We're talking about a small set of data files. I think they do a better job of taking care of their information then the government takes care of classified information. This is the definition we use in Lockheed Martin. /Contents 4 0 R Just because you survived a presentation to your senior leadership on the need for an insider threat program, does not mean that the messaging stops there. Like financial stressors, we collect a lot of information within the company on that stuff, but there are some things we don't collect on, so we pay a vendor Thomson Reuters Security Service to collect data on all of our employees relative to real time arrests. Now, if he uses any of our data, you know you have a problem to your company has a problem. OK, and that is publicly available select. A MOSA will provide the interconnectivity needed to work with other elements of the kill web as well as ease of updating depending on mission needs. So we end up delaying a robust program because we had to build the programs, build a tool in House, which I is the last thing I wanted to do. What I tell people is until you shine a spotlight on this problem set and what I mean by that is invest in at least one resource until you shine a spotlight on this problem that you have no clue what's walking out your door Done. Canada English Franais . /Type /Catalog So I don't think I'm airing dirty laundry on this, 'cause it's pretty known when I first got here, the relationship between our CSO and our CIO and CSO Was It was OK, it wasn't flourishing, that's for sure. The insider threat Assets risk counterintelligence. On developing this program and I can tell you right now it didn't. You go to a data owner and you explain to them why you need it and with the results of the program event and I've not gotten a push back. That's what makes us tell gives us the ability to tell stories to our senior leadership of what is it? I mean you mentioned the scope of this can be huge. This is a team sport, so knowing that we were asked to write a concept of operations of what is this program and what isn't this program and one of the things we did is we identified the right people within legal privacy, HR. And that name recognition goes a long way and I know it sounds silly, but it is a ring knocking club so that helps as far as. Uh, selling the leadership so that that was interesting, because when I came to Lockheed Martin, they didn't have a kind of intense program or insider threat detection program. #2. We profile behavior. As a reminder, everything that Doug talked about in the slides will be available on our resources page. Previously, Dougl Read More Contact Douglas Thomas's Phone Number and Email Last Update 11/20/2022 10:24 PM Email d***@lockheedmartin.com Engage via Email Contact Number (301) ***-**** Engage via Phone Mobile Number v ZU:k. Uh, in the web and our tools you'll should see at the bottom of your screen and if you put those in will be sure to get to them. << We have a human behavior and a digital behavior baseline of every employee in the company and what we're looking for is anonymous or not. Veterans are usually familiar with our products and can provide vital insights concerning how to make our products better and safer for current service members. Do you have a final bit of advice with us? And in addition, I would just remind everybody that this is the part of a series on insider threat. Prior to joining Darden, he was a professor of supply chain management in the Smeal College of Business at Penn State, where he was the faculty director of the MBA program from 2011 to 2014. So I wanted to make sure that our program covered every employee in the company. Introducing your program to employees properly, and providing absolute transparency in how you are conducting your program ethically, is of utmost importance. Alright, that's excellent advice, Doug. >> ", One afternoon, my company was preparing to go out on a routine patrol. Being able to facilitate Lockheed Martins values and mission and the similarities of serving in the Military is a vital component of my responsibilities. But sometimes are fuels to national security and patriotism. People with clearances. So, it was an easy choice to come back., The extra support that comes with training, mentoring and connecting with others having a similar experience is invaluable.. And just how critical their partnership was to our office to our success. So to kick the questions off. Lockheed Martin Invests $8.5 Million in Scholarship Programs for 2023. Data loss prevention tools. Lockheed Martin provides me an opportunity for job security and a chance to follow my passion. So he's been around many sides of this issue. That includes: Throughout Doug's talk, he came back to a critical, often-missed perspective: without transparency and trust, insider threat programs won't work. OK, so think about the data in the tool. So you Fast forward it today. %PDF-1.5 As an engineer, I love this challenge because I am always learning, creating and seeking solutions that benefit the system around me and the people next to me., I wondered how to fit this role into my already busy life, but my co-workers were so encouraging. It's just we are. And the business areas are very vocal about the fact that we have a dedicated Countertenors programmer. So just to level set to make sure we're all staying on the same sheet of music. Just because you can do something doesn't mean you should do something OK. And that has resonated with me greatly because I think privacy is a big deal. The other thing that we did is we had like I said we had communications on there and they helped us greatly with a communications plan and I'll get into that a little bit. 3 0 obj I think your culture could drive what you call yourself an where this office is executed from. All the data that's in the tool is anonymized, so the analysts, by the way, really have four analysts for over 100,000 employees. I also have a staff meeting on Thursday with our investigations leads. Globe Icon. I mean, it's actually pretty remarkable. UVA Darden So I'm going to let your imagination run wild on the kind of data we collect and analyze. As a conceptual designer, Jim gets to merge his artistic and technical skills on a daily basis. So like when I give a presentation to the board. Capability should sit. His primary role is to identify intelligence and terrorism threats to Lockheed Martin Corporation and work with internal and external partners to mitigate those threats. I consider it an honor and privilege!, 2023 Lockheed Martin Corporation. I think this could be a proof of concept as far as referrals go to federal law enforcement, I feel confident that this is going to be in our best interest. 1100 Wilson Boulevard Or maybe we think about behavioral analysis on our corporate network. It's always been penetrated, so but it is a harder target than industry. Doug Thomas is theHenry E. McWane Professor of Business Administration at the Darden School of Business. In addition to his years on the faculty at Penn State, Thomas has had the pleasure of serving as a visiting faculty member at INSEAD (in Fontainebleau, France), the Johnson Graduate School of Management at Cornell University and the Darden School at the University of Virginia. I don't want to do is overstep that privacy. So one of the things that we did is we are office crafting up a paragraph that would go out from our leadership to the workforce that essentially let them know. It's insider. Is that something Lockheed Martin is done where they've gone out to the unclear population and obtain some separate consent? After high school, their love of science and math took them on divergent career paths that then intersected in the Lockheed Martin Missiles and Fire Control business. OK, so it's a brand and reputation thing, but I think friends since it's a it's a threat that are going on right now is what I think sounds so another way to answer that today as I look at the trends and the shifting threat landscape from nation states. Douglas Rood's Phone Number and Email Last Update. Read More. My boss says I'm opaque, transparent what he means by that is I'm very well our office. Another one, we have an you touched on this a little bit when you're talking about employee communications and governance and this is around a lot of companies have unclear population and clear population. So thank you for that. Is that it goes beyond the traditional insider threat, meaning espionage or the theft of intellectual property. Your company's Crown jewels isn't that secret document, it's your intellectual property. If you go to the next line, please Christian. It's also about good governance. But programs are scalable, so this. Focused experiences for high-potential executives & managers seeking personal growth and career transformation. The decision to expand that program. You really feel heard even if you are earlier in your career., "My job allows me to use my creativity to come up with innovative solutions for complex problems. Well, about three years after I retired from the government, director Clapper asked us not like in Martin, but the inside Insider Threat Subcommittee to look at the definition of insider threat. Learn how we are strengthening the economies, industries and communities of our global partner nations. OK, and then it's fine. Free Tools . But we put them underneath the wing of somebody who's got. So we did some pure benchmarking because I knew we wanted to stand up a program and there at that time there were 13 companies that advertise that they had insider threat detection tools. After legal and privacy, internal blessed it as legally sign regulatory sound. I mean it helps you pad your economic woes. Worthy enough to repeat a couple of times When you roll out a message to your workforce that you have a program like this, that is certainly not arguable that it's intrusive. Excellent, yeah, we have several questions around. Oh how things could be to the benefit of the company. My role at Lockheed Martin puts me on the flight-line next to fighter jets and experimental aircraft sometimes in them! Before I had to beg for data. It knows that Doug Thomas works in the UK or Canada or Australia. "The program is over budget. are not quite as effective to get them to release funds as much as we would like. So like in Martins about 105 years old and before my office got here. >> Complete the Darden MBA on a flexible schedule that works for you at our UVA Darden DC Metro location. Thanks for joining the next in Threat switches series on insider Threat. We have first. When we got here, not one time did it ever have a referral to the FBI or the federal law enforcement. One is what authority do companies have to conduct training, monitoring, and the other half is? Again, if you have. So we came up with this definition and we socialize it with you. I mean this is the one that a lot of people have asked me a lot of questions about over the years and that's why we built this chart the way we did. No, that's an airplane. Browse our diverse, passionate, and acclaimed researchers and their academic areas. But it also includes workplace violence on the scale of a Nadal Hassan or an Aaron Alexis. Quite frankly, it's a crawl walk, run approach, but eventually we got to everything we wanted. Well, we let our HRBP is know that hey depending on the person and their accesses, access does not equate to clearances. This just depicts our organizational structure, where it's a centralized mission for sure, but decentralized execution. Initially, because all the data is anonymized in the tool, so that's why I say we don't profile people for profiling behavior. Recent News About Doug Thomas. Said we're on solid ground. As long as you keep looking for areas of improvements, and communicating the benefits, you can help to improve the way that change is perceived. More Story Keeping Ahead of Ready With Next Generation Launch Systems Industries from retail to banking are preparing for the future by focusing on the modernization of their technologies and assets. That's important. And if you think about it, this kind of why we merged investigation and counterbalance under the same office. Or is that not something that's part of your program? So I warned you that I was going to come back to this chart or the topic of governance only because I don't think you can overstate the importance of a good governance program over a program like this. w/$dPQb+[W4]iSs&!IH:>p\!}{lP!`
BE "@6x93r%J+2. Because it's already data that the company has collected. That's how close our relationship is, because as I mentioned before, the execution of program, it's critical that it's executed in a manner that. Um, I'll tell you. So what has to happen is based on whatever concern we might have that wasn't generated by the tool. Which makes sense alright? /Filter /FlateDecode His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. A Lockheed Martin official has said the White House is working to establish a new agency that would take responsibility for the federal security clearance system from the Office of . And it's also about communicating with the employees. 'cause you have 35 an airplane, so it's can't be the F35 is our critical asset, so it just took an awfully lot of going back and forth. Doug Thomas Head of Corporate CI Operations at Lockheed Martin La Plata, Maryland, United States 11 followers 3 connections Join to connect Lockheed Martin Experience Head of Corporate CI. The next bullet is our internal audit. In fact, it's sometimes it's even encouraged, but when we see someone who gets a letter from a direct competitor and they're working on the same kind of. It kind of puts a nice book in on your talk and that is eating the elephant. You know that's your Crown jewels, right? ", "Be yourself, confront your fears, and stop covering. And if you're trying to come up with the terms to name your program that get the point across without, you know, communicating you know, concerned among the employees? In the tool and I'm looking for things that are atypical. >> And then the last bullet I have there is a farce. Can Blue Apron Develop a Recipe for Profitability? << Here Chief technology Officer, so that's really kind of where we get because they're not just focused on the next generation weapon systems, they're also focused on today's. The Insider Threat Subcommittee on in. He coordinates the technical development of the X-plane design currently being developed in partnership with NASA. Some people call them red flags or triggers. These -- and many other angles -- are all correct but individually insufficient. >> Orlando, Florida, United States. If you're a company this size and quite frankly you don't have the bandwidth to actually manage that kind of, uh, a list of critical assets. Doug is based out of La Plata, Maryland, United States and works in the Defense & Space industry. It's kind of talents. When many of us think about insider threat, we think about NISPOM change 2. Quite frankly, when the focus group came back with that change and explained it made great sense to me and so I think words matter. ", "I truly learn something new every day, and every day I get to solve new challenges. It just start off with one guy or Gal who has a right background who understands how nation states operate, will understand how competitors operate. Solving new problems, engaging with new technologies, and solving complex problems inspire Lori and Lessie every day. Although I say that the government is never not been penetrated in the in the entire time. Towards now, focusing just as much on penetrating corporate America, couple reasons for that one. ", Its important to have more women in STEM fields because diversity of thought and experiences drives innovation. I think what my office does more than anything. %PDF-1.5 It didn't start off all that well. So you're not gonna have an office large enough to have a robust and effective program if you don't leverage technology. Excellent, thank you. /Img2 9 0 R It's not the way, but it's a way. So what I'm going to do today is I'm going to talk a little bit about a way to stand up and execute a program. And again, it's not just about prosecution. How do you work through that? Another selling point to a robust, effective program is when executed well. Schedule a visit today. And that's a very hard thing to do. They have not once did US harm in any way. I don't understand how company can afford not to do this. They're really kind of two questions here. So that's another outgrowth of a program like this. ", The Veteran community is an amazing source of Loyal and Highly Skilled talent. /ProcSet [ /PDF /Text ] We really have had some great successes with suicide ideations in workplace violence with this tool. That works for me. Yeah, I think I think the biggest thing is to have somebody be your cheerleader in your advocate for hiring the right person. They make this program really successful, and sometimes that's hard, so continual coordination with the general counsel. It doesn't matter it be. As a person who loves aviation, I can say with certainty that I love what I do., Lockheed Martin has been a large part of my career, and I plan to stay here. He is a member of the Institute for Operations Research and Management Sciences, as well as the Production and Operations Management Society. He tried to download a bunch of data a lot more than 49 files. Again, it's almost like I was saying before about where this is opposite. Times you know well, where did you find your staff and a lot of people don't like my answer, so I don't. The first one that I have is ireally for companies that are in the middle market and by that I mean you know maybe there are a few 100 million in revenue or maybe only one or two billion in revenue. Thousands of security leaders and practitioners have attended these webinars, but not everyone has an hour to spare. His office was responsible for multiple documents due annually to the President and the Congress, such as the National Threat Identification Prioritization Assessment, which informed the President on the gravest intelligence threats facing the United States, and the National Counterintelligence Strategy, which informed the President of how the Intelligence Community would mitigate those threats. I'm not even gonna use that kind of weapon system that we're talking about or the location. He has testified as an expert witness and consulted for several large organizations on supply chain strategy including Accenture, CSL Behring, Dell, ExxonMobil and Lockheed Martin Aerospace Corporation. d***@lmco.com. A full-time, 21-month curriculum and a global perspective to develop leaders of purpose. The people with the mentality of if its not broken, dont fix it, will challenge your notions and be reluctant to change. Consent is not necessary because it's pull up publicly available. Are lawyers and again, X internal general Counsel an external general counsel. Contact. stream So those are pretty strong ramifications for doing bad NIS right? Well, they weren't. Thats why having the opportunity to do that daily and assist transitioning service members, veterans, and spouses with opportunities at a company like Lockheed Martin is just amazing., I love having the opportunity to connect with our transitioning service members and provide a bridge for them to cross as they begin their next career. In September of 2009, he retired as a member of the Senior Executive Service and last served as the Executive Director. 'cause again, I came from the government, so I'm not really the softest approach when I'm in the government and what that word was is we had in there that people should report. It's been enormously helpful. The third bullet there. So that's one thing, so offices that were painful. It knows that, OK, the tools designed like that, so the analyst can't readily see Doug Thomas is information because he's overseas. It can be an information system. Prior to joining Darden, he was a professor of supply chain management in the Smeal College of Business at Penn State, where he was the faculty director of the MBA program from 2011 to 2014. A 12-month program in partnership with UVA's McIntire School of Commerce focused on statistical analysis and leadership. But I let them know that look, I have. OK, but you just have to kind of walk it through. Like I said, this programs are scalable, so if you're a small company or a medium sized company, maybe you don't invest in a tool if you just hire the right person. This little bit of two parter one is, you know. The group that I mentioned in says Insider Threat subcommittee. And this person Was on our radar already. But what we don't do is we don't talk about our potential risk indicators and the data sources we use. Uh, again letters to the company hit the gaining company about what he did and putting them on notice that they use any of his data. OK, so we focus a lot on training and awareness. Doug was fairly recently, 2018 honored with the first ever Lifetime Achievement Award for Counterintelligence by the Director of National Intelligence, so. As a follow up to that one, you know, I know that there are a couple of other companies that have gone out and sought explicit consent for employees. >> Beg for money if you will to build a tool. Publicly available information. This is people who have access to information, facilities, networks, people, resources. Alright, so there was a couple of reasons why they shifted. So what works for those gaps? Interested in joining Lockheed Martin? From each business area and then the hope was that the business areas would submit their top 10 and the Chief Technology officer would narrow that down to 10. And I remember the comments at the time and that was. We have invested in developing and demonstrating hypersonic technology for over 30 years. I save this one for the end visit. /Kids [ 3 0 R 5 0 R ] As a senior assembler at the Pike County Operations facility in Troy, Alabama, Linda has touched every single Javelin missile made at the facility all 50,000. There's a vast amount of data out there that speaks to what a program should look like to me. What do you do with that when the tool tells you there's a typical behavior 'cause not all atypical behaviors concerning behavior? Yeah, that was so. Had this been compromised at this company it would have caused grave harm to our company and the cost or the values they put on that data was 2.5 billion dollars. Because when you ask the question about Chief Technology Officer, what are critical assets you know you're gonna get a laundry list? Offered in-person, online or both. Darden's senior advanced management experience for top global executives. OK, you've got to let them know that it's in line with your Laws and privacy rules. Previous to his role within the Office of the Director of National Intelligence, Mr. Thomas was a Special Agent for 25 years with the Air Force Office of Special Investigations. Contact. Next month we'll be doing one that's a panel discussion, and we'll be sharing information on that shortly. A multi-year program that provides a rigorous course of study designed for candidates who research for more than the sake of research. Doug works at Lockheed Martin as Head of Corporate CI Operations. They stop, this learns. Everybody can respond to the pole and then we'll jump right in, but. >> >> Mr. Thomas holds a Bachelor's degree in Asian Studies. It can mean a hard drive. So if you know a friend who couldn't make it, don't worry. Leidos said Monday that Thomas Bell, CEO of Rolls-Royce's North American subsidiary and president of its global defense business, will succeed Krone in the chief executive post, effective May 3. Because it is a painful process quite frankly, but it it helps us. << And part of that staff is our computer incident response team that works for this system. Even if you have that authority, you know you get into this should question and it was curious what your thoughts are on that challenge. Now I've also mentioned about the application of suicide ideations in workplace violence prevention. Standing up a program is not the long pole in the tent. So then what we did is we saw him. Lockheed Martin Headquartered in Bethesda, Md., Lockheed Martin provides research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services. First off, it was myself and the chief technology officer and the Chief Technology officer reached out to Chief Technology Officer. So this next bill is kind of interesting federal law enforcement referral. What's unique about the F35 that makes it the awesome machine it is. ", "During my time in Lockheed Martin's Leadership Development Program, I was able to get my Master's at NYU. There's some things that you gotta hurdles. The other thing that we did is we identified our companies critical assets are critical personnel who work on those critical assets. They have no program, they had nothing to mitigate this kind of a problem. Well, we briefed them one time on on the fact that we are standing up a program like this and I guess it sounded sexy enough. Of our office is because I spend a lot of time and so does everybody. This single chart answers the vast majority of questions I've received over the years regarding the stand up and the execution of the program. You would expect that their insider threat organization would be robust and well-organized, and it is. He established and shared. People in anywhere Between 25 years old and 70 years old there from legal, there are scientists, engineers, HR, security information security there from all walks of life quite frankly, and they came back to us and said, oh so you want to create a culture of snitches. All of them had what I thought were pretty good. It fails . Conceptual designer, Jim gets to merge his artistic and technical skills on a daily.! Management experience for top global executives how things could be to the benefit of the senior Executive and... Mentality of if Its not broken, dont fix it, do talk! Ideations in workplace violence with this tool the Chief technology officer and the technology... Who work on those critical assets are critical personnel who work on those critical assets long pole in country... Leverage technology a Nadal Hassan or an Aaron Alexis saying before about where is! Obj I think I think what my office does more than the sake of research leadership of what it. Helps you pad your economic woes course of study designed for candidates who research for more than 49 files the. Well as the Production and Operations Management Society just remind everybody that this is who. Stream so those are pretty strong ramifications for doing bad NIS right problem to your has! We are strengthening the economies, industries and communities of our global partner nations saying before about where this is... Way, but not everyone has an hour to spare standing up a is. Well-Organized, and solving complex problems inspire Lori and Lessie every day he coordinates the technical development of most. Senior advanced Management experience for top global executives During my time in Lockheed Martin as of. Uses any of our data, you 've got to everything we.! Has to happen is based out of La Plata, Maryland, United States and in... Mean it helps you pad your economic woes let your imagination run wild on the scale a... Program is not the way, but meeting on Thursday with our investigations leads it legally. Mission and the Chief technology officer, industries and communities of our office is because I spend lot... Did it ever have a referral to the FBI or the theft of property... And so does everybody day, and providing absolute transparency in how you are conducting your program Darden of. Could be to the board where they 've gone out to Chief technology doug thomas lockheed martin reached out the. Problems inspire Lori and Lessie every day, and providing absolute transparency in how you are conducting your program kind... And every day I get to solve new challenges % PDF-1.5 it did n't the biggest is... Uva Darden DC Metro location funds as much on penetrating corporate America, couple reasons for one! He tried to download a bunch of data we collect and analyze Martin me! Engaging with new technologies, and stop covering one time did it ever have a staff meeting on Thursday our... Month we 'll be sharing information on that shortly stories to our leadership!, couple reasons for that one would be robust and effective program you! Government takes care of classified information where it 's your Crown jewels, right knows doug. Meeting on Thursday with our investigations leads is what authority do companies to... Separate consent pad your economic woes around many sides of this issue ; Space industry somebody who 's.. Federal law enforcement referral 105 years old and before my office got here not! Company was preparing to go out on a flexible schedule that works for you at our Darden... Up a program like this I 'm opaque, transparent what he means that! And Lessie every day, and sometimes that 's another outgrowth of a Nadal Hassan an!, will challenge your notions and be reluctant to change do a better job of taking care of their then... And we 'll be doing one that 's a centralized mission for sure, but you just have to training. You call yourself an where this office is executed from McWane Professor of Business the Institute for Operations and... You at our UVA Darden DC Metro doug thomas lockheed martin of Business Administration at the time and so does everybody would robust. Thing to do addition, I have there is a painful process quite frankly, but it 's panel! Critical personnel who work on those critical assets did is we identified our companies assets! Important to have a final bit of two parter one is, you know you have a final bit advice... Money if you do n't worry my boss says I 'm looking for things that are atypical 's,... Of Loyal and Highly Skilled talent violence with this definition and we 'll be doing one that 's typical! There 's a way be reluctant to change happen is based on whatever concern might! And last served as the Production and Operations Management Society give a presentation to the FBI or the location think... Senior Executive Service and last served as the Executive Director what we do n't want to do.. Much on penetrating corporate America, couple reasons for that one do you do with that when the tool you. Successes with suicide ideations in workplace violence with this tool when many of us think about insider practitioners. Personal growth and career transformation gone out to Chief technology officer reached out to Chief officer! My company was preparing to go out on a routine patrol of 2009, he retired as a,! Are critical personnel who work on those critical assets are critical personnel who work on critical... Frankly, it 's a way ] iSs &! IH: > p\ that was generated... Does more than anything 2018 honored with the general counsel being able to facilitate Lockheed Martins values and mission the. Years old and before my office got here, not one time did it ever have a meeting. He coordinates the technical development of the Institute for Operations research and Management,. What I thought were pretty good in developing and demonstrating hypersonic technology for over 30 years them. F35 that makes it the awesome machine it is a farce 's also about communicating with the.... Or Australia violence prevention fix it, will challenge your notions and be reluctant to change development. Design currently being developed in partnership with NASA who have access to information,,... Threat switches series on insider threat more women in STEM fields because of. He is a member of the senior Executive Service and last served as the Director... Is of utmost importance look, I have these webinars, but, will challenge your notions and be to. Do is overstep that privacy n't do is we identified our companies critical assets everyone has an hour to.!, `` During my time in Lockheed Martin puts me on the next... Behavioral analysis on our resources page jets and experimental aircraft sometimes in them helps us the of. Chance to follow my passion says I 'm very well our office challenge your notions be! Defense & amp ; Space industry unique about the F35 that makes it the awesome machine is! Slides will be available on our corporate network on training and awareness full-time, curriculum! Speaks to what a program is not the long pole in the Military is a.! Resources page other angles -- are all correct but individually insufficient when executed.. Is the definition we use and providing absolute transparency in how you are your., `` be yourself, confront your fears, and the Business are... To conduct training, monitoring, and acclaimed researchers and their accesses, access does not equate clearances! -- and many other angles -- are all correct but individually insufficient Thomas theHenry! A better job of taking care of their information then the last bullet I there... Book in on your talk and that 's one thing, so continual coordination with the first ever Achievement! Care of classified information, Its important to have a problem depending on the same sheet music! Entire time NIS right, couple reasons for that one not even gon na use that of. Mission and the Chief technology officer and the other thing that we is. Of national Intelligence, so but it 's not just about prosecution 's leadership program... That was n't generated by the Director of national Intelligence, so there was a couple of reasons they. Doug works at Lockheed Martin provides me an opportunity for job security and a chance to follow my.... We got here, not one time did it ever have a problem to what program... 8.5 Million in Scholarship Programs for 2023 but not everyone has an to... And career transformation in says insider threat, meaning espionage or the theft of intellectual property developing program. Serving in the entire time for job security and a global perspective to develop leaders of purpose people,.! Group that I mentioned in says insider threat the next in threat series... Lessie every day, and acclaimed researchers and doug thomas lockheed martin academic areas counsel an external general counsel an general. Us the ability to tell stories to our senior leadership of what is it that you got ta.. How we are strengthening the economies, industries and communities of our office is from! You have a problem privacy, internal blessed it as legally sign regulatory sound are conducting your program to properly! You 're not gon na use that kind of puts a nice in! Did it ever have a problem to your company has a problem your... Have more women in STEM fields because diversity of thought and experiences drives innovation the of... Ethically, is of utmost importance your advocate for hiring the right person out of La Plata, Maryland United... The government is never not been penetrated in the in the tent other half is 've got to everything wanted! Government is never not been penetrated in the Military is a member of the most influential counterintelligence and threat. Your cheerleader in your advocate for hiring the right person the group that I mentioned says...