Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementLogical Security

5 Minutes With

The importance of security hygiene

By Rachelle Blair-Frasier, Editor in Chief
5 Minutes With Logo Zettlemoyer

Image via Zettlemoyer

June 19, 2023

Cyber attackers know most organizations have visibility gaps, which is why it is important for security leaders to know as much of the attack surface and their assets as possible.

Here, we talk to Anne Marie Zettlemoyer, CISO at attack surface management platform, CyCognito, about security hygiene and what it means to CISOs.

Security: Where has your career path taken you over the past 25-plus years? 

Zettlemoyer: I have an MBA from The University of Michigan — Ann Arbor — and my undergrad majors were in Finance and Accounting. I’m a Wolverine twice over. I have two certifications as well: CISSP and CeH (Certified Ethical Hacker). 

My first security job was in D.C. I was recruited from graduate school by the Secret Service as a Special Advisor to the Director.  

They were looking for MBAs, and specifically for people who were strong in strategy and execution. They wanted people who could solve tough business and operational challenges, in even tougher settings. My accounting background was a surprisingly good fit for security. If you think about it, accounting and security have a lot of overlap. You have to be able to build robust, dynamic systems that are trustworthy and resilient to fraud and abuse. Principles of continuity, resilience, separation of duties and even the good old “security” triad of Confidentiality, Integrity and Availability — are all tenets of accounting curriculums. Finance is heavy on building predictive models, managing risk and reward — and security is a risk equation. 

I continued my work with various government and commercial clients while at Deloitte, then made the pivot into Mandiant, Capital One, Freddie Mac and then later became the Divisional Security Officer for Digital at Mastercard. 

Now, I’m excited to be with Cycognito as CSO. I joined the company because I was so impressed by their risk-based approach to security.

Security: How has the enterprise cybersecurity threat landscape evolved during recent months?

Zettlemoyer: Enterprises are increasing their understanding of the types of threat actors and their motives. That’s become their focus. 

Before, most conversations were centered around just data breaches, but now we're seeing growing concern over a broader set of threats, like espionage, access-as-service, ransomware, destructive attacks, hacktivism, etc.

Threat actors pursue targets for a variety of reasons, including persistence to sell their access to other threat actors. It's not just “break in and steal data or money” anymore. It's also increasingly, “break in, see what's there, build a back door and sell the access so others can get what they want.” They want to get in and stay undetected, carefully exploring every attack path to find a big payoff to accomplish their goal or sell the capability to another. 

Another thing that’s changed is threats can come from anywhere. Nation-state cybercrime has become top-of-mind. From any corner of the world, bad actors can sabotage or paralyze your operations.  

Whether it’s a nation-state threat, the teenage hacker who wants to flex by pranking a large company, or a widespread vulnerability like Log4j, one thing is certain: we’ve all changed how we look at risk, including governments.   

This has put a spotlight on security hygiene and third-party risk in a very real way. For organizations, it means we should all double down on visibility, get to know the lay of the land, and understand attack paths. We have to know what an intruder can do once they are able to get in. And we have to prioritize threats, because we’re inundated with alerts, and many of them turn out to be false positives.

Security: What does security hygiene mean to CISOs?

Zettlemoyer: In the simplest form, security hygiene is knowing as much of the attack surface and your assets as possible, and the profile, access rights and purpose of each asset. Security hygiene requires you to map it as fully as you can, and keep it clear and understandable. It’s vital to know what the assets you use are connected to — with an up-to-date view, and ongoing asset management that you keep tuned to the company’s risk tolerance. Robust security hygiene gives the CISO and security teams confidence, clarity and credibility.

Attackers know that most organizations have visibility gaps. They seek to take advantage of blind spots, and they only need to be right once. Even attackers with basic skills can use cheap tools and get lucky. Security hygiene requires doing full enumeration and handling all the foundational essentials.  

Security: What security leadership lessons have you learned in your career?

Zettlemoyer: We have to be the calm voice in the storm. Leaders don’t panic or spread FUD. Under duress, great leaders focus on trust and execute on the responsibility we have been given.

You will never know everything, and your decisions about the business can’t be made in a vacuum. We can’t presume to know all the inner workings of the business or why their decisions are made. We can’t be in every conversation — nor should we be.

Partner with your line-of-business colleagues to define strategy and what needs to get done. Invariably, you will learn a lot from them about their business. 

Our job is to provide the best possible guidance and expertise and help the business make the best decisions on managing its risk. Collaboration is the key to achieving this.

Separate, yet related: another lesson I’ve learned over the years is that talent is evenly distributed but opportunity is not. An employee with talent and ability may be languishing in a role they’ve outgrown, through no fault of their own. Aptitude, interest, curiosity and opportunity can lead to game changing outcomes. When I think of the best practitioners I know — none of them have uniform paths, they are all different, and very few came up in what we would consider “the traditional sense” of IT degrees alone. 

Security: Do you have advice for security professionals moving into leadership roles?

Zettlemoyer: It is tough to go from hands-on roles to management. New managers often want to step in and grab hold of the steering wheel because they are used to having direct control. 

Know when to stand back and let others swim. Leading people is different from always being the hands-on implementer — most of the time, it means getting out of your team’s way. Jump into the trenches only when your judgment tells you that’s better than giving directives. 

For new leaders, training is critical. For example, a CISO knows a lot about technology but also is tasked with knowing how security impacts the business. The business side of things isn’t always obvious to someone stepping into that role for the first time. Many CSOs and CISOs run into this issue.

Listen to your colleagues. Have conversations with other executives in the organization. You’ve walked the walk to get where you are; now you’ll also have to “talk the talk.”

Finally, once you move into a leadership role you are responsible for the professional growth of others; not just your own. Helping people develop in their careers is one of the most rewarding aspects of being a leader. It’s an exciting change, a new kind of responsibility, and doing it well brings its own sense of accomplishment.

KEYWORDS: CISO leadership cybercrime data breaches nation-state security ransomware third-party risk

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rachelle blairfrasier headshot white

Rachelle Blair-Frasier is Security magazine’s Editor in Chief. Blair-Frasier handles eMagazine features, as well as writes and publishes online news and web exclusives on topics including physical security, risk management, cybersecurity and emerging industry trends. She helps coordinate multimedia content and manages Security magazine's social media presence, in addition to working with security leaders to publish industry insights. Blair-Frasier brings more than 15 years of journalism and B2B writing and editorial experience to the role.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Mental Health Awareness

    Guarding the guardians: Importance of mental health for security personnel

    See More
  • Lynn Dohm, Executive Director of Women in Cybersecurity

    The importance of inclusion

    See More
  • Event Security

    Ensuring safety and success: The critical role of event security

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!