Offer
Our Services
Security Consulting
With years of experience in information security and cybersecurity, we provide end-to-end, vendor-agnostic advice to improve your resilience.
Our security consulting services include
- Developing tailored security architectures and processes
- Assessment and planning of security measures
- External and independent second opinions and reviews
- Development of a cybersecurity strategy
- Planning and execution of risk analysis and documentation
- Risk assessment and review
- Creation of security policies and guidelines
- Tendering and evaluation of security solutions and services
- Assist with the implementation of security measures
Project Management
With our security expertise and project management skills, we help make your security project a success.
Our Project Management services include
- Planning, managing or supporting security projects with our technical expertise
- Applying various process models (SAFe, Scrum, Agile, HERMES, Waterfall) according to your specific needs
- Developing roadmaps, effort estimates and resource plans
CISO Advisory
As independent security experts, we support your internal security organisation with short-term assignments or longer-term engagements.
Our CISO consulting services include
- Support of the internal security organisation
- Advising, supporting and relieving the CISO
- Providing the CISO function within your organisation (CISO as a service)
Audit & Review
We analyse and assess your security in an independent and focused manner.
Our audit and review services include
- Conducting internal audits against standards such as ISO/IEC 27002, ICT Minimum Standard, COBIT, NIST Cybersecurity Framework or PCI DSS
- Preparation of compliance audits
- Advice on identifying and meeting legal and regulatory requirements
- Strategy development and optimisation of security organisations and internal control systems (ICS)
- Support in preparing for audits and inspections by supervisory authorities such as FINMA, FOPH, data protection authorities, etc.
Identity and Access Management (IAM)
You can rely on our IAM consulting expertise to assess your current situation, define or improve your IAM design and architecture, or evaluate products.
Information Security Management System (ISMS)
Whether it is establishing an ISMS or improving your existing one, we help our clients to establish an efficient and effective ISMS.
Digital Certificates - Public Key Infrastructure (PKI)
Our experts can help you meet your requirements for secure messaging, data transfer, authentication, authorisation and digital signing.
Governance and Compliance
We help establish policies and processes for effective and efficient cybersecurity governance.
Cybersecurity
Whether it's maturity assessment, security architecture or cyber strategy & roadmap, our expertise helps you achieve bespoke cybersecurity.
Risk Management
Our services include establishing and improving your risk management practice, designing processes and tools, and assessing risks.
Article
Articles by our Consultants
Post Quantum Cryptography - Do the Locks Used Hold Up?
From Markus Günther 11.09.2024
Shopping, making cashless payments, ordering online, signing contracts without a pen - our everyday lives are more convenient than ever. Many things require little effort and we hardly think about the complex mechanics behind these processes. Trust in the reliability of our digital world is high. But is this trust really justified?
Experts have been warning for...
Security Culture is more than Awareness
From Markus Günther 08.07.2024
In its latest report, the Cyber Safety Review Board (CSRB), a special commission of the US government, found Microsoft to have an “inadequate security culture”. This was identified as a major cause of a massive global security incident in 2023. While this clear, public indictment is surprising, it shows what can happen if this part of the corporate culture...
Chat Applications Effectively Monitored by the SOC
From Michael Veser 17.06.2024
Chat applications have become an essential part of our digital lives and offer a platform for real-time communication and interaction. At the same time, they have increasingly become targets for cyberattacks due to their widespread use and central importance. Attackers often try to trick chatbots into performing unwanted actions. This is done using techniques such as...
Presentations
Presentations of our Consultants
Cyber-Angriffe - Ein Blick hinter die Schlagzeilen
Bruno Blumenthal, 03. Mai 2023, Walser AnlassAgile use case development with MITRE ATT&CK
Bruno Blumenthal, 25. Oktober 2022, Swiss Cyber StormDigital Technologies Podcast
Daniel Brunner, Stefanie Affolter, Daniela Wildli, Alexandra Mina, Zeina Elsayad, Mouna Miri, 09. Juli 2022, Digital Technologies PodcastCorporate Resilience from Cyber Risk and Corporate Risk Perspective
Christoph Koch, 9. November 2021, Weekly Security Talks PodcastAccess management turned around
Alex Rhomberg, Giampaolo Trenta, 12. Oktober 2021, Swiss Cyber StormCyberThreats - A peek behind the headlines
Bruno Blumenthal, 28. Oktober 2020, IPMA Global Best Practive Week2FA für die Authentifizierung von GFP am EPD und in der Cloud
Thomas Kessler, 6. März 2020, Swiss eHealth ForumDie Verwaltung von GFP im EPD: Sisyphos ruft Herkules
Thomas Kessler, 5. März 2020, Swiss eHealth ForumIAM Architektur für die Ära der Cloud
Thomas Kessler, 21. November 2019, ICMF WintertagungIn our SOC we Trust
Bruno Blumenthal, 15. Oktober 2019, Swiss Cyber StormDas EPD im Spannungsfeld von Selbstbestimmung und Datenanalyse
Thomas Kessler, 28. August 2019, ORBIS/Microsoft EventNach Paperless kommt nun Passwordless
Daniel Brunner, 21. Mai 2019, Hacking Day bei Digicomp2FA im EPD: Eine Orientierungshilfe
Thomas Kessler, 7. März 2019, Swiss eHealth ForumEPD: Chancen und Risiken der informationellen Selbstbestimmung
Thomas Kessler, 7. Juni 2018, Information Security in Healthcare ConferenceThe Future of Strong Authentication
Thomas Kessler und Jens Sonnentrücker, 17. Mai 2018, European Identity & Cloud Conference (EIC)EPD-Anbindung des Universiätsspitals Basel – Implementierung wichtiger Use Cases
Thomas Kessler und Martin Bruderer, 8. März 2018, Swiss eHealth ForumSicherheitsthemen bei der EPD Anbindung
Thomas Kessler, 22. September 2017, Swiss eHealth SummitAusgewählte Aspekte der DSGVO und ihre Bedeutung für die IT in der Schweiz
Stephan Töndury, 27. Juni 2017, ISSS Zürcher Tagung 2017Cybersecurity Defense Plan
Marcel Hausherr, 22. Juni 2017, Information Security in Healthcare ConferenceCybersecurity im ePD – Aufgaben, Kompetenzen und Verantwortlichkeiten (AKV)
Thomas Kessler, 9. März 2017, Swiss eHealth ForumAbout & Beyond PKI – Blockchain and PKI
André Clerc, 9. Februar 2017, SIGS Afterwork EventCybersecurity Threat Defense
Dr. Alex Rhomberg, 5. April 2016, SIGS Afterwork EventEPD Bedrohungs- und Risikoanalyse
Thomas Kessler, 10./11. März 2016, eHealth Forum SchweizICT-Security Management – Im Spannungsfeld zwischen Business und Technik
Daniel Felix Maurer, 10. März 2016, ISSS St. Galler TagungIAM Vision 2025 – IAM Konzepte jenseits der Role Based Access Control
Thomas Kessler, 23. September 2015, Security Zone 2015Einführung eines rollenbasierten IAM – Ein Praxisbericht
Dr. Adrian Bachmann, 19. September 2013, Security Zone 2013ISMS im IT-Projektvorgehen – Wunsch und Wirklichkeit
Daniel Felix Maurer, 18. September 2012, Security Zone 2012Events
Events and Trainings
Trainings
Temet's experts not only contribute their knowledge to client projects. They also act as trainers on various information and cybersecurity topics.
The Institute of Internal Auditors Switzerland (IIA Switzerland)Cyber Resilience - An introduction to the ICT Minimum Standard
07.11.2024 - In this half-day seminar you will learn what the ICT Minimum Standard is and how companies can use it to increase their cyber resilience. The seminar will show how the ICT Minimum Standard is structured, how it can be applied and where possible pitfalls lie. It will be based on experiences from the application of the standard at various companies, both as a means of assessing their own cyber resilience and as a tool for setting up a cybersecurity program. (This seminar will be held in german)
More information on the website of The Institute of Internal Auditors Switzerland (IIA Switzerland)
Swiss Sign GroupPublic Key Infrastructure (PKI) Essentials
We offer the PKI Essentials training course together with the Swiss Sign Group. The one-day basic course for IT managers and IT security officers teaches you the necessary PKI basics and explains the correct use of certificates and keys in various use cases in a practical way. (This course will be held in german)
More information on the website of Swiss Sign Group
Individual Training
If you have a training need, we look forward to hearing from you. We are happy to work with you to develop a bespoke training programme.
Company
Who is Temet?
The owner-managed TEMET AG, based in Zurich, was founded in 2010 and offers highly qualified consulting services in the field of security. Temet focuses on the Swiss market and has over 145 well-known companies among its customers. They are mainly active in the financial sector, public administration, healthcare, industry and critical infrastructure, and have the highest requirements for the sustainable provision of their security. We employ 16 Security Consultants and aim for sustainable growth.
TEMET AG has a broad market base. Since the beginning, the company’s customers have come from the banking, insurance, critical infrastructure, government, industrial and healthcare sectors.
Temet as an employer
Are you looking for a challenge in security consulting? Are you interested in an open corporate culture with exciting development opportunities? Do you value an independent way of working with a lot of personal responsibility and flexibility in terms of location and working hours? Then talk to us! We are looking for experienced and motivated Security Consultants to further expand our business.
The way we work
Independence • Personal responsibility • Our consultants are free to choose their location and working hours according to the requirements of projects and customers • Open feedback culture • Joint development of solutions
Work environment
Location-independent infrastructure • Modern and safe work equipment • Infrastructure enables high quality work • Office within walking distance of Zurich main station • Desk sharing
Employee development
Employee development is important to us • Acquisition of knowledge through coaching, colleagues, courses or self-study • Support for education and training • Support for certifications such as CISSP, CISA, CISM, PMP, IPMA and more
Company and finances
Transparent, comprehensible and fair salary model • 100% self-financed • Investments from current income • Capable of successfully implementing even large projects • Target size of 25-30 consultants • With over 145 customers, broadly diversified in the market
Temet's Engagements
ISSS
eCH
Swiss Cyber Storm
Swiss Cyber Experts
FIDO Alliance
OpenID Foundation
Information Security Manager ED
SWISS EXCELLENCE FORUM
Team
Our Team
lic. iur. UB
NDK DIS HW Lucerne
Active in security since 2000
Legal Sciences, Data Protection
ISMS
Audits & Compliance
Computer Scientist EFZ
Certified Scrum Product Owner
Active in security since 2011
Risk Management
Agile Project Management
Security Architecture
Bank Clerk
Executive Year Course KLZ, Accounting Clerk edupool
Administration
Accounting
Marketing
Contact
Contact us
Address
Basteiplatz 5, 8001 Zürich
E-Mail:
Phone: