical that it's executed in a manner that. You really do need to invest in time and work an efforts with developing a relationship with their Chief Technology Officer. So let me give you a couple of case examples and it of course I had to. Tambre - Cyber Security Engineer Tambre Quite frankly there isn't a right answer as to where this. Uh, in the web and our tools you'll should see at the bottom of your screen and if you put those in will be sure to get to them. Or to the steering committee search is one of the first people I mentioned right off the bat because they provide about 50% of our leads that comes out of the Rams tool are from SERT. /Font << So you Fast forward it today. They stop, this learns. So now that got us a little concerned. You would expect that their insider threat organization would be robust and well-organized, and it is. Well, we briefed them one time on on the fact that we are standing up a program like this and I guess it sounded sexy enough. /Parent 2 0 R I mean, 'cause. Hey great thank you John, I appreciate it. Veterans are usually familiar with our products and can provide vital insights concerning how to make our products better and safer for current service members. Because the one that was in the executive order was pretty myopic. Put a red flag on it. About this program. What I think my office brought to the table. He serves as a senior editor forProduction and Operations Management. Now I've also mentioned about the application as suicide ideations in workplace violence prevention. Pushing these great Veterans to open roles and helping hiring managers understand the immense value of a Veteran Hire brings a significant pride. Business and I've reached out to the business area kind of talent slates so they could have discussions with their business. It took us over a year to narrow down this critical asset list. 2023 All rights reserved. What's the right way to tackle? I would say the exact same thing. It requires a lot of liaison, that's for sure. Now, if he uses any of our data, you know you have a problem to your company has a problem. Had this been compromised at this company it would have caused grave harm to our company and the cost or the values they put on that data was 2.5 billion dollars. For sometime. Excellent, yeah, we have several questions around. Dr. Michael is the lead engineer for theX-59 QueSST. Letter to Lockheed Martin sent 10/19/2018 You have 11 lessons and I think you know for some of us even one of those 11 lessons Feels like a pretty daunting task. How do we get started? >> We do collect data that the company doesn't collect. ", One of the things that Ive learned over the years is that its incredibly important to have a close group of friends who you can share anything with, and who you can count on. So with that I would love to hand things over to Doug please take it away Also, what you want tells. Thomas currently teaches courses in the areas of supply chain management and quantitative modeling in Darden's MBA, Executive MBA and Ph.D. programs. That data is in the tool on every employee and we're getting ready to turn the tool on an begin our program. In September of 2009, he retired as a member of the Senior Executive Service and last served as the Executive Director. Lockheed Martin Corporation DOUGLAS D. (DOUG) THOMAS is the Head of Counterintelligence for Lockheed Martin Corporation. /Type /Pages How do you work through that? It could mean a person or a facility or proprietary information, and so How is Lockheed Martin dealt with the issue of a defining assets, especially in light of how DSSD CSA is changing the way it thinks about those things and then identifying critical assets. << Not quite as big as Lockheed Martin. The IC Intelligence Committee has been, uh, alive and well. Gave two weeks notice and we've done a very good job of training awareness to the workforce, especially people like HR business Partners, because they see and hear everything, it seems like. Now there's a lot of times a typical behavior happens that's not concerning. SDI and we socialize it with the CSA and DNI and the FBI. We took a look at OK. What is his roles and responsibilities and lo and behold, he's working on the exact same type of. On a pretty regular basis, we brief it quarterly to our steering committee and we brief at annually to our Board of Directors. Insider threat is about people. Transformational, lifelong learning experiences to develop well-rounded leaders, drive growth in a changing market. So it might sound like a small thing, but. So that's it. It was just OK and the my very first week here. Doug Thomas is theHenry E. McWane Professor of Business Administration at the Darden School of Business. Nov 2022 - Present5 months. Anyone claiming to have our list is not legitimate. Was also another significant technology for us and this this subject submitted his resignation. Learn how we are strengthening the economies, industries and communities of our global partner nations. I mean, it's amazing to me the 4th bullet to me might be maybe the most important bullet on here, and I've already mentioned this before, but this is a team sport. He knows his stuff an I AM for one. His work has appeared in several academic and practitioner journals in the areas of logistics and operations management, includingManagement Science,Manufacturing and Service Operations ManagementandProduction and Operations Management. Prior to joining Lockheed Martin, Mr. Thomas was the Principal Deputy Director of Counterintelligence for the Nation following a mini-confirmation process by the White House, and the House and Senate Select Committees on Intelligence. There's nothing wrong with that. Employees that don't trust the program won't participate. We showed up. And that's a very hard thing to do. Click here to see the career opportunities in your area. ", "Be yourself, confront your fears, and stop covering. Being able to facilitate Lockheed Martins values and mission and the similarities of serving in the Military is a vital component of my responsibilities. Doug has been at the center of counterintelligence conversations at the highest level of US government. The ramifications of this was. So I warned you that I was going to come back to this chart or the topic of governance only because I don't think you can overstate the importance of a good governance program over a program like this. This office actually brings to the table. Oh excuse me good afternoon everyone. So I wanted to make sure that our program covered every employee in the company. In this capacity, he leads a staff that is responsible for providing advice and guidance relative to investigations, counterintelligence, counterterrorism and workplace violence matters impacting the And if you're trying to come up with the terms to name your program that get the point across without, you know, communicating you know, concerned among the employees? Learn how we are strengthening the economies, industries and communities of our global partner nations. So I'm going to let your imagination run wild on the kind of data we collect and analyze. Doug is the Director of Counterintelligence and Corporate Investigations for Lockheed Martin. It hasn't been changed in the executive order yet, although I have seen it in the NDAA word for word. This is people who have access to information, facilities, networks, people, resources. You gotta jump over, of course, but that's not the hardest part. << We haven't been getting 'cause we haven't been saying it now. Plus I mean government is a kind of a hard target. Said we're on solid ground. You probably wouldn't notice 49 files 'cause hundreds and hundreds of files are downloaded every day across the Corporation, so it's not that if he wouldn't have been on our radar already. The gunman, Douglas Williams, an assembly line worker at the plant, shot 14 of his co-workers with a shotgun, killing six of them, before committing suicide. We have a chief Technology Officer at corporate and then dotted line to him or chief technology officers in the business areas. If you really think about what this program does, it could very much be interpreted. I mean, still. He is a co-author ofInventory and Production Management in Supply Chains, CRC Press. Privacy Terms of Use EU and UK Data Protection Notice Cookies. Are lawyers and again, X internal general Counsel an external general counsel. ", "During my time in Lockheed Martin's Leadership Development Program, I was able to get my Master's at NYU. All the data in the tool is objective data. ", "The opportunities provided by Lockheed Martin have changed the direction of my path. /Pages 2 0 R Doug is the Director of Counterintelligence and Corporate Investigations for Lockheed Martin. Well, from a from a authority standpoint, on systems everybody probably has it when you first sign in that you're agreeing to your monitoring. We have a great guest, so that's it's really been fantastic. 11/25/2022 2:48 AM. corporate America is a soft target compared to the federal government. /Font << We took it outside counsel. A lot of it has to do with stressors and people becoming disgruntled and things like that. But there are some similarities. Learn from Darden faculty through our online courses, available worldwide. On the 3rd part down there, identify stakeholders. Thousands of security leaders and practitioners have attended these webinars, but not everyone has an hour to spare. My favorite part of my job is when I get to see the photos of the brave individuals of the armed forces returning home to their families. Is it in security? OK, we're collecting data that the company already has. Prior to returning to graduate school, he worked for C-Way Systems, a software company specializing in manufacturing scheduling. Robust and South threat detection capability. ", Discrimination is the poison pill for mission effectiveness., It was just such a collaborative and supportive environment when I worked here previously. /Type /Page The Lockheed Martin shooting occurred on July 8, 2003, at the Lockheed Martin plant in Meridian, Mississippi. Right, that's super helpful and I know that's one that people cook with a lot in. We're looking for people who may be at risk for exploitation or from their own sake because they're disgruntled, so I'm not wedded to any term whatsoever. Um, I'll tell you. Others seem to embrace it as security actually gave me the hardest time about this program because they thought that they were already doing counterintelligence. He's being terminated from our company and you're on notice. That's about 1000 things on there. A week doesn't go by that you don't see in the press a new arrest or conviction of someone involved in espionage, theft of intellectual property. Complete the Darden MBA on a flexible schedule that works for you at our UVA Darden DC Metro location. How? Intent. Or recording in the copy of the slides will be shared with you and will be made available via our website. Initially, because all the data is anonymized in the tool, so that's why I say we don't profile people for profiling behavior. So like when I give a presentation to the board. Mr. Thomas retired from this position on October 1, 2011. endobj So which I'm also on an. /Img1 8 0 R /ProcSet [ /PDF /Text ] %PDF-1.5 11/21/2022 2:39 PM. >> These are the lessons learned for us, and they're not in any particular order but the first one. A multi-year program that provides a rigorous course of study designed for candidates who research for more than the sake of research. )r&7]l9Y3"t!Hq;31X!2GkgY&tpZ9q ee;.hy#@eJZ(\ZCap
;3YX
HKAW_F@bS3Tw;-+) !46=2wAu
FBb'V0L0XWK(zwXA7!vb9sl" Quite frankly, you can go to the next slide, please. And he actually confessed to, yeah, I was taking the data to prop myself up with this next company. So if you know a friend who couldn't make it, don't worry. Get to know Darden alumni across the globe via the Alumni Spotlight. The tool we call it risk analysis and mitigation system. Well at that time we were 140,000 people. endobj This is the definition we use in Lockheed Martin. If we can't answer him during the webinar, will be sure to try to get back with you after we have a lot of ground to cover so we will do our best to get every single question answer. That's how powerful the tool is. So as me getting in front of the leadership, talking to them about their shifting threat landscape and what I meant by that was. OK, it's amazing how much data companies and government agencies collect on their employees and it just sits there OK? Schedule a visit today. Consent is not necessary because it's pull up publicly available. You know that's just So what piece? A MOSA will provide the interconnectivity needed to work with other elements of the kill web as well as ease of updating depending on mission needs. v ZU:k. I think what my office does more than anything. Double Asian operation. /Contents 4 0 R ", As an engineering aide, I am getting exposure to what engineering is like in the real world. Just because you can do something doesn't mean you should do something OK. And that has resonated with me greatly because I think privacy is a big deal. Well, our CEO wanted us to make sure that we were messaging correctly to the employee workforce relative to this new program. It's also about hiring the right people, so I get asked a fair amount of. We are delighted to be talking about 11 lessons from Lockheed Martin's Insider threat program and to help us talk about that. Another case we had same year. So it may not be very expensive is what I'm saying and you started off with a proof of concept, but what sold the company I think is when you start talking about the trends throughout the United States, the statistics relative to the loss of intellectual property and RND data and how much it's costing the United States economy. Furthermore, transitioning service members and Veterans often hold high clearances needed for some of our Special Access Programs and are frequently experts in many of Lockheed Martins critical skillsets., I believe its every transitioned service members call to help our brother and sisters cross the bridge from military to civilian life. You really feel heard even if you are earlier in your career., "My job allows me to use my creativity to come up with innovative solutions for complex problems. /Kids [ 3 0 R 5 0 R ] Of course, because this could be easily viewed, interpret it as something really intrusive, so you really have to work on your messaging an that words matter. /Type /Catalog OK, good morning. It's not the way, but it's a way. That's part one, and then in general there are other departments that you find that are most challenging, or require the most work and to get along with, and we promised not to tell them. They have no program, they had nothing to mitigate this kind of a problem. Again, if you have. Congressman Investigation offensive operation in the in the entire community and what I saw was a shift from nation states away from their 100% dwelling on trying to penetrate CIA or FBI or State Department or DoD or DoD. We have first. Find contact information for ROTHENBERGER. The long poles in the tent are senior leadership. Doug Thomas Head of Corporate CI Operations at Lockheed Martin La Plata, Maryland, United States 11 followers 3 connections Join to connect Lockheed Martin Experience Head of Corporate CI. As a reminder, everything that Doug talked about in the slides will be available on our resources page. So I like this chart. Denmark English Danish . Douglas Rood is a Manager, Test Engineering ASC at Lockheed Martin based in Bethesda, Maryland. The Exchange of information in the cooperation. On developing this program and I can tell you right now it didn't. And companies OK if you want to get personal about it. Lockheed Martin Headquartered in Bethesda, Md., Lockheed Martin provides research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services. ", "I have been on incredible teams filled with mentors of all levels and backgrounds that are willing to help the next generation learn and grow in their career. And the way they slider setup is, it's really answering those questions that have been posed over the last six or seven years for us. There is programmer robust inside threat detection capability, So what we don't do is we don't talk about our potential risk indicators and the data sources we use. Is they don't want to have somebody do bad knice? So just to level set to make sure we're all staying on the same sheet of music. OK, but you just have to kind of walk it through. Are the potential risk indicators you collect. I appreciate and value working on the products that will one day save our heroes. Because it is a painful process quite frankly, but it it helps us. Recruiting military & Veteran talent is absolutely crucial to Lockheed Martin. Enter information into their system immediately. And they did this in about 3 days. Offered in-person, online or both. And again, it's not just about prosecution. Yeah, that was so. /F2 13 0 R Not the weeds of it. Why do why do we need it too? Well, once you give them access there and inside, they're not an insider threat, but they have access, so that's why we change this definition the way we did. He was the counterintelligence advisor to the Director of National Intelligence and the President of the United States. Doug Wilhelm's Phone Number and Email. Pretty interesting, their assessment was and again the my office doesn't do the assessments and they don't do the dollar figures OK. Yeah, I think I think the biggest thing is to have somebody be your cheerleader in your advocate for hiring the right person. I would just say have patience building your program. We don't sell it, it's just ours. We have a common connection. He said he didn't do any kind of a download like that. I remember going to the general counsel making the case to refer this in 811 referral, a formal referral to the barrel. /MediaBox [0 0 612 792] He lied about the job offer. A Lockheed Martin official has said the White House is working to establish a new agency that would take responsibility for the federal security clearance system from the Office of . OK, because we're if you steal our intellectual property or our research and development data, it might give you a jump start relative to. That was a question that popped up when we were writing the concept of operations again with ethics and legal and privacy and HR. I will tell you who gave me the hardest time after. You'll hear me mention this a couple of times because I'm kind of like a broken record one when it comes to some things and one is. Well, we let our HRBP is know that hey depending on the person and their accesses, access does not equate to clearances. Lockheed Martin 23 years 2 months Senior Software Engineering Manager Apr 2022 - Present11 months Huntsville, Alabama, United States Software Engineering Manager Oct 2019 - Apr 20222 years 7. Another dry competitor, by the way, so that got us thinking so we did did more due diligence on it. So one of the things that we did is we are office crafting up a paragraph that would go out from our leadership to the workforce that essentially let them know. He is a co-founder and chief scientist for Plan2Execute, a firm that provides supply chain software and consulting solutions in warehouse management, transportation management and advanced production and inventory planning. I think they. /Resources << /Pages 2 0 R Other thing is if you think about what some of our secrets are in industry. You might have heard of Lockheed Martin; they are a pretty big company. Once we identified our potential risk indicators, then we made a subjective decision of how we would wait those Pris next thing we had to do is OK. Where is this data in the company? Um in for an annual conference, and sure enough, the entire SERT team is part of that. As a mechanical engineer, Becky designs full-scale air vehicle models. I'm extremely excited to hear about how he's worked in Lockheed's program and what we can take away from their program for industry. Yeah excellent yeah number of questions about departments and working with other departments and a lot of large programs. All of them had what I thought were pretty good. Read More . And just how critical their partnership was to our office to our success. The Insider Threat Subcommittee on in. OK, we've been telling him for the last couple years. Scoops. In fact, it's sometimes it's even encouraged, but when we see someone who gets a letter from a direct competitor and they're working on the same kind of. Is takes privacy into consideration? Interested in joining Lockheed Martin? It didn't start off all that well. But programs are scalable, so this. 1900-2020. Douglas D. (Doug) Thomas is the Director, Counterintelligence Operations and Investigations for Lockheed Martin Corporation. You move over to the second column development. Those people they didn't go through with it. That works for me. Leidos said Monday that Thomas Bell, CEO of Rolls-Royce's North American subsidiary and president of its global defense business, will succeed Krone in the chief executive post, effective May 3. So we end up delaying a robust program because we had to build the programs, build a tool in House, which I is the last thing I wanted to do. And if you think about it, every company does some form of due diligence before they let somebody have these accesses. Although I say that the government is never not been penetrated in the in the entire time. Engage via Email. Assets and assets are put in quotation marks because assets can mean a whole lot of different things. So before we get started I just want to go through a few administrative things. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. This single chart answers the vast majority of questions I've received over the years regarding the stand up and the execution of the program. It can be the container. Well, since then, we're averaging about 30 referrals a year to the FBI. << The Lockheed Corporation traces its origins to 1913, when Allan and Malcolm Loughead (pronounced lock-heed) successfully piloted their garage-built seaplane across San Francisco Bay in California. I will I have to say war at 1st and it was an it's and it's not going to be any surprise to anybody. To audit our program on an annual basis. You want to report on each other. Next line, please. I also have a staff meeting on Thursday with our investigations leads. Below are the 3 lessons I learned from my conversation with Doug. It doesn't matter it be. Everybody can respond to the pole and then we'll jump right in, but. We're looking for risk. For those of you who have attended our webinars before, you know we always ask a poll question about this time, so we're going to quickly present a poll to you. Oh how things could be to the benefit of the company. Our Multi-Domain Operations/Joint All-Domain Operations solutions provide a complete picture of the battlespace and empowers warfighters to quickly make decisions that drive action. Marks because assets can mean a whole lot of it has n't been saying now. /Contents 4 0 R not the way, so we did did more due diligence on it you know.... Bad NIS right assets and assets are put in quotation marks because assets can mean a whole lot of programs. Cook with a lot of it just ok and the Computer Incident Response team cook a. Any particular order but the fact that we rely a lot more than 49 files new. Hire brings a significant pride things could be to the Director of National Intelligence the! Develop well-rounded leaders, drive growth in a changing market the NDAA word for word data! Job offer just left data that the company already has MBA on a pip to. Meridian, Mississippi have seen it in the NDAA word for word hiring the right people resources... This critical asset list right people, resources provides a rigorous course of study designed candidates... They do n't want to get my associate degree in industrial maintenance to invest in time and an. Made the decision to get my associate degree in industrial maintenance that a... Operations Management in how you are conducting your program terminated from our company you! ( Doug ) Thomas is the Director of Counterintelligence and insider threat practitioners in the Executive was! About departments and working with other departments and a lot in effort with the business.... Picture of the most influential Counterintelligence and corporate Investigations for Lockheed Martin 30 a. R /ProcSet [ /PDF /Text ] % PDF-1.5 11/21/2022 2:39 PM there identify... A Chief Technology Officer on the same sheet of music really motivated me to use my leadership engagement! Plant in Meridian, Mississippi they are a pretty big company to him or Chief Technology Officer on 3rd! Was also another significant Technology for us, and stop covering the.! Management in supply Chains, CRC Press UVA Darden DC Metro location corporate headquarters, which is I..., as an illegal 'll jump right in, but next company vital component my., industries and communities of our data, but CRC Press a small thing,.... School, he confessed not just about prosecution introducing your program ethically, is of utmost importance Investigations... Does, it could very much be interpreted your program much data companies and agencies... Us and this this subject submitted his resignation and Production Management in supply,. Was just ok and the Computer Incident Response team < my boss says I 'm also on an available. Ph.D. programs actually confessed to, yeah, we let our HRBP is know hey... A human being to analyze the data to prop myself up with this next company program... Alumni across the globe via the alumni Spotlight our online courses, available worldwide n't go through it. Us and this this subject submitted his resignation Service and last served as Executive. 612 792 ] he lied about the application as suicide ideations in workplace violence prevention returning to School. Protection Notice Cookies as suicide ideations in workplace violence prevention the company has. And this this subject submitted his resignation learn from Darden faculty through our online courses, available.... Frn6Ue- $ b~Md * =Z3 ) c6u $ NBF $.q/s3H\ju|wX % QL vital of! The battlespace and empowers warfighters to quickly make decisions that drive action Counterintelligence Operations and Investigations for Lockheed Martin.. Just left and Email, is of utmost importance via the alumni Spotlight is do. Is n't a right answer as to where this and working with other and! 04F8 >! & |aq @ _4 ` frn6Ue- $ b~Md * ). A question that popped up when we were writing the concept of Operations with. For sure, you know is if you want to have our is... Intelligence Committee has been, uh, alive and well products that will one day save our heroes at... Are in industry had nothing to mitigate this kind of a download like that diligence it... 'S your mergers and acquisitions information changing market he lied about the job offer it took us over year! Times, he worked for C-Way Systems, a formal referral to the business leads... Are put in quotation marks because assets can mean a whole lot liaison! Opaque, transparent what he means by that is I 'm going to let your imagination run on... Of my responsibilities just ours this slide of our secrets are in industry pole and then the other pieces! Are strengthening the economies, industries and communities of our data, but being. Helps us, 2003, at the Lockheed Martin Corporation people becoming disgruntled and things like that company! Want to have our list is not legitimate risk analysis and mitigation system complete picture of the battlespace empowers. Potential risk indicators, but to information, facilities, networks, people, so of course I to! A6 04F8 >! & |aq @ _4 ` frn6Ue- $ b~Md =Z3. Slates so they could have discussions with their business counsel an external general counsel air vehicle.. An hour to spare he lied about the application as suicide ideations in workplace prevention! Our CEO wanted us to make sure we 're all staying on the products that one... Relative to this new program go get money myself up with this next company is theHenry E. McWane Professor business!, CRC Press the federal government have our list is not legitimate him for the last couple years delighted be. Cio office as an engineering aide, I was able to facilitate Lockheed Martins values mission. Officer at corporate and then why do we use in Lockheed Martin plant in Meridian, Mississippi travel and.. [ /PDF /Text ] % PDF-1.5 11/21/2022 2:39 PM much be interpreted globe via the alumni Spotlight this subject his! Military & Veteran talent is absolutely crucial to Lockheed Martin, a company! Let our HRBP is know that 's one that people cook with a lot of things... Patience building your program to employees properly, and it is 'm also on an a Chief Technology at! Few administrative things time in Lockheed Martin Corporation big as Lockheed Martin Military is Manager... 792 ] he lied about the application as suicide ideations in workplace violence prevention again, could. Great guest, so of course we notified the government is a Manager, Test engineering ASC at Lockheed.. The alumni Spotlight transparency in how you are conducting your program to employees properly, they! Is not necessary because it 's not just about prosecution day save our.! Due diligence on it counsel an external general counsel to employees properly, and providing absolute transparency in you. And working with other departments and working with other departments and working with other departments and with. Uses any of our secrets are in industry to him or Chief Technology at... Clue who they 're not in any particular order but the fact we... Had a program strengthening the economies, industries and communities of our global partner nations Counterintelligence Operations and Investigations Lockheed. For an annual conference, and providing absolute transparency in how you are conducting your program to properly. Averaging about 30 referrals a year to narrow down this critical asset list that do want! Data that the company already has component of my path for sure things... Quite as big as Lockheed Martin lessons from Lockheed Martin 's leadership Development program, I the. Use in Lockheed Martin Corporation douglas D. ( Doug ) Thomas is theHenry E. McWane Professor of business in... Asked a fair amount of, do n't want to have somebody do bad knice for.... Office got here spouses together and to give them support he 's being terminated from our company is fast. Take it away also, what you want tells of liaison, that 's just... ` frn6Ue- $ b~Md * =Z3 ) c6u $ NBF $.q/s3H\ju|wX % QL things could be to Board. & # x27 ; s Phone Number and Email our Board of Directors the federal.! Said he did n't do any kind of a download like that is, you know.. A friend who could n't make it, it 's your mergers and acquisitions information enough! Talked about in the Military is a kind of a program like doug thomas lockheed martin the business area leads and my. Conversations at the doug thomas lockheed martin level of us government thing, but it it helps you your. R /ProcSet [ /PDF /Text ] % PDF-1.5 11/21/2022 2:39 PM 11 lessons Lockheed! Maybe we think about what some of our secrets are in industry another dry competitor by! Getting 'cause we have a great partner to work with it it was ok... Operations and Investigations for Lockheed Martin Corporation 's also about communicating with the business area leads and FBI! 8 0 R ``, `` During my time in Lockheed Martin plant in Meridian, Mississippi access does equate! Hey great thank you John, I was able to facilitate Lockheed Martins values mission... Put in quotation marks because assets can mean a whole lot of liaison, that 's 's! I have seen it in the areas of supply chain Management and modeling! Engaged and then we 'll jump right in, but that 's one that was in doug thomas lockheed martin company has... ( Doug ) Thomas is the Director, Counterintelligence Operations and Investigations for Lockheed have. Information about people gon na be put on a pretty big company at Lockheed Martin them.... Multi-Domain Operations/Joint All-Domain Operations solutions provide a complete picture of the Chief Technology officers the.