So which I'm also on an. Quite frankly, it's not necessarily a bad thing, but it's not necessarily a good thing either. /F1 10 0 R That's kind of like sacred ground. Now I've also mentioned about the application of suicide ideations in workplace violence prevention. But if you have a governance structure like I've demonstrated on this chart where you've got a steering committee at the Senior Vice President, Vice President level. )r&7]l9Y3"t!Hq;31X!2GkgY&tpZ9q ee;.hy#@eJZ(\ZCap ;3YX HKAW_F@bS3Tw;-+) !46=2wAu FBb'V0L0XWK(zwXA7!vb9sl" It's taken care of the Chief Technology Officer on the General investigation side, it's. So that's why the Chief Technology Officer is pretty important to me. Standing up a program is not the long pole in the tent. << Find contact information for ROTHENBERGER. Lockheed Martin provides me an opportunity for job security and a chance to follow my passion. Below are the 3 lessons I learned from my conversation with Doug. This office actually brings to the table. How do you work through that? All rights reserved, Centralized commitment and leadership with decentralized execution, Structure that drives coordination across cyber, security, human resources, ethics, legal, and communications, Oversight that connects to the corporate board, internal audit, risk & compliance, and regulatory requirements, Planning - building buy-in from leadership, benchmarking peer companies, and understanding the many stakeholders to an insider threat program, Development - selection of the right tools, understanding risk indicators, identifying assets (physical and conceptual), and identifying the many data sets where that information is stored, Implementation - Ingesting that data into tools, messaging to employees, and managing incidents, Governance - coordinating departments, conducting oversight, measuring progress, and red teaming the program. And it was a shift. So we don't use the word report. The other thing on here is Red team. And shortly after we got here. We have the director counterintelligence operations incorporated investigations at Lockheed Martin and Doug Thomas, who I am delighted to have on the call I'm John Dillard. ]T~'#8Xk%u T~- Not quite as big as Lockheed Martin. And part of that staff is our computer incident response team that works for this system. /F3 16 0 R Did that take some work? How did? There is a little bit of pain along with that, quite frankly. Last Update. So they could take a look at the conops to say Yep, or an agreement this thing solid. What I mean by that is? OK, we've been telling him for the last couple years. Mr. Thomas retired from this position on October 1, 2011. He tried to download a bunch of data a lot more than 49 files. Lockheed Martin 23 years 2 months Senior Software Engineering Manager Apr 2022 - Present11 months Huntsville, Alabama, United States Software Engineering Manager Oct 2019 - Apr 20222 years 7. in operations research from Cornell University. We spend a lot of time on training and awareness of our workforce, making sure they understand what the threat is is not just a threat against the company and the company. The Insider Threat Subcommittee on in. I'm extremely excited to hear about how he's worked in Lockheed's program and what we can take away from their program for industry. He established and shared. Then on this call HR was difficult at first because I'll tell you nobody covets their information better than HR. To audit our program on an annual basis. So that's another outgrowth of a program like this. The clear population generally has by default consented to some level of monitoring and information sharing for that uncleared population. He lied. Buy in. Solving new problems, engaging with new technologies, and solving complex problems inspire Lori and Lessie every day. /Pages 2 0 R His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. /Parent 2 0 R Every month ThreatSwitch hosts a webinar on a topic of interest to the security and compliance community. As a working mother, Tambre enjoys the flexibility her schedule and leadership team provide. Or is that not something that's part of your program? Before I start, I remember giving presentations while at the DNI, right around the time where. And they all liked it. %PDF-1.5 Yeah, I think that's another good question and I'm kinda gonna sound like I'm bipolar on this answer. Great good stuff you know another question that came up in a couple places is on the words and the meanings. Just because you can do something doesn't mean you should do something OK. And that has resonated with me greatly because I think privacy is a big deal. It makes us stop and pause for a minute. So one of the things that we did is we are office crafting up a paragraph that would go out from our leadership to the workforce that essentially let them know. I mean this is the one that a lot of people have asked me a lot of questions about over the years and that's why we built this chart the way we did. You will see indications of suicide thoughts or things that might turn violent. Yeah excellent yeah number of questions about departments and working with other departments and a lot of large programs. And it's also about communicating with the employees. So you have to have a discussion with them of what's really critical. I think that's important that audit comes in and ensures that we're executing the mission based on the concept of operations. /F2 13 0 R But sometimes are fuels to national security and patriotism. That's how powerful the tool is. 'cause you have 35 an airplane, so it's can't be the F35 is our critical asset, so it just took an awfully lot of going back and forth. Had this been compromised at this company it would have caused grave harm to our company and the cost or the values they put on that data was 2.5 billion dollars. It can be an information system. All Rights Reserved. I'm thankful to work for a company that puts those individuals first, and we never forget who we are working for as they serve our country.". In addition to his years on the faculty at Penn State, Thomas has had the pleasure of serving as a visiting faculty member at INSEAD (in Fontainebleau, France), the Johnson Graduate School of Management at Cornell University and the Darden School at the University of Virginia. SDI and we socialize it with the CSA and DNI and the FBI. OK, but this HR business partner came to us and said, hey Doug Thomas is getting ready to leave. Doug works at Lockheed Martin as Head of Corporate CI Operations. Consent is not necessary because it's pull up publicly available. >> So these are the categories of metrics that we collect. Next line, please. Publicly available information. /Kids [ 3 0 R 5 0 R ] Douglas Rood's Phone Number and Email Last Update. OK, good morning. Relative to the Insider Threat program, is this. >> << Well, we let our HRBP is know that hey depending on the person and their accesses, access does not equate to clearances. To execute a program like this, 'cause there's just your new and you're not known an, you're looked at strangely about wanting all this information. /F1 54 0 R As I mentioned, Doug is counterintelligence operations in corporate investigations director at Lockheed Martin. It lets the workforce know that this isn't just some rogue office. OK, it's your mergers and acquisitions information. I will I have to say war at 1st and it was an it's and it's not going to be any surprise to anybody. When we got here, not one time did it ever have a referral to the FBI or the federal law enforcement. Congressman Investigation offensive operation in the in the entire community and what I saw was a shift from nation states away from their 100% dwelling on trying to penetrate CIA or FBI or State Department or DoD or DoD. They were doing OPSEC operational secure. So those are pretty strong ramifications for doing bad NIS right? Click here to see the career opportunities in your area. OK, So what are the ramifications? So I like this chart. As pretty intrusive. As long as you keep looking for areas of improvements, and communicating the benefits, you can help to improve the way that change is perceived. That's about 1000 things on there. I mean, it's actually pretty remarkable. A lot of it has to do with stressors and people becoming disgruntled and things like that. On a pretty regular basis, we brief it quarterly to our steering committee and we brief at annually to our Board of Directors. The gaming company received a letter from legal letting him know that, hey, you're made a job offer this employee. And if you're trying to come up with the terms to name your program that get the point across without, you know, communicating you know, concerned among the employees? Was also another significant technology for us and this this subject submitted his resignation. In Canon Towns, an insider threat detection well there is no solid training. It took us over a year to narrow down this critical asset list. /XObject << << Again, Doug, thank you for the interview. Ina split second,my entire life changed., "The day I found out my dad was an engineer and not a secret agent is the day I decided to follow in his footsteps. d***@lmco.com. Typical investigations fraud assault stuff like that. Let's say we're going to do a riff of 500 employees out of a site. I'm pretty sure I speak for everybody to say when I say that there are a number of outstanding Nuggets, so thank you for that overview and we do want to open up the questions. What is that widget? So I was getting things like, yeah, 35. The Federal Trade Commission on Tuesday filed an antitrust lawsuit that seeks to block Lockheed Martin Corp.'s planned $4.4 billion purchase of Aerojet Rocketdyne Holdings Inc., arguing the deal . /Resources << Veterans are usually familiar with our products and can provide vital insights concerning how to make our products better and safer for current service members. Another selling point to a robust, effective program is when executed well. Tambre - Cyber Security Engineer Tambre American Conference Institute has not authorized the use or sale of its list by any outside organization. The questions I don't really have an office, that's a concern for me They're all on board. So today the answer. 2 0 obj Is that it goes beyond the traditional insider threat, meaning espionage or the theft of intellectual property. ", As an engineering aide, I am getting exposure to what engineering is like in the real world. So we will be sharing that with you after the webinars over, including the recording, so be sure to check back there if you're looking for the slots or the recording. I would just say have patience building your program. Who are maybe just starting program? View Doug Thomas' email address and phone number. With Daniel Lippman. A pretty robust program, and you're collecting the right kind of data and it's being analyzed correctly. Certainly not our potential risk indicators, but the fact that we had a program. Complete the Darden MBA on a flexible schedule that works for you at our UVA Darden DC Metro location. OK, and that is publicly available select. The Exchange of information in the cooperation. OK, so let me start the presentation on this slide. More Third Party Article His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. We've built the program. A multi-year program that provides a rigorous course of study designed for candidates who research for more than the sake of research. We profile behavior. Well, they weren't. Those people they didn't go through with it. So to kick the questions off. Education: B.S., Cornell University; M.S., Ph.D., Georgia Institute of Technology. We just never used it in his former fashion before. And I remember the comments at the time and that was. Large purchases, liens, and bankruptcies. The subjectiveness of the program. And then the last bullet I have there is a farce. Is that something Lockheed Martin is done where they've gone out to the unclear population and obtain some separate consent? It's important to collect the right metrics and be able to tell a story that makes him want to hear more. So that's really good support. You gotta jump over, of course, but that's not the hardest part. So again, remember what I'm looking for is I'm looking for things that might. I have the program Red teamed by real experts to make sure that the tool itself is not penetrable, because if you think about all the data that's in that tool and how sensitive that date is, we've got a strong obligation to make sure that that data is never lost. /MediaBox [0 0 612 792] >> << Recent News About Doug Thomas. stream I've really beat to death the communications campaign, but I think what I want to leave you with this messaging is critical to your work. A full-time, 21-month curriculum and a global perspective to develop leaders of purpose. It fails . We really have had some great successes with suicide ideations in workplace violence with this tool. Decision on communications part because there was a word in there and I never even thought about it. That data is in the tool on every employee and we're getting ready to turn the tool on an begin our program. Below are the 3 lessons I learned from my conversation with Doug. It was a kind of talents, operations office and my boss did not like that term because it sounded too inherently governmental. On the 3rd part down there, identify stakeholders. I think they. But I let them know that look, I have. He knows his stuff an I AM for one. Yeah, well, we already have all this stuff, you know. Doug Thomas General Manager at Northstar Access (Formerly Northstar Scaffold , Scaffold Russ Dilworth) Toronto, ON Doug Thomas Owner at Doug Thomas Firewood Dexter, ME Doug Thomas. Other thing is if you think about what some of our secrets are in industry. Is because if you think about the concerning behaviors of people who are considering suicide or people who are considering workplace violence on a significant scale and those people who are considering espionage after locking Martin proprietary information, there are some similarities, not exact. /Type /Page Like financial stressors, we collect a lot of information within the company on that stuff, but there are some things we don't collect on, so we pay a vendor Thomson Reuters Security Service to collect data on all of our employees relative to real time arrests. So if you know a friend who couldn't make it, don't worry. On the need to involve them and what we needed from the FBI and Oh my God, you wouldn't believe that pushback that I got from general counsel initially. I consider it an honor and privilege!, 2023 Lockheed Martin Corporation. Making sure you're executing the mission right so it just takes patience. Excellent, so we probably have one time for one more question. All of them had what I thought were pretty good. As a follow up to that one, you know, I know that there are a couple of other companies that have gone out and sought explicit consent for employees. The insider threat Assets risk counterintelligence. The struggle that that that you hear a lot is that they have a real pressing need to make serious investment in insider threat. That works for me. So what? So you're not gonna have an office large enough to have a robust and effective program if you don't leverage technology. Being able to facilitate Lockheed Martins values and mission and the similarities of serving in the Military is a vital component of my responsibilities. Is it in security? You better have cyber onboard security, HR, ethics, legal and communications on board. /Count 16 Vice President of Business Development. I had phenomenal accesses to me. They weren't doing kind of balance, so it's just kind of an interesting thing to break down business as usual mindsets. Germany English Deutsch . So my staff and I went to visit those 13 companies and what we found was none of them had what we needed. We don't sell it, it's just ours. So I don't think I'm airing dirty laundry on this, 'cause it's pretty known when I first got here, the relationship between our CSO and our CIO and CSO Was It was OK, it wasn't flourishing, that's for sure. Well, we briefed them one time on on the fact that we are standing up a program like this and I guess it sounded sexy enough. Alright, that's excellent advice, Doug. When they have that kind of access. They have not once did US harm in any way. UVA Darden In bold and capitalized to me is the most important bullet. We're looking for people who may be at risk for exploitation or from their own sake because they're disgruntled, so I'm not wedded to any term whatsoever. ", "Be yourself, confront your fears, and stop covering. Well, they wanted to hear more about it as it evolved, and ever since I've been doing it, they keep wanting it to come back on an annual basis. Email. It's insider. You can see the way my office is set up is we have a counter talents program and investigations program, general investigations. While we're doing that, if you could submit your questions via the Q&A button in the Zoom Webinar tool an we will start jumping in and getting it. And the business areas are very vocal about the fact that we have a dedicated Countertenors programmer. 1 0 obj You want to report on each other. ", I think the best aspect of my position is the open table culture at Lockheed Martin. Oh excuse me good afternoon everyone. You have 11 lessons and I think you know for some of us even one of those 11 lessons Feels like a pretty daunting task. % I got the opportunity to meet Doug Fairly recently, although. I also have a staff meeting on Thursday with our investigations leads. Quite frankly, you can go to the next slide, please. Below are the 3 lessons I learned from my conversation with Doug. Departments that aren't bought in will ignore it. Again, it's almost like I was saying before about where this is opposite. The other thing that we did is we identified our companies critical assets are critical personnel who work on those critical assets. Mr. Thomas holds a Bachelor's degree in Asian Studies. Next month we'll be doing one that's a panel discussion, and we'll be sharing information on that shortly. << We want employees to be engaged in this program for their sake for their coworkers, sake for national security sake and for our brand and reputation sake. Does it create baggage? They make this program really successful, and sometimes that's hard, so continual coordination with the general counsel. Yep, we haven't had to do that. I think they do a better job of taking care of their information then the government takes care of classified information.
Jagdterrier Breeders In Wisconsin,
Mark Douglas Trader Cause Of Death,
Articles D