Independent Consulting.
Focused on Security.
With expertise and project competence.

Offer

Our Services

Security Consulting

With years of experience in information security and cybersecurity, we provide end-to-end, vendor-agnostic advice to improve your resilience.

Our security consulting services include

  • Developing tailored security architectures and processes
  • Assessment and planning of security measures
  • External and independent second opinions and reviews
  • Development of a cybersecurity strategy
  • Planning and execution of risk analysis and documentation
  • Risk assessment and review
  • Creation of security policies and guidelines
  • Tendering and evaluation of security solutions and services
  • Assist with the implementation of security measures
Security Consulting

Project Management

With our security expertise and project management skills, we help make your security project a success.

Our Project Management services include

  • Planning, managing or supporting security projects with our technical expertise
  • Applying various process models (SAFe, Scrum, Agile, HERMES, Waterfall) according to your specific needs
  • Developing roadmaps, effort estimates and resource plans
Project Management

CISO Advisory

As independent security experts, we support your internal security organisation with short-term assignments or longer-term engagements.

Our CISO consulting services include

  • Support of the internal security organisation
  • Advising, supporting and relieving the CISO
  • Providing the CISO function within your organisation (CISO as a service)
CISO Advisory

Audit & Review

We analyse and assess your security in an independent and focused manner.

Our audit and review services include

  • Conducting internal audits against standards such as ISO/IEC 27002, ICT Minimum Standard, COBIT, NIST Cybersecurity Framework or PCI DSS
  • Preparation of compliance audits
  • Advice on identifying and meeting legal and regulatory requirements
  • Strategy development and optimisation of security organisations and internal control systems (ICS)
  • Support in preparing for audits and inspections by supervisory authorities such as FINMA, FOPH, data protection authorities, etc.
Audit und Compliance

Identity and Access Management (IAM)

You can rely on our IAM consulting expertise to assess your current situation, define or improve your IAM design and architecture, or evaluate products.

Information Security Management System (ISMS)

Whether it is establishing an ISMS or improving your existing one, we help our clients to establish an efficient and effective ISMS.

Digital Certificates - Public Key Infrastructure (PKI)

Our experts can help you meet your requirements for secure messaging, data transfer, authentication, authorisation and digital signing.

Governance and Compliance

We help establish policies and processes for effective and efficient cybersecurity governance.

Cybersecurity

Whether it's maturity assessment, security architecture or cyber strategy & roadmap, our expertise helps you achieve bespoke cybersecurity.

Risk Management

Our services include establishing and improving your risk management practice, designing processes and tools, and assessing risks.

Article

Articles by our Consultants

PQC_Hammer

Post Quantum Cryptography - Do the Locks Used Hold Up?

From Markus Günther 11.09.2024

Shopping, making cashless payments, ordering online, signing contracts without a pen - our everyday lives are more convenient than ever. Many things require little effort and we hardly think about the complex mechanics behind these processes. Trust in the reliability of our digital world is high. But is this trust really justified?

Experts have been warning for...

Read more...

Iceberg

Security Culture is more than Awareness

From Markus Günther 08.07.2024

In its latest report, the Cyber Safety Review Board (CSRB), a special commission of the US government, found Microsoft to have an “inadequate security culture”. This was identified as a major cause of a massive global security incident in 2023. While this clear, public indictment is surprising, it shows what can happen if this part of the corporate culture...

Read more...

SecurityStrategy

Chat Applications Effectively Monitored by the SOC

From Michael Veser 17.06.2024

Chat applications have become an essential part of our digital lives and offer a platform for real-time communication and interaction. At the same time, they have increasingly become targets for cyberattacks due to their widespread use and central importance. Attackers often try to trick chatbots into performing unwanted actions. This is done using techniques such as...

Read more...

Presentations

Presentations of our Consultants

Cyber-Angriffe - Ein Blick hinter die Schlagzeilen
Bruno Blumenthal, 03. Mai 2023, Walser Anlass
Agile use case development with MITRE ATT&CK
Bruno Blumenthal, 25. Oktober 2022, Swiss Cyber Storm
Digital Technologies Podcast
Daniel Brunner, Stefanie Affolter, Daniela Wildli, Alexandra Mina, Zeina Elsayad, Mouna Miri, 09. Juli 2022, Digital Technologies Podcast
Corporate Resilience from Cyber Risk and Corporate Risk Perspective
Christoph Koch, 9. November 2021, Weekly Security Talks Podcast
Access management turned around
Alex Rhomberg, Giampaolo Trenta, 12. Oktober 2021, Swiss Cyber Storm
CyberThreats - A peek behind the headlines
Bruno Blumenthal, 28. Oktober 2020, IPMA Global Best Practive Week
2FA für die Authentifizierung von GFP am EPD und in der Cloud
Thomas Kessler, 6. März 2020, Swiss eHealth Forum
Die Verwaltung von GFP im EPD: Sisyphos ruft Herkules
Thomas Kessler, 5. März 2020, Swiss eHealth Forum
IAM Architektur für die Ära der Cloud
Thomas Kessler, 21. November 2019, ICMF Wintertagung
In our SOC we Trust
Bruno Blumenthal, 15. Oktober 2019, Swiss Cyber Storm
Das EPD im Spannungsfeld von Selbstbestimmung und Datenanalyse
Thomas Kessler, 28. August 2019, ORBIS/Microsoft Event
Nach Paperless kommt nun Passwordless
Daniel Brunner, 21. Mai 2019, Hacking Day bei Digicomp
2FA im EPD: Eine Orientierungshilfe
Thomas Kessler, 7. März 2019, Swiss eHealth Forum
EPD: Chancen und Risiken der informationellen Selbstbestimmung
Thomas Kessler, 7. Juni 2018, Information Security in Healthcare Conference
The Future of Strong Authentication
Thomas Kessler und Jens Sonnentrücker, 17. Mai 2018, European Identity & Cloud Conference (EIC)
EPD-Anbindung des Universiätsspitals Basel – Implementierung wichtiger Use Cases
Thomas Kessler und Martin Bruderer, 8. März 2018, Swiss eHealth Forum
Sicherheitsthemen bei der EPD Anbindung
Thomas Kessler, 22. September 2017, Swiss eHealth Summit
Ausgewählte Aspekte der DSGVO und ihre Bedeutung für die IT in der Schweiz
Stephan Töndury, 27. Juni 2017, ISSS Zürcher Tagung 2017
Cybersecurity Defense Plan
Marcel Hausherr, 22. Juni 2017, Information Security in Healthcare Conference
About & Beyond PKI – Blockchain and PKI
André Clerc, 9. Februar 2017, SIGS Afterwork Event
Cybersecurity Threat Defense
Dr. Alex Rhomberg, 5. April 2016, SIGS Afterwork Event
EPD Bedrohungs- und Risikoanalyse
Thomas Kessler, 10./11. März 2016, eHealth Forum Schweiz
ICT-Security Management – Im Spannungsfeld zwischen Business und Technik
Daniel Felix Maurer, 10. März 2016, ISSS St. Galler Tagung
IAM Vision 2025 – IAM Konzepte jenseits der Role Based Access Control
Thomas Kessler, 23. September 2015, Security Zone 2015
Einführung eines rollenbasierten IAM – Ein Praxisbericht
Dr. Adrian Bachmann, 19. September 2013, Security Zone 2013
ISMS im IT-Projektvorgehen – Wunsch und Wirklichkeit
Daniel Felix Maurer, 18. September 2012, Security Zone 2012

Events

Events and Trainings

Trainings

Temet's experts not only contribute their knowledge to client projects. They also act as trainers on various information and cybersecurity topics.

The Institute of Internal Auditors Switzerland (IIA Switzerland)

Cyber Resilience - An introduction to the ICT Minimum Standard

07.11.2024 - In this half-day seminar you will learn what the ICT Minimum Standard is and how companies can use it to increase their cyber resilience. The seminar will show how the ICT Minimum Standard is structured, how it can be applied and where possible pitfalls lie. It will be based on experiences from the application of the standard at various companies, both as a means of assessing their own cyber resilience and as a tool for setting up a cybersecurity program. (This seminar will be held in german)

More information on the website of The Institute of Internal Auditors Switzerland (IIA Switzerland)

Swiss Sign Group

Public Key Infrastructure (PKI) Essentials

We offer the PKI Essentials training course together with the Swiss Sign Group. The one-day basic course for IT managers and IT security officers teaches you the necessary PKI basics and explains the correct use of certificates and keys in various use cases in a practical way. (This course will be held in german)

More information on the website of Swiss Sign Group

Individual Training

If you have a training need, we look forward to hearing from you. We are happy to work with you to develop a bespoke training programme.

Company

Who is Temet?

The owner-managed TEMET AG, based in Zurich, was founded in 2010 and offers highly qualified consulting services in the field of security. Temet focuses on the Swiss market and has over 145 well-known companies among its customers. They are mainly active in the financial sector, public administration, healthcare, industry and critical infrastructure, and have the highest requirements for the sustainable provision of their security. We employ 16 Security Consultants and aim for sustainable growth.

TEMET AG has a broad market base. Since the beginning, the company’s customers have come from the banking, insurance, critical infrastructure, government, industrial and healthcare sectors.

Pie-Chart der Branchenverteilung nach Kunden
Legend for sector distribution by customer

Team

Our Team

Adrian Bachmann
Adrian Bachmann
Partner, Managing Director

Dr. Inform. UZH, Dipl. Inform. UZH

Adrian Bachmann

Active in security since 2005

Special Areas

Security Architecture & Strategy
Identity and Access Management (IAM)
Risk Management und ICS

Contact


Alex Rhomberg
Alex Rhomberg
Partner, Member of the Executive Board

Dr. sc. techn. ETH, Dipl. El.-Ing. ETH
SAFe 5 Architect

Alex Rhomberg

Active in security since 2001

Special Areas

Security Architecture
Identity and Access Management (IAM)
New Threats and Technologies

Contact


Bruno Blumenthal
Bruno Blumenthal
Partner, Member of the Executive Board

Dipl. Ing. FH Computer Science
CISM, CISA, CISSP

Bruno Blumenthal

Active in security since 2004

Special Areas

Cybersecurity & Security Operations
Security Architecture & Strategy
ISMS

Contact


Thomas Kessler
Thomas Kessler
Partner, Managing Security Consultant

Dipl. Physicist ETH
MAS ZFH in Business Administration

Thomas Kessler

Active in security since 1991

Special Areas

Security Architecture & Strategy
Strong Authentication
Identity Provider (IdP)

Contact


Daniel Felix Maurer
Daniel Felix Maurer
Managing Security Consultant

lic. phil. UZH

Daniel Felix Maurer

Active in security since 1986

Special Areas

ISMS
Risk Management
Audits & Compliance

Contact


André Clerc
André Clerc
Managing Security Consultant

Dipl. Ing. FH Computer Science
CISSP, CAS Project Management

André Clerc

Active in security since 2000

Special Areas

Public Key Infrastructure (PKI) incl. HSM
Network and Perimeter Security
System Hardening

Contact


Stephan Töndury
Stephan Töndury
Expert Security Consultant

lic. iur. UB
NDK DIS HW Lucerne

Stephan Töndury

Active in security since 2000

Special Areas

Legal Sciences, Data Protection
ISMS
Audits & Compliance

Contact


Michael Roth
Michael Roth
Expert Security Consultant

Dipl. Inform. UZH
CISM, Project Management Professional (PMP)

Michael Roth

Active in security since 2011

Special Areas

Project Management
Identity and Access Management (IAM)
Risk Management

Contact


Daniel Brunner
Daniel Brunner
Senior Security Consultant

Computer Scientist EFZ
Certified Scrum Product Owner

Daniel Brunner

Active in security since 2011

Special Areas

Risk Management
Agile Project Management
Security Architecture

Contact


Moritz Zollinger
Moritz Zollinger
Senior Security Consultant

MSc Business Informatics
CISSP

Moritz Zollinger

Active in security since 2015

Special Areas

Security and Compliance Management
Secure Development
Identity and Access Management (IAM)

Contact


Markus Günther
Markus Günther
Senior Security Consultant

MSc IT GRC Management
CISA, GCFA, CISSP, SSAP

Markus Günther

Active in security since 2015

Special Areas

Security Awareness
Endpoint Security
Audit & Assessment

Contact


Milan Capljak
Milan Capljak
Security Consultant

BSc Business Informatics FHSG
CISA, CISM, CISSP, MAS in Information & Cyber Security

Milan Capljak

Active in security since 2017

Special Areas

Security Assessments
IT-Audit
ISMS

Contact


Michael Veser
Michael Veser
Security Consultant

BSc IT Security, MSc Artificial Intelligence

Michael Veser

Active in security since 2015

Special Areas

Security Operations Center (SOC)
Public Key Infrastructure (PKI) and HSM
Security Architectures

Contact


Samuel Jassim
Samuel Jassim
Associate Security Consultant

Computer Scientist EFZ
GIAC GSOC

Samuel Jassim

Active in security since 2020

Special Areas

Security Operations Center (SOC)
Endpoint Detection & Response
Security Incident Handling

Contact


Giorgio Tresoldi
Giorgio Tresoldi
Security Consultant

Dipl. El.-Ing. ETH
CISM, SCRUM

Giorgio Tresoldi

Active in security since 2019

Special Areas

Cyber Training
Industrial Control Systems and IoT
Project Management

Contact


Florian Sztarsich
Florian Sztarsich
Associate Security Consultant

BSc Information & Cyber Security
CISM, SCRUM

Florian Sztarsich

Active in security since 2019

Special Areas

Security Operations Center (SOC)
Security Engineering
Project Management

Contact


Cornelia Affolter
Cornelia Affolter
Assistant

Bank Clerk
Executive Year Course KLZ, Accounting Clerk edupool

Cornelia Affolter

Area of Activity

Administration
Accounting
Marketing

Contact


Contact

Contact us

Address

Basteiplatz 5, 8001 Zürich

Phone: