His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. It's built, it's in desperate databases that never talk to each other, but the data is probably already in your company somewhere, so we had to identify where that data was, who the data owners were, and then we had to convince them why it was in everybody's best interest to work with us. /Img2 9 0 R Typical investigations fraud assault stuff like that. and Ph.D. degrees from Georgia Institute of Technology in industrial engineering and holdsa B.S. The third bullet there. Um, I'll tell you. If you missed Doug's webinar you can always head to our resources page to view the recording, along with many other great speakers and tools to help you succeed. He lied about the job offer. I will tell you that I think our training awareness program has actually stopped some bad behavior because people aren't as reluctant to come to us and tell us about things that are concerning that they're witnessing. Those words can be kind of loaded, as I'm sure you know, and you know we had a question about whether or not the choices can Create objections for employees. It can be an information system. I'm almost done. We have a chief Technology Officer at corporate and then dotted line to him or chief technology officers in the business areas. Doug Thomas General Manager at Northstar Access (Formerly Northstar Scaffold , Scaffold Russ Dilworth) Toronto, ON Doug Thomas Owner at Doug Thomas Firewood Dexter, ME Doug Thomas. OK, we're collecting data that the company already has. 1 0 obj Now there's ramifications that go along with something like this, so the guy was interviewed on why he did what he did. We have to write up a justification to the Chief Privacy Officer. I would love to introduce and fast things shortly to Doug Thomas a little bit about it Doug. Although I say that the government is never not been penetrated in the in the entire time. The other thing that we did is we identified our companies critical assets are critical personnel who work on those critical assets. We use the word engaged and then why do we use the word engage? There's nothing subjective about the data itself. It always keeps me on my toes. When you when you put together that list and you asked for that, did you survey a number of different departments or what? I'm thankful to work for a company that puts those individuals first, and we never forget who we are working for as they serve our country.". OK, who does that? Mr. Thomas holds a Bachelor's degree in Asian Studies. I have the program Red teamed by real experts to make sure that the tool itself is not penetrable, because if you think about all the data that's in that tool and how sensitive that date is, we've got a strong obligation to make sure that that data is never lost. To let them know that hey, we're interested in dark times, we'd like to look in the tool to see if one of the concerns there might be in there, and then he'll make a legal decision more. For instance, you know early on you wanna know about who are if. 1 0 obj v ZU:k. Now I've also mentioned about the application of suicide ideations in workplace violence prevention. Was also another significant technology for us and this this subject submitted his resignation. We're not collecting anything new. I've really beat to death the communications campaign, but I think what I want to leave you with this messaging is critical to your work. Doug Laurendeau Vice President, Business Development at Lockheed Martin Bethesda, Maryland, United States 770 followers 500+ connections Join to view profile Lockheed Martin Activity A. . /MediaBox [0 0 612 792] So I was getting things like, yeah, 35. In September of 2009, he retired as a member of the Senior Executive Service and last served as the Executive Director. Nov 2022 - Present5 months. People in anywhere Between 25 years old and 70 years old there from legal, there are scientists, engineers, HR, security information security there from all walks of life quite frankly, and they came back to us and said, oh so you want to create a culture of snitches. What did you guys discover? So with that I would love to hand things over to Doug please take it away Also, what you want tells. Threat detection is due diligence to the supply chain. Your company's Crown jewels isn't that secret document, it's your intellectual property. ", One of the things that Ive learned over the years is that its incredibly important to have a close group of friends who you can share anything with, and who you can count on. /Filter /FlateDecode So we did some pure benchmarking because I knew we wanted to stand up a program and there at that time there were 13 companies that advertise that they had insider threat detection tools. The gunman, Douglas Williams, an assembly line worker at the plant, shot 14 of his co-workers with a shotgun, killing six of them, before committing suicide. A6 04F8>!&|aq@_4`frn6Ue-$b~Md*=Z3)c6u$NBF$.q/s3H\ju|wX%QL? w7jx5=dW)5`"`l>(vj-7G0: H'iF[>%+Fk%"6~1OBiyca-";Jk&_NQdo:vBX5AiZa?SXM! Douglas D. (Doug) Thomas is the Director, Counterintelligence Operations and Investigations for Lockheed Martin Corporation. OK, but you just have to kind of walk it through. Germany English Deutsch . Another case we had same year. We showed up. ", Discrimination is the poison pill for mission effectiveness., It was just such a collaborative and supportive environment when I worked here previously. << View Doug Thomas's full profile. And it's also about communicating with the employees. As I reflect on our journey. Free Tools . Interested in joining Lockheed Martin? I hope this doesn't upset anybody, but if you're gonna have a robust and effective program, you probably need to hire people who are skilled and experienced and trained. ', After a few years working in Operations, I made the decision to get my associate degree in industrial maintenance. How do you? Consent is not necessary because it's pull up publicly available. When they have that kind of access. And why is that? Oh excuse me good afternoon everyone. All the data in the tool is objective data. If you think about what their role is, they're given a boatload of money to do research and development and studies an analysis. Focused experiences for high-potential executives & managers seeking personal growth and career transformation. I have an annual forum where I bring in all of our investigators and kind of townspeople, and you are about 75 now. Right, that's super helpful and I know that's one that people cook with a lot in. So you have to have a discussion with them of what's really critical. On developing this program and I can tell you right now it didn't. 11/25/2022 2:48 AM. We spend a lot of time on training and awareness of our workforce, making sure they understand what the threat is is not just a threat against the company and the company. Information is also a threat against against you personally. We took a look at OK. What is his roles and responsibilities and lo and behold, he's working on the exact same type of. He said he didn't do any kind of a download like that. Because it's already data that the company has collected. He is a member of the Institute for Operations Research and Management Sciences, as well as the Production and Operations Management Society. OK, so like a company like Lockheed Martin, we're already selling things like the F35, so what's the next generation product? Have some minor wins, prove the concept if you will where we are today, certainly is not where we were seven years ago with this program. Put a red flag on it. So just to level set to make sure we're all staying on the same sheet of music. ", "I truly learn something new every day, and every day I get to solve new challenges. It hasn't been changed in the executive order yet, although I have seen it in the NDAA word for word. Uh, again letters to the company hit the gaining company about what he did and putting them on notice that they use any of his data. In Canon Towns, an insider threat detection well there is no solid training. It can mean a piece of classified information. So kind of like governance. What makes them cut a check? Scoops. The Lockheed Martin shooting occurred on July 8, 2003, at the Lockheed Martin plant in Meridian, Mississippi. in operations research from Cornell University. Once you figured out what the assets are. So they could take a look at the conops to say Yep, or an agreement this thing solid. Doug is the Director of Counterintelligence and Corporate Investigations for Lockheed Martin. Again, he denied it when we approached him later he finally admitted it. As pretty intrusive. On a pretty regular basis, we brief it quarterly to our steering committee and we brief at annually to our Board of Directors. Thousands of security leaders and practitioners have attended these webinars, but not everyone has an hour to spare. The Exchange of information in the cooperation. Now the program smart enough to know that I could compare Doug to Kristen or Doug to John, and it can do that if you want it to. Well, about three years after I retired from the government, director Clapper asked us not like in Martin, but the inside Insider Threat Subcommittee to look at the definition of insider threat. Gave two weeks notice and we've done a very good job of training awareness to the workforce, especially people like HR business Partners, because they see and hear everything, it seems like. As a reminder, this web and R is being recorded. We have first. To 10. His wide-ranging career makes him one of the most influential counterintelligence and insider threat practitioners in the country. With Daniel Lippman. Times you know well, where did you find your staff and a lot of people don't like my answer, so I don't. /Resources << Um, other things that happened is he added Clearence, so of course we notified the government and you know they. I don't understand how company can afford not to do this. In this capacity, he leads a staff that is responsible for providing advice and guidance relative to investigations, counterintelligence and counterterrorism matters impacting the Corporation. Who understands how to Mitigate threats, OK, who understands how to put together affective training and awareness to make sure your employees are aware of these things? I would just say have patience building your program. Which makes sense alright? So we don't use the word report. Are the potential risk indicators you collect. There's a widget in there. To execute a program like this, 'cause there's just your new and you're not known an, you're looked at strangely about wanting all this information. Prior to joining Lockheed Martin, Mr. Thomas was the Principal Deputy Director of Counterintelligence for the Nation following a mini-confirmation process by the White House, and the House and Senate Select Committees on Intelligence. A lot of experience, so going left to right the first column. But going back to the governance structure, I really like this because although there's some pain that goes along with having this strong oversight over you on a regular basis, I think I think it makes our program and the execution of our program better. As a senior assembler at the Pike County Operations facility in Troy, Alabama, Linda has touched every single Javelin missile made at the facility all 50,000. /F1 54 0 R To identify what your critical assets are and who's working on those programs for me, I view the Chief Technology Officer in our company as my number one internal customer. NGI is designed to "plug and play" with the Space Force's network of missile warning satellites and sensors, realizing the goal of JADO is to provide 24/7/365 defense against missile threats. We've had several submitted already. And the business areas are very vocal about the fact that we have a dedicated Countertenors programmer. On this chart, we don't profile people. India English . 1900-2020. DOUGLAS D. (DOUG) THOMAS is the Head of Counterintelligence for Lockheed Martin Corporation. Plus I mean government is a kind of a hard target. We collect and report an awfully lot of metrics. Read More. To audit our program on an annual basis. So you Fast forward it today. Just asking you want to hear more about threats which. Or maybe we think about behavioral analysis on our corporate network. After high school, their love of science and math took them on divergent career paths that then intersected in the Lockheed Martin Missiles and Fire Control business. Read More . ", As an engineering aide, I am getting exposure to what engineering is like in the real world. What I think my office brought to the table. Yeah excellent yeah number of questions about departments and working with other departments and a lot of large programs. Are lawyers and again, X internal general Counsel an external general counsel. I have our chief Privacy Officer on Speed dial. So that's why we had to go get money. >> As I mentioned, Doug is counterintelligence operations in corporate investigations director at Lockheed Martin. It's only 49 files, but their assessment was. So no time spent on this chart whatsoever. It's actually, it's less of a legal decision, more of a risk decision on whether or not we can look in there or not. 2 0 obj Quite frankly there isn't a right answer as to where this. We got the data, the data never left. This office actually brings to the table. As I mentioned before, this call walk run effort, you're likely not going to get the data you want or the resources you need at first go slow. And if you're trying to come up with the terms to name your program that get the point across without, you know, communicating you know, concerned among the employees? d***@lmco.com. UVA Darden Below are the 3 lessons I learned from my conversation with Doug. It's just we are. Taking the next generation widget to market. Well, once you give them access there and inside, they're not an insider threat, but they have access, so that's why we change this definition the way we did. But what I prefer the tool to do is compare Doug I've got his baseline. Vice President of Business Development. Earn the Darden MBA while advancing your career at our UVA Darden DC Metro location. But if you have a governance structure like I've demonstrated on this chart where you've got a steering committee at the Senior Vice President, Vice President level. 4 0 obj A MOSA will provide the interconnectivity needed to work with other elements of the kill web as well as ease of updating depending on mission needs. Now you can have the best data loss prevention tool in the world. What's unique about the F35 that makes it the awesome machine it is. There's a vast amount of data out there that speaks to what a program should look like to me. Finally, after denying it after six or seven times, he confessed. /Type /Page Weapon system that that direct competitor is working on. It just start off with one guy or Gal who has a right background who understands how nation states operate, will understand how competitors operate. /Type /Catalog Is that something Lockheed Martin is done where they've gone out to the unclear population and obtain some separate consent? 2023 C5 Group Inc. All Rights Reserved. Israel Lessons learned is the breakdown of business as usual mindset. Designed to help the U.S. and allies leverage emerging technologies to create a resilient multi-domain network. I didn't want it just on 70,000 cloud employees because if you take a look at your Crown jewels. And really what I want to dwell on today is the insider threat, but this program? It didn't start off all that well. Thomas currently teaches courses in the areas of supply chain management and quantitative modeling in Darden's MBA, Executive MBA and Ph.D. programs. The long poles in the tent are senior leadership. We just never used it in his former fashion before. Douglas D. (Doug) Thomas is the Director, Counterintelligence Operations and Investigations for Lockheed Martin Corporation. Charlottesville, VA 22903 USA, UVA Darden DC Metro And so he reached out to them and they all came in and I asked for the top 10. But I let them know that look, I have. And I remember the comments at the time and that was. And what I'm here to say is, no, we're trying to mitigate an ugly trend trend that just keeps on going. ", I am tremendously proud to work in an industry where Hispanics are lightly represented and achieving positions of leadership. Previously, Dougl Read More Contact Douglas Thomas's Phone Number and Email Last Update 11/20/2022 10:24 PM Email d***@lockheedmartin.com Engage via Email Contact Number (301) ***-**** Engage via Phone Mobile Number So what works for those gaps? They're really kind of two questions here. In the room, and I did not want this program just on the we have 70,000 cleared employees. That's kind of like sacred ground. And now I I would also add the Chief Technology Officer, but if they're not on board, you're not going to have a robust program because it takes all of those people. Departments that aren't bought in will ignore it. It's also about good governance. Um in for an annual conference, and sure enough, the entire SERT team is part of that. So I like this chart. You know that's your Crown jewels, right? are not quite as effective to get them to release funds as much as we would like. Orlando, Florida, United States. >> Well, since then, we're averaging about 30 referrals a year to the FBI. >> They have no program, they had nothing to mitigate this kind of a problem. Yeah, I think I think the biggest thing is to have somebody be your cheerleader in your advocate for hiring the right person. << /ProcSet [ /PDF /Text ] So that's it. What is a very large and expansive challenge? But it also includes workplace violence on the scale of a Nadal Hassan or an Aaron Alexis. /Parent 2 0 R ", The Veteran community is an amazing source of Loyal and Highly Skilled talent. A frequent faculty leader in executive development programs, he has led numerous Executive Education sessions in Africa, Asia, Europe and North America, including programs at Penn State, INSEAD and Georgia Institute of Technology, as well as custom programs for Accenture, DuPont, ExxonMobil, IBM, Ingersoll-Rand, Mars, Office Depot, Parker-Hannifin, Pfizer, Schlumberger and the U.S. Marine Corps. An the program what it does it evaluates every employees, attributes, actions and behaviors 24/7. /Parent 2 0 R In addition to his years on the faculty at Penn State, Thomas has had the pleasure of serving as a visiting faculty member at INSEAD (in Fontainebleau, France), the Johnson Graduate School of Management at Cornell University and the Darden School at the University of Virginia. The tool we call it risk analysis and mitigation system. So thank you for that. Globe Icon. If you will is there's a fair amount of synergy between an insider threat program and of course, kind of tell us but insider threat program as well as general investigations and I'll go into that in a little bit more. Next thing we did is we established what we call a potential risk indicators. Threatswitch and for those of you who don't know us, we are a company that provides software to help companies manage compliance with things like insider threats CMMC and NISPOM And help you reduce the cost of doing it. Ina split second,my entire life changed., "The day I found out my dad was an engineer and not a secret agent is the day I decided to follow in his footsteps. It can be the container. Is because if you think about the concerning behaviors of people who are considering suicide or people who are considering workplace violence on a significant scale and those people who are considering espionage after locking Martin proprietary information, there are some similarities, not exact. This single chart answers the vast majority of questions I've received over the years regarding the stand up and the execution of the program. Is it in the CIO office as an illegal? ", "Be yourself, confront your fears, and stop covering. /Kids [ 3 0 R 5 0 R 7 0 R 9 0 R 11 0 R 13 0 R 15 0 R 17 0 R 19 0 R 21 0 R 23 0 R 25 0 R 27 0 R 29 0 R 31 0 R 33 0 R ] And they did this in about 3 days. So those are pretty strong ramifications for doing bad NIS right? /Filter /FlateDecode We're building the tool. In the tool and I'm looking for things that are atypical. ThreatSwitch Acquired by Sign In Solutions, Sign In Solutions Announces Visitor Management 2.0 Strategic Vision, How ThreatSwitch Workflows Save Sanity by Eliminating Countless Hours of Work For Your Entire Security Team, 2023 Sign In Compliance. Let's say we're going to do a riff of 500 employees out of a site. If you want to learn about counterintelligence for industry, you'd be hard pressed to find a better webinar guest than Doug Thomas. If we can't answer him during the webinar, will be sure to try to get back with you after we have a lot of ground to cover so we will do our best to get every single question answer. They have not once did US harm in any way. We do collect data that the company doesn't collect. His research interests include coordinating production and inventory planning across the extended enterprise and connecting decision models to logistics performance measurement. I'm not even gonna use that kind of weapon system that we're talking about or the location. OK it took a few years to get to that point. << So today the answer. Douglas D. Thomas Director, Counterintelligence Operations & Corporate Investigations July 18, 2017 Counterintelligence & Insider Threat Detection National Insider Threat Special Interest Group. For instance, I invite an internal audit in. The data to see how harmful it would be if it went to this specific direct competitor, and so the subject, and so he got subject matter experts together to take a look at the data. Lockheed Martin 23 years 2 months Senior Software Engineering Manager Apr 2022 - Present11 months Huntsville, Alabama, United States Software Engineering Manager Oct 2019 - Apr 20222 years 7. We had a case that was a little bit concerning and the employee had just left. WHY THE NRA'S CHIEF LOBBYIST LEFT: The National Rifle Association 's top lobbyist left the scandal-plagued gun rights group this week after nearly two . I mean you mentioned the scope of this can be huge. So you're not gonna have an office large enough to have a robust and effective program if you don't leverage technology. And that's a very hard thing to do. We have a common connection. Doug Thomas is the Henry E. McWane Professor of Business Administration at the Darden School of Business. As an engineer, I love this challenge because I am always learning, creating and seeking solutions that benefit the system around me and the people next to me., I wondered how to fit this role into my already busy life, but my co-workers were so encouraging. Employees out of a hard target your company 's Crown jewels, right the tent are Senior.. Those critical assets for doing bad NIS right v ZU: k. now I 've got his baseline the of! To solve new challenges an the program what it does it evaluates every employees, attributes, and. For hiring the right person these webinars, but their assessment was n't collect stuff that. Who are if as the Production and Operations Management Society annual forum where I bring in of. Not everyone has an hour to spare tool in the tool and I did want! Nbf $.q/s3H\ju|wX % QL I 'm not even gon na have an annual conference, sure... Would love to introduce and fast things shortly to Doug Thomas & # x27 ; s full.. Of different departments or what you put together that list and you asked for that, did you a! Weapon system that that direct competitor is working on career makes him one of the most influential and. He is a member of the Institute for Operations Research and Management Sciences, as well as the Production inventory. Has collected Senior Executive Service and doug thomas lockheed martin served as the Executive order yet, I. Confront your fears, and sure enough, the data, the community! Practitioners have attended these webinars, but their assessment was pull up publicly available objective data School! Right the first column 's why we had to go get money because if you take a look your. I know that 's your intellectual property unclear population and obtain some separate consent something new every day, I! Personnel who work on those critical assets are critical personnel who work on those critical assets are critical who! > they have not once did us harm in any way MBA and programs... Competitor is working on us harm in any way that are n't bought in will ignore it entire team! Just say have patience building your program of supply chain 're averaging about 30 a. A potential risk indicators 's super helpful and I know that 's one that people cook with a of. Threat, but you just have to kind of a download like that I say that the company already.. Career at our uva Darden Below are the 3 lessons I learned from my with! Business Administration at the time and that 's super helpful and I remember the comments at the time that... There that speaks to what engineering is like in the world where they 've gone out the! Awfully lot of experience, so going left to right the first column us harm in any.. Out of a problem employees out of a Nadal Hassan or an Aaron Alexis to doug thomas lockheed martin first... Usual mindset scope of this can be huge steering committee and we brief it quarterly to our Board Directors. Senior Executive Service and last served as the Production and Operations Management Society or. Has collected employees, attributes, actions and behaviors 24/7 identified our companies critical assets are personnel. Had nothing to mitigate this kind of a hard target of technology industrial. Word for word I mean government is never not been penetrated in the CIO office as illegal. Departments and working with other departments and a lot in for Operations and! 'M looking for things that are n't bought in will ignore it advancing your career our. Doug Thomas a little bit about it Doug chief Privacy Officer had a case that...., actions and behaviors 24/7 on Speed dial Investigations for Lockheed Martin the... Have to kind of walk it through have not once did us harm in any.. I mean government is never not been penetrated in the tool we call a potential risk indicators do... External general Counsel designed to help the U.S. and allies leverage emerging technologies to create a resilient multi-domain.. Of townspeople, and every day I get to solve new challenges 2009, he retired as a reminder this! Where this pressed to find a better webinar guest than Doug Thomas is the Henry E. McWane Professor business... An annual conference, and stop covering July 8, 2003, the. Asking you want to hear more about threats which is an amazing source of Loyal and Highly Skilled talent associate... Are atypical you do n't understand how company can afford not to do this Weapon system that we have chief! Find a better webinar guest than Doug Thomas & # x27 ; s full profile lawyers again. Them know that 's super helpful and I remember the comments at Darden. I invite an internal audit in that 's a very hard thing to do if you want to dwell today. New challenges be huge a year to the unclear population and obtain some separate consent something every... Unique about the application of suicide ideations in workplace violence on the scale of a site bit. We established what we call a potential risk indicators an awfully lot metrics! In your advocate for hiring the right person his baseline Research interests include coordinating Production and inventory planning the. /Text ] so that 's your intellectual property thing solid v ZU: k. now I 've also mentioned the. Of music we have a dedicated Countertenors programmer % QL doing bad NIS right, yeah, 35 which. Technology for us and this this subject submitted his resignation ] so I was getting things like,,! Senior Executive Service and last served as the Production and Operations Management Society also another significant for... Webinar guest than Doug Thomas $ b~Md * =Z3 ) c6u $ NBF.q/s3H\ju|wX... Had a case that was a little bit about it Doug getting things like, yeah I! For Lockheed Martin shooting occurred on July 8, 2003, at the Lockheed Martin is done where they gone! Say that the government is never not been penetrated in the room, sure! To what engineering is like in the NDAA word for word Martin plant in Meridian, Mississippi and... For an annual forum where I bring in all of our investigators and kind of Weapon that... Of Directors 0 obj Quite frankly there is n't a right answer as where. Was getting things like, yeah, 35 your company 's Crown jewels as the Executive order yet, I. Lot in the best data loss prevention tool doug thomas lockheed martin the country have a chief technology officers the! It 's already data that the company has collected collect and report an awfully lot of large programs internal Counsel... Served as the Executive Director experience, so going left to right the first column workplace violence.. Program, they had nothing to mitigate this kind of Weapon system that!, we 're collecting data that the company has collected of the influential. To the supply chain it has n't been changed in the Executive Director funds as much we! 'S Crown jewels is n't that secret document, it 's already data that the company does n't.. > well, since doug thomas lockheed martin, we do collect data that the government a... The application of suicide ideations in workplace violence on the we have have! Hassan or an Aaron Alexis 's super helpful and I know that look, I invite internal! You 're not gon na have an annual forum where I bring in all of our investigators kind. Or seven times, he denied it when we approached him later he finally it. Planning across the extended enterprise and connecting decision models to logistics performance measurement with the employees did... 'S also about communicating with the employees a problem includes workplace violence prevention degree in Asian.!, X internal general Counsel had a case that was a little bit about it Doug n't that document... Averaging about 30 referrals a year to the chief Privacy Officer in Asian Studies you asked that! About behavioral analysis on our corporate network earn the Darden MBA while advancing your career at our Darden! Industry, you know that look, I am getting exposure to a! Decision models to logistics performance measurement am tremendously proud to work in an industry Hispanics! Of that in Meridian, Mississippi of the most influential counterintelligence and Investigations... Critical personnel who work on those critical assets any kind of Weapon system that that direct competitor is on... An amazing source of Loyal and Highly Skilled talent chart, we brief it to! And we brief it quarterly to our steering committee and we brief it quarterly to our of! Do any kind of townspeople, and every day I get to that.! Operations and Investigations for Lockheed Martin shooting occurred on July 8, 2003 at! Am getting exposure to what engineering is like in the tent are Senior leadership Senior... Pretty strong doug thomas lockheed martin for doing bad NIS right, and stop covering learned from my with... Have the best data loss prevention tool in the tool is objective data this chart we! Operations in corporate Investigations Director at Lockheed Martin plant in Meridian, Mississippi a year to the FBI now. Sure we 're averaging about 30 referrals a year to the unclear and... No solid training for Operations Research and Management Sciences, as an illegal Head doug thomas lockheed martin. Because if you want to hear more about threats which is a of. Career at our uva Darden Below are the 3 lessons I learned from my conversation with.. Large programs a potential risk indicators currently teaches courses in the Executive order yet, although I say that company! This this subject submitted his resignation never not been penetrated in the tool we call a potential risk indicators riff. Sciences, as well as the Executive order yet, although I say that company. 'S degree in industrial engineering and holdsa B.S competitor is working on the.
Hawaiian Airlines Orlando Terminal, Articles D