Offer
Our Services
Security Consulting
With years of experience in information security and cybersecurity, we provide end-to-end, vendor-agnostic advice to improve your resilience.
Our security consulting services include
- Developing tailored security architectures and processes
- Assessment and planning of security measures
- External and independent second opinions and reviews
- Development of a cybersecurity strategy
- Planning and execution of risk analysis and documentation
- Risk assessment and review
- Creation of security policies and guidelines
- Tendering and evaluation of security solutions and services
- Assist with the implementation of security measures
Project Management
With our security expertise and project management skills, we help make your security project a success.
Our Project Management services include
- Planning, managing or supporting security projects with our technical expertise
- Applying various process models (SAFe, Scrum, Agile, HERMES, Waterfall) according to your specific needs
- Developing roadmaps, effort estimates and resource plans
CISO Advisory
As independent security experts, we support your internal security organisation with short-term assignments or longer-term engagements.
Our CISO consulting services include
- Support of the internal security organisation
- Advising, supporting and relieving the CISO
- Providing the CISO function within your organisation (CISO as a service)
Audit & Review
We analyse and assess your security in an independent and focused manner.
Our audit and review services include
- Conducting internal audits against standards such as ISO/IEC 27002, ICT Minimum Standard, COBIT, NIST Cybersecurity Framework or PCI DSS
- Preparation of compliance audits
- Advice on identifying and meeting legal and regulatory requirements
- Strategy development and optimisation of security organisations and internal control systems (ICS)
- Support in preparing for audits and inspections by supervisory authorities such as FINMA, FOPH, data protection authorities, etc.
Identity and Access Management (IAM)
You can rely on our IAM consulting expertise to assess your current situation, define or improve your IAM design and architecture, or evaluate products.
Information Security Management System (ISMS)
Whether it is establishing an ISMS or improving your existing one, we help our clients to establish an efficient and effective ISMS.
Digital Certificates - Public Key Infrastructure (PKI)
Our experts can help you meet your requirements for secure messaging, data transfer, authentication, authorisation and digital signing.
Governance and Compliance
We help establish policies and processes for effective and efficient cybersecurity governance.
Cybersecurity
Whether it's maturity assessment, security architecture or cyber strategy & roadmap, our expertise helps you achieve bespoke cybersecurity.
Risk Management
Our services include establishing and improving your risk management practice, designing processes and tools, and assessing risks.
Article
Articles by our Consultants
Against the Procured Security Incident - Supply Chain Risk Management
From Bruno Blumenthal 18.03.2024
Suppliers and service providers have a significant impact on a company’s security. No organisation operates in isolation. High-profile incidents such as SolarWinds (2020) or Xplain (2023) show how significant the impact of security incidents at suppliers can be. Supply Chain Risk Management (SCRM) or Third Party Risk Management (TPRM) is therefore increasingly...
The Special Requirements of an IoT PKI
From Michael Veser 19.06.2023
A public key infrastructure (PKI) is an important aspect of modern information security. For years, it has been the standard that all sensitive connections are encrypted. Even if you may not be aware of it, you are constantly dealing with a wide variety of PKIs! The fact that you hardly notice this in everyday life is a quality feature of well-functioning PKIs....
How a Key Management System Can Help You With FADP Compliance
From Michael Veser 19.06.2023
The new Federal Act on Data Protection (FADP) comes into force on September 1, 2023 and is the talk of the town, not least because of the personal criminal liability enshrined in the law in the event of violations. Even if the revision initially seems daunting for many companies, a closer look reveals numerous overlaps with existing security frameworks.
What is...Presentations
Presentations of our Consultants
Cyber-Angriffe - Ein Blick hinter die Schlagzeilen
Bruno Blumenthal, 03. Mai 2023, Walser AnlassAgile use case development with MITRE ATT&CK
Bruno Blumenthal, 25. Oktober 2022, Swiss Cyber StormDigital Technologies Podcast
Daniel Brunner, Stefanie Affolter, Daniela Wildli, Alexandra Mina, Zeina Elsayad, Mouna Miri, 09. Juli 2022, Digital Technologies PodcastCorporate Resilience from Cyber Risk and Corporate Risk Perspective
Christoph Koch, 9. November 2021, Weekly Security Talks PodcastAccess management turned around
Alex Rhomberg, Giampaolo Trenta, 12. Oktober 2021, Swiss Cyber StormCyberThreats - A peek behind the headlines
Bruno Blumenthal, 28. Oktober 2020, IPMA Global Best Practive Week2FA für die Authentifizierung von GFP am EPD und in der Cloud
Thomas Kessler, 6. März 2020, Swiss eHealth ForumDie Verwaltung von GFP im EPD: Sisyphos ruft Herkules
Thomas Kessler, 5. März 2020, Swiss eHealth ForumIAM Architektur für die Ära der Cloud
Thomas Kessler, 21. November 2019, ICMF WintertagungIn our SOC we Trust
Bruno Blumenthal, 15. Oktober 2019, Swiss Cyber StormDas EPD im Spannungsfeld von Selbstbestimmung und Datenanalyse
Thomas Kessler, 28. August 2019, ORBIS/Microsoft EventNach Paperless kommt nun Passwordless
Daniel Brunner, 21. Mai 2019, Hacking Day bei Digicomp2FA im EPD: Eine Orientierungshilfe
Thomas Kessler, 7. März 2019, Swiss eHealth ForumEPD: Chancen und Risiken der informationellen Selbstbestimmung
Thomas Kessler, 7. Juni 2018, Information Security in Healthcare ConferenceThe Future of Strong Authentication
Thomas Kessler und Jens Sonnentrücker, 17. Mai 2018, European Identity & Cloud Conference (EIC)EPD-Anbindung des Universiätsspitals Basel – Implementierung wichtiger Use Cases
Thomas Kessler und Martin Bruderer, 8. März 2018, Swiss eHealth ForumSicherheitsthemen bei der EPD Anbindung
Thomas Kessler, 22. September 2017, Swiss eHealth SummitAusgewählte Aspekte der DSGVO und ihre Bedeutung für die IT in der Schweiz
Stephan Töndury, 27. Juni 2017, ISSS Zürcher Tagung 2017Cybersecurity Defense Plan
Marcel Hausherr, 22. Juni 2017, Information Security in Healthcare ConferenceCybersecurity im ePD – Aufgaben, Kompetenzen und Verantwortlichkeiten (AKV)
Thomas Kessler, 9. März 2017, Swiss eHealth ForumAbout & Beyond PKI – Blockchain and PKI
André Clerc, 9. Februar 2017, SIGS Afterwork EventCybersecurity Threat Defense
Dr. Alex Rhomberg, 5. April 2016, SIGS Afterwork EventEPD Bedrohungs- und Risikoanalyse
Thomas Kessler, 10./11. März 2016, eHealth Forum SchweizICT-Security Management – Im Spannungsfeld zwischen Business und Technik
Daniel Felix Maurer, 10. März 2016, ISSS St. Galler TagungIAM Vision 2025 – IAM Konzepte jenseits der Role Based Access Control
Thomas Kessler, 23. September 2015, Security Zone 2015Einführung eines rollenbasierten IAM – Ein Praxisbericht
Dr. Adrian Bachmann, 19. September 2013, Security Zone 2013ISMS im IT-Projektvorgehen – Wunsch und Wirklichkeit
Daniel Felix Maurer, 18. September 2012, Security Zone 2012Events
Events and Trainings
Trainings
Temet's experts not only contribute their knowledge to client projects. They also act as trainers on various information and cybersecurity topics.
The Institute of Internal Auditors Switzerland (IIA Switzerland)Current Cyber Threats
28.05.2024 - This half-day seminar offers you an insight into current cyber threats and helps you to understand their relevance for your company. You will not become a cybersecurity specialist, but the seminar will help you to better understand the reports of attacks, realistically assess threats and get a feel for what you and your company can expect in the future. (This seminar will be held in german)
More information on the website of The Institute of Internal Auditors Switzerland (IIA Switzerland)
The Institute of Internal Auditors Switzerland (IIA Switzerland)Security Operations – Organisation and Governance
02.07.2024 - In this half-day seminar, you will learn what to consider when setting up a Security Operation Center in terms of organization and governance. This seminar is intended to show what the organization of a Security Operation Center can look like, what its tasks are and what to consider when outsourcing certain tasks. The focus is not on the technical challenges involved in monitoring systems for cybersecurity, but on the organizational and governance challenges. (This seminar will be held in german)
More information on the website of The Institute of Internal Auditors Switzerland (IIA Switzerland)
The Institute of Internal Auditors Switzerland (IIA Switzerland)Cyber Resilience - An introduction to the ICT Minimum Standard
07.11.2024 - In this half-day seminar you will learn what the ICT Minimum Standard is and how companies can use it to increase their cyber resilience. The seminar will show how the ICT Minimum Standard is structured, how it can be applied and where possible pitfalls lie. It will be based on experiences from the application of the standard at various companies, both as a means of assessing their own cyber resilience and as a tool for setting up a cybersecurity program. (This seminar will be held in german)
More information on the website of The Institute of Internal Auditors Switzerland (IIA Switzerland)
Swiss Sign GroupPublic Key Infrastructure (PKI) Essentials
We offer the PKI Essentials training course together with the Swiss Sign Group. The one-day basic course for IT managers and IT security officers teaches you the necessary PKI basics and explains the correct use of certificates and keys in various use cases in a practical way. (This course will be held in german)
More information on the website of Swiss Sign Group
Individual Training
If you have a training need, we look forward to hearing from you. We are happy to work with you to develop a bespoke training programme.
Company
Who is Temet?
The owner-managed TEMET AG, based in Zurich, was founded in 2010 and offers highly qualified consulting services in the field of security. Temet focuses on the Swiss market and has over 145 well-known companies among its customers. They are mainly active in the financial sector, public administration, healthcare, industry and critical infrastructure, and have the highest requirements for the sustainable provision of their security. We employ 17 Security Consultants and aim for sustainable growth.
TEMET AG has a broad market base. Since the beginning, the company’s customers have come from the banking, insurance, critical infrastructure, government, industrial and healthcare sectors.
Temet as an employer
Are you looking for a challenge in security consulting? Are you interested in an open corporate culture with exciting development opportunities? Do you value an independent way of working with a lot of personal responsibility and flexibility in terms of location and working hours? Then talk to us! We are looking for experienced and motivated Security Consultants to further expand our business.
The way we work
Independence • Personal responsibility • Our consultants are free to choose their location and working hours according to the requirements of projects and customers • Open feedback culture • Joint development of solutions
Work environment
Location-independent infrastructure • Modern and safe work equipment • Infrastructure enables high quality work • Office within walking distance of Zurich main station • Desk sharing
Employee development
Employee development is important to us • Acquisition of knowledge through coaching, colleagues, courses or self-study • Support for education and training • Support for certifications such as CISSP, CISA, CISM, PMP, IPMA and more
Company and finances
Transparent, comprehensible and fair salary model • 100% self-financed • Investments from current income • Capable of successfully implementing even large projects • Target size of 25-30 consultants • With over 145 customers, broadly diversified in the market
Temet's Engagements
ISSS
eCH
Swiss Cyber Storm
Swiss Cyber Experts
FIDO Alliance
OpenID Foundation
Information Security Manager ED
SWISS EXCELLENCE FORUM
Team
Our Team
lic. iur. UB
NDK DIS HW Lucerne
Active in security since 2000
Legal Sciences, Data Protection
ISMS
Audits & Compliance
Dipl. Inform. UZH
CISM, Project Management Professional (PMP)
Active in security since 2011
Project Management
Identity and Access Management (IAM)
Risk Management
Computer Scientist EFZ
Certified Scrum Product Owner
Active in security since 2011
Risk Management
Agile Project Management
Security Architecture
Bank Clerk
Executive Year Course KLZ, Accounting Clerk edupool
Administration
Accounting
Marketing
Contact
Contact us
Address
Basteiplatz 5, 8001 Zürich
E-Mail:
Phone: