Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & Training

5 Minutes With

5 minutes with Teresa Shea: Avoiding cyberattacks

By Layan Dahhan
SEC_Web_5Minutes-Shea-0122_1170x658.jpg
December 6, 2021

Teresa Shea, Vice President of Cyber Offense and Defense at Raytheon Intelligence and Space, talks to Security about her journey through security and how to stay on top of security threats. She discusses the overlap between national and enterprise threats and offers ways to avoid cyberattacks.

Security magazine: As VP of cyber offense and defense, identifying emerging security threats is key. Tell me about how to identify these threats early on?

Shea: The thing that I think we all need to acknowledge is that we all have bad actors in our network, so you have to assume you’ve been hacked. Understanding both the threat actors, their intentions, what their motivations are — because there’s a numerous suite of motivations and it’s good to understand whether they’re there for espionage, criminal activity, to make money, to have some sort of political influence. All of these are intentions and understanding that intention really helps you to better protect against those kind of attacks or, assuming you’ve been attacked or you have a bad actor in there, trying to contain that attack. Raising the bar on the bad guys [and] making it harder for them, that’s really what you want to set out to do.

[Also], keeping up with this ever-increasing attack surface. As you know, with the emergence of the high speed 5g/6g networks and the interconnectivity of just about every device you can imagine, you are going to have so many attack vectors available to cyber actors and it is just too easy for them to find a vulnerability because software is inherently vulnerable. The President had issued an executive order to try and address some of these things at their core, and that’s moving in the right direction, but as we’ve seen this year in particular, we’ve had a very bad year with attacks on our supply chain. Supply chain attack vectors in particular provides access to multiple other vectors. It’s like a front door into [a] multitude of other vectors. So protecting against supply chain attacks in our commercial software that we use every day? That's really hard for us as users to be able to do. We really are relying a lot on the commercial industry to step up their game and do more in in protecting against those attacks. 

The other one I wanted to mention, with the Colonial Pipeline attack and what’s happening in that space in terms of the ratcheted up attacks against our critical infrastructures. What you’ve seen from that is that can spill over into everyday life for individuals and cause a nationwide response in terms of concern and panic. Sometimes I think we forget where that originated from — we all need to be constantly vigilant and always be reminding everyone, “Don't click on that link.”

Security magazine: Let’s talk about the difference between national threats and enterprise threats? Are there different methods when dealing with each type?

Shea: That’s an interesting question because there is this overlap between the two. I think when you say national threats, you may be talking about nation-state attacks for a variety of reasons — we’ve seen nation-state attacks with disinformation, we saw that in our presidential elections, we’ve seen that work successfully for the adversary. Those are national attacks that then have an effect on us as a nation and are very concerning, but spilling over into these enterprise threats. 

As we get more and more interconnected, it’s going to be hard to distinguish between the two in the future…Because those attack vectors, once they’re out there, became more and more publicly available for every individual that’s got access to the internet.

Security magazine: When do national security threats become enterprise security risks and vice versa? What kind of like implications are we talking about at the enterprise level?

Shea: Serious implications. If you think about how we just take our critical infrastructures for granted — turn on your water, you expect water to come out, right? You turn your lights on, you expect your lights to come on. We were just talking about our aviation supply chain and how vulnerable that is. Hopefully soon, we’ll all be getting in planes again without much of a worry about the pandemic, but then you still always have this concern about, “How secure is this?” There’s an overlap between the physical and cyber space here, because cyber can have an effect on the physical outcome. You can’t really have safety without security and that security, what is now becoming fundamental, is the cybersecurity. Everything not connected today, soon will be in some way, shape, or form. 

…[Then] it’s much broader and the attack vectors continue to grow.

Security magazine: What are some ways to avoid or defend against emerging threats?

Shea: Assume that you have been attacked. Just behave like you’ve got a bad actor in your network and constantly be vigilant about trying to know who’s accessing your data and what devices [you’re] connected to. Do you care and is there something you need to be doing about that? Is there some action you need to be taking? 

What we constantly are pushing is this idea of, “You must have resiliency.” Yes, it’s good to have that awareness of understanding the threat landscape at a high level, but in terms of getting down to all multitude of possibilities of how you could be attacked, you need to do some basic things to protect yourself: use two-factor or multi-factor authentication; always make sure you’re installing the latest operating system; make sure that your supply chain [and] commercial vendors that you’re using are patching when the known vulnerabilities come out; keep yourself trained up on what the latest attacks are with these phishing schemes and how they’re even taken advantage of.

The above transcript has been edited for clarity.

To hear much more from this conversation, listen to The Security Podcast with Teresa Shea here.


KEYWORDS: 5 minutes with cyber security cyber threats phishing attack risk mitigation security leadership

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Layan Dahhan is a multimedia content specialist for BNP Media. She works with Refrigerated & Frozen Foods Magazine, Industrial Safety and Hygiene News, Quality Magazine and Security Magazine. She was a member of CNN Academy’s inaugural class and has a Master of Science in Journalism from Northwestern University.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5_minutes_with_Jaros_1121_900px.jpg

    5 minutes with Stephanie Jaros: Identifying and addressing insider threats

    See More
  • Kathleen Kotwica

    5 minutes with Kathleen Kotwica – Challenges in security research

    See More
  • Meredith Wilson

    5 minutes with Meredith Wilson – How to prepare for geopolitical risks

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • November 17, 2025

    SECURITY 500 Conference

    This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!