Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & Training

5 Minutes With

5 minutes with Teresa Shea: Avoiding cyberattacks

By Layan Dahhan
SEC_Web_5Minutes-Shea-0122_1170x658.jpg
December 6, 2021

Teresa Shea, Vice President of Cyber Offense and Defense at Raytheon Intelligence and Space, talks to Security about her journey through security and how to stay on top of security threats. She discusses the overlap between national and enterprise threats and offers ways to avoid cyberattacks.

Security magazine: As VP of cyber offense and defense, identifying emerging security threats is key. Tell me about how to identify these threats early on?

Shea: The thing that I think we all need to acknowledge is that we all have bad actors in our network, so you have to assume you’ve been hacked. Understanding both the threat actors, their intentions, what their motivations are — because there’s a numerous suite of motivations and it’s good to understand whether they’re there for espionage, criminal activity, to make money, to have some sort of political influence. All of these are intentions and understanding that intention really helps you to better protect against those kind of attacks or, assuming you’ve been attacked or you have a bad actor in there, trying to contain that attack. Raising the bar on the bad guys [and] making it harder for them, that’s really what you want to set out to do.

[Also], keeping up with this ever-increasing attack surface. As you know, with the emergence of the high speed 5g/6g networks and the interconnectivity of just about every device you can imagine, you are going to have so many attack vectors available to cyber actors and it is just too easy for them to find a vulnerability because software is inherently vulnerable. The President had issued an executive order to try and address some of these things at their core, and that’s moving in the right direction, but as we’ve seen this year in particular, we’ve had a very bad year with attacks on our supply chain. Supply chain attack vectors in particular provides access to multiple other vectors. It’s like a front door into [a] multitude of other vectors. So protecting against supply chain attacks in our commercial software that we use every day? That's really hard for us as users to be able to do. We really are relying a lot on the commercial industry to step up their game and do more in in protecting against those attacks. 

The other one I wanted to mention, with the Colonial Pipeline attack and what’s happening in that space in terms of the ratcheted up attacks against our critical infrastructures. What you’ve seen from that is that can spill over into everyday life for individuals and cause a nationwide response in terms of concern and panic. Sometimes I think we forget where that originated from — we all need to be constantly vigilant and always be reminding everyone, “Don't click on that link.”

Security magazine: Let’s talk about the difference between national threats and enterprise threats? Are there different methods when dealing with each type?

Shea: That’s an interesting question because there is this overlap between the two. I think when you say national threats, you may be talking about nation-state attacks for a variety of reasons — we’ve seen nation-state attacks with disinformation, we saw that in our presidential elections, we’ve seen that work successfully for the adversary. Those are national attacks that then have an effect on us as a nation and are very concerning, but spilling over into these enterprise threats. 

As we get more and more interconnected, it’s going to be hard to distinguish between the two in the future…Because those attack vectors, once they’re out there, became more and more publicly available for every individual that’s got access to the internet.

Security magazine: When do national security threats become enterprise security risks and vice versa? What kind of like implications are we talking about at the enterprise level?

Shea: Serious implications. If you think about how we just take our critical infrastructures for granted — turn on your water, you expect water to come out, right? You turn your lights on, you expect your lights to come on. We were just talking about our aviation supply chain and how vulnerable that is. Hopefully soon, we’ll all be getting in planes again without much of a worry about the pandemic, but then you still always have this concern about, “How secure is this?” There’s an overlap between the physical and cyber space here, because cyber can have an effect on the physical outcome. You can’t really have safety without security and that security, what is now becoming fundamental, is the cybersecurity. Everything not connected today, soon will be in some way, shape, or form. 

…[Then] it’s much broader and the attack vectors continue to grow.

Security magazine: What are some ways to avoid or defend against emerging threats?

Shea: Assume that you have been attacked. Just behave like you’ve got a bad actor in your network and constantly be vigilant about trying to know who’s accessing your data and what devices [you’re] connected to. Do you care and is there something you need to be doing about that? Is there some action you need to be taking? 

What we constantly are pushing is this idea of, “You must have resiliency.” Yes, it’s good to have that awareness of understanding the threat landscape at a high level, but in terms of getting down to all multitude of possibilities of how you could be attacked, you need to do some basic things to protect yourself: use two-factor or multi-factor authentication; always make sure you’re installing the latest operating system; make sure that your supply chain [and] commercial vendors that you’re using are patching when the known vulnerabilities come out; keep yourself trained up on what the latest attacks are with these phishing schemes and how they’re even taken advantage of.

The above transcript has been edited for clarity.

To hear much more from this conversation, listen to The Security Podcast with Teresa Shea here.


KEYWORDS: 5 minutes with cyber security cyber threats phishing attack risk mitigation security leadership

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Layan Dahhan is a multimedia content specialist for BNP Media. She works with Refrigerated & Frozen Foods Magazine, Industrial Safety and Hygiene News, Quality Magazine and Security Magazine. She was a member of CNN Academy’s inaugural class and has a Master of Science in Journalism from Northwestern University.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Person holding cellphone

Millions of Android, iPhone Users Could Be Sending Data to China

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5_minutes_with_Jaros_1121_900px.jpg

    5 minutes with Stephanie Jaros: Identifying and addressing insider threats

    See More
  • Kathleen Kotwica

    5 minutes with Kathleen Kotwica – Challenges in security research

    See More
  • SEC_Web_5Minutes-Perini-0122_1170x658.jpg

    5 minutes with Pamela Perini: The process of risk assessment

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • highriseproductphoto

    High-Rise Security and Fire Life Safety, 3rd edition

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!