Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementProfiles in Excellence

At the Intersection of Business, Analytics and Security

From government and finances, to utilities and payments, to security: Anne Marie Zettlemoyer of Mastercard has done it and seen it all.

By Maria Henriquez
SEC0819-Profile1-Feat-slide1_900px

Zettlemoyer takes part in the SheLeadsTech™ program, which seeks to increase representation of females in technology leadership roles and the tech workforce.

August 5, 2019

A recent (ISC)² study reported that in 2018, women made up 24 percent of the global cybersecurity workforce, an increase of 13 percent from 2017. Though the number might seem small, it is mighty: more women are joining a field that has traditionally been dominated by men, and they are seeking and asserting themselves at the top of the leadership pyramid. Anne Marie Zettlemoyer of Mastercard is one of those individuals.

Zettlemoyer is Vice President of Security Engineering at Mastercard, the multinational financial services corporation, headquartered in New York, with more than 13,000 global employees in more than 105 offices across the world. She is responsible for Mastercard’s security by developing effective and sustainable solutions that can enable millions of customers to “transaction” safely.

Previously, she held positions such as Principal Strategy Analyst at DTE Energy, Special Advisor to the United States Secret Service and Senior Consultant of Strategy and Operations at Deloitte, Inc. She is also part of the Board of Directors at SSH Communications Security and is a Visiting Fellow at the National Security Institute, George Mason University.

What does Zettlemoyer attribute to her professional success, and what can future security leaders, both men and women, learn from her?

 

Crisscrossing to Security

Zettlemoyer has worked in eight industries in a variety of roles and has restructured companies, built profitability models, developed research on statistical and risk analysis and has led enterprise-wide IT and business transformation projects.

And then came an opportunity to solve a large task at an established utility company: payment issues and recovering and protecting revenue, and from there to updating payment systems and programs.

There, in addition to her role with the U.S. Secret Service, is where the ‘security bug’ bit Zettlemoyer, resulting in what she calls “a genuine love” for protecting people and business, while nerding out security protocols and analytics. 

 

Security Hygiene

At Mastercard, the backbone of where millions of transactions take place every second of the day, Zettlemoyer is ensuring security hygiene by advocating for a mastery of the basics as an enabler of cutting edge technology. To mitigate security threats, Zettlemoyer believes that security enterprises need to focus on their security hygiene, which she notes are the “building blocks” of security.

“The basics are absolutely fundamental. Many times we get distracted by what might be sexy in the marketplace, but if we don’t solve the basic problems like access control, key management and visibility within our network, then whatever is built to protect those assets is not going to be very effective,” she explains.

She adds that the adoption of security hygiene requires high trust and confidence. “We take that responsibility very seriously,” she says. “We are not there to exist because of ourselves, but to protect and enable the business to achieve what it needs to and do so safely. Not just for Mastercard to transaction safely, but for the ecosystem. It’s about all end-point and every part of the ecosystem that we touch. We recognize how important that space is.”

 

Building the M team

According to Zettlemoyer, ensuring security hygiene encompasses having the right type of people on your team.

“I had a peer tell me he was building his team of experts,” Zettlemoyer explains. “I asked him, how is that working out? It wasn’t going well. He was looking at what I call, I-shaped folks, people who are experts in one area, but are very narrow and very deep in one subject area, meaning their perspective is limited. That can be powerful for the problems that apply to that perspective, but those types of problems are rare and teams may have trouble relating to each other.”

A step beyond I-shaped are T-shaped people who are still very deep in their knowledge area, but “they also have understanding (if you think of what a T looks like) of what it means to bridge other concepts. They have two pieces that reach out to other sides,” she says.

The ideal team, for Zettlemoyer, means leaders who are M-shaped people, or, those who are, “deep in a couple of areas and fairly deep on others,” she says. To Zettlemoyer, that signifies humility, curiosity, passion for craft to not only focus on one singular thing, but to be curious of what other areas might be affecting that initial focus. “A good mix results in powerful, innovated and multi-faceted solutions that work,” she says.

When a team is very homogenous in their backgrounds, it can get difficult, Zettlemoyer admits. “You need folks who look at a problem and come with other tools to help solve it. The very teams don't comprise of people who have had years and years of academics in cyber because cybersecurity did not come up in the academic world until recently. Many of us are self-taught, peer-educated practitioners. We come from all backgrounds, from pianists to electrical engineers and even accountants like me, but it is that diversity and creativity of thought and logic that makes people very powerful,” she says. “To me, it doesn’t matter where you came from, if you have that skillset, the aptitude and passion for security, then I want you on my team.”

 

Women in the Security Industry

The same passion Zettlemoyer looks for when building her internal team at MasterCard she also applies to helping advance and support other female executives in the security industry. "Success by its definition is challenging for anybody to achieve. Achievement is not something that is easy for everyone," she says. 

“As a female executive, there are certainly unique challenges to overcome, as there would be for anyone who doesn't fit a "traditional mold" in an environment,” she adds. “Unconscious bias or judgment on how you look or are perceived can be an obstacle. My advice is to not give up. Through perseverance, hard work, patience and giving people the benefit of the doubt, we can build relationships to overcome unconscious bias that we all experience, regardless of why we are different from each other. By making sure I am prepared and always seek to understand the perspectives of others, I can ensure that my own voice is heard and respected as well. If we can talk with each other and not over or at each other, eventually that unconscious bias is overcome.”

Aside from mentoring, coaching and supporting colleagues in her free time, Zettlemoyer also takes part in the SheLeadsTech™ program, which seeks to increase representation of females in technology leadership roles and the tech workforce. “Mentorship is important, and it’s especially important for women in the industry,” she says. “We need champions and environments that can highlight our work, so that society is shown diverse examples of achievement and contribution. Part of the responsibility of being in a good place in your career life is to ensure as best you can that you are an example for others and that you help others get to where they want and need to be. SheLeadsTech™ is part of those wonderful programs that not only highlights women, but serves as a place where you can see examples of leaders you can relate to and see what is possible. They support women in technology through training, education, global alliances and leadership roles.”

Zettlemoyer challenges cybersecurity leaders to embrace “craftsmanship” in their work by implementing a mindset of understanding the organization that they are trying to defend, the threat landscape they’re operating in, and what they need to do to be creative, persistent and ‘partnering’ enough to build solutions and capabilities that are sustainable and effective.

“Show the people on your team that they can really challenge you and your thinking to bring perspectives in that can round out your solutions,” she says. “If everybody looks the same way, thinks the same way, and solutions the same way, then we will continue to be where we have been for years. Make sure your team is well equipped, not just with tools, but with perspectives.”

KEYWORDS: cybersecurity public and private security security career

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber handshake

    New opportunities at the intersection of physical and cybersecurity

    See More
  • 5G and IoT security

    The intersection of 5G, security and IoT 2.0

    See More
  • 5 Minutes with Chokshi

    Pay Attention to the Intersection of API Security and AI Proliferation

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!