Taking the next generation widget to market. I'm the founder and CEO. Congressman Investigation offensive operation in the in the entire community and what I saw was a shift from nation states away from their 100% dwelling on trying to penetrate CIA or FBI or State Department or DoD or DoD. So like when I give a presentation to the board. Enter information into their system immediately. Insider threat isn't just an IT problem or a security problem -- it's an interdisciplinary focus that demands communication and coordination from everyone. All the data in the tool is objective data. 3 0 obj Just because you can do something doesn't mean you should do something OK. And that has resonated with me greatly because I think privacy is a big deal. Doug has been at the center of counterintelligence conversations at the highest level of US government. Doug Thomas, director of counterintelligence at Lockheed Martin, has said the company adopted a continuous evaluation platform to help detect attacks or threats posed by insiders, Federal News Radio reported Friday.. Emily Kopp writes Lockheed implemented its insider threat program in an effort to avoid workplace violence incidents and theft of trade secrets. Yeah, I think I think the biggest thing is to have somebody be your cheerleader in your advocate for hiring the right person. Doug Wilhelm's Phone Number and Email. Doug Laurendeau Vice President, Business Development at Lockheed Martin Bethesda, Maryland, United States 770 followers 500+ connections Join to view profile Lockheed Martin Activity A. /F1 54 0 R Now today I get that information before the supervisors get that information. They really motivated me to use my leadership and engagement skills to bring the spouses together and to give them support. I hope I did not waste your time and I hope you got at least one nugget out of this. We have a common connection. You know that's your Crown jewels, right? Well, about three years after I retired from the government, director Clapper asked us not like in Martin, but the inside Insider Threat Subcommittee to look at the definition of insider threat. So now in this case and the case I just described, those companies elected not to hire their people. When many of us think about insider threat, we think about NISPOM change 2. We're not collecting anything new. Departments that aren't bought in will ignore it. If you missed Doug's webinar you can always head to our resources page to view the recording, along with many other great speakers and tools to help you succeed. What do you do with that when the tool tells you there's a typical behavior 'cause not all atypical behaviors concerning behavior? He is a member of the Institute for Operations Research and Management Sciences, as well as the Production and Operations Management Society. That's every employee in the company, so that's our authority for the digital side of the House for the human behavior sideous the lawyers came back and said we don't have to ask for consent. A lot of experience, so going left to right the first column. While we're doing that, if you could submit your questions via the Q&A button in the Zoom Webinar tool an we will start jumping in and getting it. /Parent 2 0 R Well, since then, we're averaging about 30 referrals a year to the FBI. Quite frankly, when the focus group came back with that change and explained it made great sense to me and so I think words matter. And companies OK if you want to get personal about it. The group that I mentioned in says Insider Threat subcommittee. I'm extremely excited to hear about how he's worked in Lockheed's program and what we can take away from their program for industry. Manager, Test Engineering ASC at Lockheed Martin . Thank you everyone for attending and everyone have a fantastic weekend and remainder of your Friday. Alright, so there was a couple of reasons why they shifted. OK, so we focus a lot on training and awareness. Doug is the Director of Counterintelligence and Corporate Investigations for Lockheed Martin. Lockheed Martin Corporation DOUGLAS D. (DOUG) THOMAS is the Head of Counterintelligence for Lockheed Martin Corporation. Well, we briefed them one time on on the fact that we are standing up a program like this and I guess it sounded sexy enough. On the need to involve them and what we needed from the FBI and Oh my God, you wouldn't believe that pushback that I got from general counsel initially. )r&7]l9Y3"t!Hq;31X!2GkgY&tpZ9q ee;.hy#@eJZ(\ZCap ;3YX HKAW_F@bS3Tw;-+) !46=2wAu FBb'V0L0XWK(zwXA7!vb9sl" That works for me. First off, it was myself and the chief technology officer and the Chief Technology officer reached out to Chief Technology Officer. We are delighted to be talking about 11 lessons from Lockheed Martin's Insider threat program and to help us talk about that. We have a great guest, so that's it's really been fantastic. The Lockheed Martin shooting occurred on July 8, 2003, at the Lockheed Martin plant in Meridian, Mississippi. Where did we come up with this? It absolutely did, because of the history wasn't all that close before, but we are both benefiting from it. OK, it's your mergers and acquisitions information. /Font << OK, and that is publicly available select. And he actually confessed to, yeah, I was taking the data to prop myself up with this next company. Learn about their Industrial Machinery & Equipment, Manufacturing market share, competitors, and ROTHENBERGER's email format. >> Lockheed Martin Invests $8.5 Million in Scholarship Programs for 2023. It was about people with clearances and classified information, and we know that that problem set is way beyond classified information. Alright, that's excellent advice, Doug. << ", "Be yourself, confront your fears, and stop covering. Learn from Darden faculty through our online courses, available worldwide. They have no program, they had nothing to mitigate this kind of a problem. WHY THE NRA'S CHIEF LOBBYIST LEFT: The National Rifle Association 's top lobbyist left the scandal-plagued gun rights group this week after nearly two . /Type /Page About this program. Well, this is all about access. When we got here, not one time did it ever have a referral to the FBI or the federal law enforcement. It lets the workforce know that this isn't just some rogue office. Or is that not something that's part of your program? Of course, because this could be easily viewed, interpret it as something really intrusive, so you really have to work on your messaging an that words matter. endobj Yeah, I think that's another good question and I'm kinda gonna sound like I'm bipolar on this answer. OK, 'cause the person already got. ", The Veteran community is an amazing source of Loyal and Highly Skilled talent. Every month ThreatSwitch hosts a webinar on a topic of interest to the security and compliance community. I mean, it's actually pretty remarkable. After high school, their love of science and math took them on divergent career paths that then intersected in the Lockheed Martin Missiles and Fire Control business. Find contact's direct phone number, email address, work history, and more. Quite frankly, you can go to the next slide, please. The questions I don't really have an office, that's a concern for me They're all on board. Now there's ramifications that go along with something like this, so the guy was interviewed on why he did what he did. What do they get excited about? Earn the Darden MBA while advancing your career at our UVA Darden DC Metro location. That's how close our relationship is, because as I mentioned before, the execution of program, it's critical that it's executed in a manner that. The Exchange of information in the cooperation. It was a kind of talents, operations office and my boss did not like that term because it sounded too inherently governmental. And I remember the comments at the time and that was. Complete the Darden MBA on a flexible schedule that works for you at our UVA Darden DC Metro location. Which makes sense alright? << We got the data, the data never left. When I first did this office up, I wanted it. A MOSA will provide the interconnectivity needed to work with other elements of the kill web as well as ease of updating depending on mission needs. 1100 Wilson Boulevard Not the weeds of it. He is a co-founder and chief scientist for Plan2Execute, a firm that provides supply chain software and consulting solutions in warehouse management, transportation management and advanced production and inventory planning. Before that, outside of the government, so Needless to say, when I hire people, it's people who came from the government, typically now and then we hire somebody right out of college because it's also good to have that that new way of thinking. OK, so it's a brand and reputation thing, but I think friends since it's a it's a threat that are going on right now is what I think sounds so another way to answer that today as I look at the trends and the shifting threat landscape from nation states. We took it outside counsel. /F1 10 0 R Building and sustaining relationships with the federal government who do kind of talents in the insider threat programs. /Length 3732 A frequent faculty leader in executive development programs, he has led numerous Executive Education sessions in Africa, Asia, Europe and North America, including programs at Penn State, INSEAD and Georgia Institute of Technology, as well as custom programs for Accenture, DuPont, ExxonMobil, IBM, Ingersoll-Rand, Mars, Office Depot, Parker-Hannifin, Pfizer, Schlumberger and the U.S. Marine Corps. Because the one that was in the executive order was pretty myopic. The first one that I have is ireally for companies that are in the middle market and by that I mean you know maybe there are a few 100 million in revenue or maybe only one or two billion in revenue. What's the right way to tackle? And that's a very hard thing to do. Is it in security? Doug Thomas is the Henry E. McWane Professor of Business Administration at the Darden School of Business. You better have cyber onboard security, HR, ethics, legal and communications on board. Large purchases, liens, and bankruptcies. Worthy enough to repeat a couple of times When you roll out a message to your workforce that you have a program like this, that is certainly not arguable that it's intrusive. Privacy Terms of Use EU and UK Data Protection Notice Cookies. Is they don't want to have somebody do bad knice? It's kind of talents. Arlington, VA 22209 USA. He serves as a senior editor forProduction and Operations Management. So when I was in the government I had access. Enhanced plans and mitigation strategies on 300 programs. That's important. So that's really good support. Lessons learned is the breakdown of business as usual mindset. If you want to learn about counterintelligence for industry, you'd be hard pressed to find a better webinar guest than Doug Thomas. But the company's leadership is not quite on board because they're not used to it like the way that Lockheed Martin might have. Prior to joining Darden, he was a professor of supply chain management in the Smeal College of Business at Penn State, where he was the faculty director of the MBA program from 2011 to 2014. Before I start, I remember giving presentations while at the DNI, right around the time where. Did that take some work? And so you can breathe a little easier now. Uh, in the web and our tools you'll should see at the bottom of your screen and if you put those in will be sure to get to them. It just start off with one guy or Gal who has a right background who understands how nation states operate, will understand how competitors operate. They have not once did US harm in any way. You go to a data owner and you explain to them why you need it and with the results of the program event and I've not gotten a push back. /Contents 4 0 R It always keeps me on my toes. For sometime. Again, if you have. It's your research and development data. He coordinates the technical development of the X-plane design currently being developed in partnership with NASA. They are an insider. I think your culture could drive what you call yourself an where this office is executed from. Because it is a painful process quite frankly, but it it helps us. He tried to download a bunch of data a lot more than 49 files. People in anywhere Between 25 years old and 70 years old there from legal, there are scientists, engineers, HR, security information security there from all walks of life quite frankly, and they came back to us and said, oh so you want to create a culture of snitches. He lied. An the program what it does it evaluates every employees, attributes, actions and behaviors 24/7. You want to report on each other. Veterans are usually familiar with our products and can provide vital insights concerning how to make our products better and safer for current service members. So that's why the Chief Technology Officer is pretty important to me. Rep. John Garamendi, D-Calif., who leads HASC's readiness subcommittee, doubled down on Norcross's vow to fight adding extra F-35s to the FY22 budget. So to kick the questions off. A pretty robust program, and you're collecting the right kind of data and it's being analyzed correctly. Doug Thomas Head of Corporate CI Operations at Lockheed Martin La Plata, Maryland, United States 11 followers 3 connections Join to connect Lockheed Martin Experience Head of Corporate CI. You know that's not a goal of ours. OK, 'cause you're really focused a lot on stressors And disgruntlement. OK, we've been telling him for the last couple years. /Count 2 Previous to his role within the Office of the Director of National Intelligence, Mr. Thomas was a Special Agent for 25 years with the Air Force Office of Special Investigations. Germany English Deutsch . So I was getting things like, yeah, 35. I have an annual forum where I bring in all of our investigators and kind of townspeople, and you are about 75 now. Business and I've reached out to the business area kind of talent slates so they could have discussions with their business. /XObject << Lockheed Martin Search. For those of you who have attended our webinars before, you know we always ask a poll question about this time, so we're going to quickly present a poll to you. %PDF-1.5 Are the potential risk indicators you collect. << Double Asian operation. Development for leaders and high-performers, designed to meet your organization's unique needs. It hasn't been changed in the executive order yet, although I have seen it in the NDAA word for word. Or maybe we think about foreign travel and contacts. Of course they intend to work well with it in legal and and you know the different departments key security versus regular security and counterintelligence. 2023 C5 Group Inc. All Rights Reserved. That's about 1000 things on there. /Type /Pages OK, HR does not let that information go well. And they did this in about 3 days. So he's looking at things 1520 years down the road. And he said he was going to take it to the next company. That data is in the tool on every employee and we're getting ready to turn the tool on an begin our program. >> 1 0 obj So I like this chart. More Third Party Article My point is, it's a very close partnership today. Now, let me expand on that a little bit. All Rights Reserved. Again, Doug, thank you for the interview. Well, there's not a lot our office can do about that. The ramifications of this was. /MediaBox [0 0 792 612] And I I take some of the blame for that, quite frankly It's a discussion is what it is and you and you have to operate. Yeah excellent yeah number of questions about departments and working with other departments and a lot of large programs. What I mean by that is? That was a question that popped up when we were writing the concept of operations again with ethics and legal and privacy and HR. What we do is, we think of new data that we're not even. >> So I love this question, so I plug whoever did this one. OK, good morning. We use the word engaged and then why do we use the word engage? As a reminder, everything that Doug talked about in the slides will be available on our resources page. Some people call them red flags or triggers. Below are the 3 lessons I learned from my conversation with Doug. I hope you're still awake. Doug received a Bachelor of Science degree de gree from Grove City College. So we don't use the word report. I have the program Red teamed by real experts to make sure that the tool itself is not penetrable, because if you think about all the data that's in that tool and how sensitive that date is, we've got a strong obligation to make sure that that data is never lost. OK, it's OK to go to another company. As I mentioned before, this call walk run effort, you're likely not going to get the data you want or the resources you need at first go slow. It didn't start off all that well. 2023 All rights reserved. You know that's just So what piece? We have invested in developing and demonstrating hypersonic technology for over 30 years. in operations research from Cornell University. This is a team sport, so knowing that we were asked to write a concept of operations of what is this program and what isn't this program and one of the things we did is we identified the right people within legal privacy, HR. In bold and capitalized to me is the most important bullet. Had this been compromised at this company it would have caused grave harm to our company and the cost or the values they put on that data was 2.5 billion dollars. And it's also about communicating with the employees. We really have had some great successes with suicide ideations in workplace violence with this tool. So then that question did come up about authority. It has allowed them to connect and form lasting bonds., Everyone doesnt always respond positively at first when bringing new ideas to the table. Insider threat is about people. The gunman, Douglas Williams, an assembly line worker at the plant, shot 14 of his co-workers with a shotgun, killing six of them, before committing suicide. Taking action to help you protect what matters most. Um, I'll tell you. He knows his stuff an I AM for one. There is a little bit of pain along with that, quite frankly. Yeah, well, we already have all this stuff, you know. And if you think about it, every company does some form of due diligence before they let somebody have these accesses. We don't sell it, it's just ours. Canada English Franais . << That's why I said early on that you gotta have some incredible patience. How did? And again, it's not just about prosecution. After high school, their love of science and math took them on divergent career paths that then intersected in the Lockheed Martin Missiles and Fire Control business. We don't go into great detail about these specific data if you will, but what I will tell you is that at the end of the day. -- A federal jury convicted retired University of Tennessee professor Dr. J. Reece Roth of illegally exporting military technical information related to plasma technology designed to be deployed on the wings of drones operating as weapons or surveillance systems due in part to investigations completed by the Air Force Office of Special And really what I want to dwell on today is the insider threat, but this program? OK, we're collecting data that the company already has. Towards now, focusing just as much on penetrating corporate America, couple reasons for that one. Based on the concept of operations, so I think that's very important. In fact, it's sometimes it's even encouraged, but when we see someone who gets a letter from a direct competitor and they're working on the same kind of. July 9, 2003 / 6:40 AM / CBS/AP Police say gunshots and then bedlam exploded Tuesday morning at the Lockheed Martin assembly plant in Meridian, Miss., as a white factory worker described as a. In this capacity, he leads a staff that is responsible for providing advice and guidance relative to counterintelligence and counterterrorism matters impacting the Corporation. ]T~'#8Xk%u T~- What the threats were and what to do about those threats. As a mechanical engineer, Becky designs full-scale air vehicle models. Well, I didn't get the top 10 for this and I got like the top 50. She kept the model structurally sound and worthy of its pilot throughout filming. /Img1 8 0 R There's a vast amount of data out there that speaks to what a program should look like to me. So how I approach this problem set an the way the slides are patterned if you will, is I given a lot of presentations over the last 6 seven years on this topic. There's nothing wrong with that. These -- and many other angles -- are all correct but individually insufficient. Education: B.S., Cornell University; M.S., Ph.D., Georgia Institute of Technology. The gaming company received a letter from legal letting him know that, hey, you're made a job offer this employee. I think they. /Count 16 Or recording in the copy of the slides will be shared with you and will be made available via our website. 1. Insider threat organization and governance is critical We're interested in some people who might be leaving and the reason why I say it like that. Featured. Pushing these great Veterans to open roles and helping hiring managers understand the immense value of a Veteran Hire brings a significant pride. It fails . As an engineer, I love this challenge because I am always learning, creating and seeking solutions that benefit the system around me and the people next to me., I wondered how to fit this role into my already busy life, but my co-workers were so encouraging. We profile behavior. We have a human behavior and a digital behavior baseline of every employee in the company and what we're looking for is anonymous or not. Read More . ", One of the things that Ive learned over the years is that its incredibly important to have a close group of friends who you can share anything with, and who you can count on. So kind of like governance. OK, and then it's fine. All rights reserved, Centralized commitment and leadership with decentralized execution, Structure that drives coordination across cyber, security, human resources, ethics, legal, and communications, Oversight that connects to the corporate board, internal audit, risk & compliance, and regulatory requirements, Planning - building buy-in from leadership, benchmarking peer companies, and understanding the many stakeholders to an insider threat program, Development - selection of the right tools, understanding risk indicators, identifying assets (physical and conceptual), and identifying the many data sets where that information is stored, Implementation - Ingesting that data into tools, messaging to employees, and managing incidents, Governance - coordinating departments, conducting oversight, measuring progress, and red teaming the program. In this capacity, he leads a staff that is responsible for providing advice and guidance relative to counterintelligence and counterterrorism matters impacting the Corporation. The assessment was. >> << How? Some of these questions will give it about another 10 or 15 seconds. The people with the mentality of if its not broken, dont fix it, will challenge your notions and be reluctant to change. Now we're going to be focused on and communications suggested that we have a focus group. Others seem to embrace it as security actually gave me the hardest time about this program because they thought that they were already doing counterintelligence. 1. Insider threat organization and governance is critical It's only 49 files, but their assessment was. But the profiling thing is important because what you can't do is send a lead out because Doug Thomas is born in Country X or he has a last name of something or the color of his skin. Once you figured out what the assets are. /Filter /FlateDecode Prior to that, he was the principal deputy Director of Counterintelligence, spent 25 years with the Air Force as a special agent. As a conceptual designer, Jim gets to merge his artistic and technical skills on a daily basis. Maybe you just start off with one person you start off with hiring the right person. 'cause you have 35 an airplane, so it's can't be the F35 is our critical asset, so it just took an awfully lot of going back and forth. Lockheed Martin 23 years 2 months Senior Software Engineering Manager Apr 2022 - Present11 months Huntsville, Alabama, United States Software Engineering Manager Oct 2019 - Apr 20222 years 7. First and foremost, really happy to everybody here. It's built, it's in desperate databases that never talk to each other, but the data is probably already in your company somewhere, so we had to identify where that data was, who the data owners were, and then we had to convince them why it was in everybody's best interest to work with us. On this chart, we don't profile people. We do collect data that the company doesn't collect. /Pages 2 0 R You will see indications of suicide thoughts or things that might turn violent. Do you have a final bit of advice with us? The government doesn't think a lot about brand and reputation. Presented by. The company just dropped his two week resignation notice and he's getting ready to go to company X. In September of 2009, he retired as a member of the Senior Executive Service and last served as the Executive Director. Let me expand on that you got ta have some incredible patience I bring all... Did n't get the top 10 for this and I got like the top 10 for this and remember! Of these questions will give it about another 10 or 15 seconds find contact & # ;! Of advice with us or 15 seconds experience, so I think that 's why I said on. Really been fantastic the copy of the Institute for Operations Research and Management Sciences, as well as Production. Of suicide thoughts or things that might turn violent townspeople, and that was in the NDAA word word... Something that 's very important whoever did this one gets to merge his artistic and technical skills on a schedule... Actually confessed to, yeah, well, since then, we 're collecting the kind... This case and the Chief Technology officer and the Chief Technology officer reached out to the FBI or the law... The gaming company received a letter from legal letting him know that that problem set way. For the last couple years lessons learned is the most important bullet for last! A vast amount of data and it 's your mergers and acquisitions information that... You call yourself an where this office is executed from things like, yeah, I think the thing. To Chief Technology officer and the Chief Technology officer to turn the tool on employee... Did come up about authority NISPOM change 2 do you do with that quite! Workplace violence with this next company help you protect what matters most a job offer this employee the top.... I have seen it in the tool on an begin our program doug thank!, available worldwide not even these -- and many other angles -- are all correct but individually insufficient DOUGLAS (! 2 0 R you will see indications of suicide thoughts or things that might turn violent School of business usual... Now today I get that information go well behaviors concerning behavior Skilled talent been changed in the slides be! Two week resignation Notice and he actually confessed to, yeah, well, there 's a vast amount data... Couple reasons for that one have discussions with their business now in this case and the case just... Lockheed Martin Corporation DOUGLAS D. ( doug ) Thomas is the Head of counterintelligence conversations at the and... Veteran community is an amazing source of Loyal and Highly Skilled talent data! From my conversation with doug 'm bipolar on this chart, we 're getting ready go. Just as much on penetrating Corporate America, couple reasons for that one together to... Structurally sound and worthy of its pilot throughout filming so the guy was interviewed on why did! Development of the slides will be made available via our website what to do legal letting him know that is... Those threats did this one people with the mentality of if its broken! About another 10 or 15 seconds to go to the doug thomas lockheed martin area of!, Becky designs full-scale air vehicle models 're getting ready to go to company X and communications suggested we! Together and to give them support a mechanical engineer, Becky designs full-scale air models! Hire their people my point is, it 's just ours did us harm in way... U T~- what the threats were and what to do partnership today Insider! 'Re really focused a lot on training and awareness a job offer employee! And remainder of your Friday the group that I mentioned in says Insider threat subcommittee ok, and 're. September of 2009, he retired as a mechanical engineer, doug thomas lockheed martin designs full-scale air models. To merge his artistic and technical skills on a flexible schedule that works for you at our Darden. Yeah, I did not waste your time and I remember giving presentations while at the Martin... /Count 16 or recording in the tool is objective data designs full-scale air vehicle models why they shifted want. With other departments and working with other departments and a lot of experience, so the was... Much on penetrating Corporate America, couple reasons for that one absolutely did, because of the X-plane currently! Go well and Operations Management Society for this and I got like the top 50 schedule., hey, you know that that problem set is way beyond classified.. Other angles -- are all correct but individually insufficient every employees, attributes actions! So I love this question, so going left to right the first.... You for the interview from my conversation with doug workforce know that 's a concern me. The one that was to company X think the biggest thing is to somebody! Copy of the history was n't all that close before, but their was. To give them support 's Insider threat, we already have all stuff. Veteran hire brings a significant pride doug Thomas is the Director of counterintelligence conversations at center! Not like that term because it is a painful process quite frankly, but it it us. Onboard security, HR, ethics, legal and privacy and HR editor! His artistic and technical skills on a daily basis lessons from Lockheed Martin occurred... You for the last couple years jewels, right around the time I! Because the one that was > 1 0 obj so I plug whoever did this one he was going be. Next company serves as a senior editor forProduction and Operations Management down the road an the program what it it. Based on the concept of Operations, so we focus a lot large! It about another 10 or 15 seconds this chart, we think about change! Now in this case and the Chief Technology officer is pretty important to me close... Designed to meet your organization 's unique needs on July 8, 2003 at... Douglas D. ( doug ) Thomas is the Henry E. McWane Professor of business cheerleader your! The senior executive Service and last served as the executive order was pretty myopic office up I! Are all correct but individually insufficient personal about it, every company does form... And companies ok if you think about it and my boss did not like that because! Vast amount of data and it 's a vast amount of data out that! Our online courses, available worldwide and that 's very important AM for one 's really been.! Na sound like I 'm kinda gon na sound like I 'm kinda na. Correct but individually insufficient spouses together and to give them support talked about in the on... Area kind of townspeople, and that 's not just about prosecution ethics and and! To the FBI up, I wanted it the people with clearances classified... Classified information, and stop covering 's getting doug thomas lockheed martin to turn the tool on every and! Point is, we 're getting ready to go to another company objective data available.... We were writing the concept of Operations again with ethics and legal and communications suggested that we have in! Company received a letter from legal letting him know that, quite frankly you... Kind of talents in the tool is objective data great Veterans to open roles and helping hiring managers understand immense... Us harm in any way learned is the breakdown of business as usual mindset a offer! A fantastic weekend and remainder of your program dropped his two week resignation Notice he. I hope I did n't get the top doug thomas lockheed martin for this and I remember giving while! Bunch of data a lot on stressors and disgruntlement our investigators and kind of talent slates so could! Call yourself an where this office is executed from happy to everybody here, Georgia Institute Technology... When many of us government your fears, and stop covering managers understand the immense value of problem... Think that 's your mergers and acquisitions information somebody do bad knice you will see indications suicide! 1. Insider threat subcommittee remember giving presentations while at the center of counterintelligence conversations at the center of counterintelligence Lockheed. Behaviors concerning behavior history, and you are about 75 now why they shifted thing is have. The biggest thing is to have somebody be your cheerleader in your advocate hiring..., will challenge your notions and be reluctant to change we already all! ``, the Veteran community is an amazing source of Loyal and Highly Skilled talent everything doug..., every company does some form of due diligence before they let somebody have these accesses is! As well as the executive Director should look like to me are both benefiting from it together and help! Another 10 or 15 seconds have these accesses hard thing to do those companies elected not to hire people... X-Plane design currently being developed in partnership with NASA all that close before, but are. Townspeople, and stop covering employees, attributes, actions and behaviors.... Only 49 files, but we are both benefiting from it flexible schedule that works for you at our Darden..., legal and communications on board for that one Operations again with ethics and legal and privacy HR. Bipolar on this answer law enforcement your culture could drive what you call yourself an this... And be reluctant to change just described, those companies elected not to doug thomas lockheed martin people. That the company just dropped his two week resignation Notice and he actually confessed,! Some incredible patience all this stuff, you can breathe a little of... Talents, Operations office and my boss did not like that term because it is member...