top of page

18 results found with an empty search

  • Cybersherpa | Enterprise Cyber Infrastructure Security and Resilience

    Cybersherpa's mission is to help Swiss enterprises identify and protect what matters most for the smooth running of their operations and which could be impacted during a cybersecurity incident. Cybersherpa provides a range of services to transform the organisation's cyber infrastructure to achieve the appropriate level of cyber resilience. News! Point of View: Cloud Security and Sovereignty in the EU and Switzerland Get it Guiding enterprises towards Cyber Security & Resilience Cybersherpa's mission is to provide guidance for enterprises to be resilient to cyber threats and protect what matters most. We achieve this with a proven Enterprise Security Architecture approach, guiding clients from strategy to implementation. Contact Us Local with Global connection Pragmatic Proven Experience Cost Conscious Trusted Strategic Partners Independent Where we can help. Use cases and recent client deliveries Our flagship services provide pragmatic solutions to enterprises' business and cyber use cases. Secure the most sensitive assets in cloud, while maintaining sovereignty and strict regulatory requirements Guiding you with a cross functional team of Cybersecurity legal and data protection specialists through a structured approach to enable a simple, compliant, and sovereign cloud. Secure access to critical applications with Zero Trust Network Access (ZTNA) The multiple recent vulnerabilities of remote access architecture based on VPN have highlighted the need to accelerate the transformation of networks towards a Zero Trust architecture. Cybersherpa provides a pragmatic approach to initiate this change in small steps. CISO As a Service (vCISO) and Interim Management Leadership and advice from cybersecurity experts available on demand for your business security needs with regular operational support on risk level monitoring and compliance checks. Work Anywhere with Security Service Edge (SSE) Work is no longer a place, it’s what people do. Cybersherpa can help make work-from-anywhere simple for users and secure for the organisation by guiding you through a modular approach in the adoption of a SSE architecture. Cyber Security Posture Review and Roadmap Development A comprehensive assessment of your organization’s attack surface, as a cyber criminal sees it, a review of cyber posture with our assessment platform, followed by a prioritisation of remediation activities and developement of the cyber security roadmap Secure Access to GenAI Tools (such as ChatGPT) As more employees leverage AI tools to boost productivity, significant cybersecurity risks emerge. We offer solution to balance security and innovation, by enforcing robust security policies without hindering access to these innovative tools. What we do. End-to-end Service Offering Cybersherpa's services are structured in three strategic domains: compliance, advisory cyber security services, and managed services. With its strategic partners Cybersherpa provides integrated services, from strategy to solutions delivery and managed services. STRATEGIC SOLUTION PARTNERS Download our Point of View Cloud security and sovereignty in the EU and Switzerland Addressing geopolitical risks and evolving US regulatory approach Email I accept the terms and conditions of use. Consult here. Download our Point of View Email with download link sent. Thank you ✅ This paper considers the volatile cyber and regulatory environment and howorganisations can ensure the sovereignty, security and continuity of their digitaloperations. The Point of View paper is a collaboration with Artes Juris, Swiss law firm. Certified Partner Cybersherpa is ready to support your entreprise with certified specialists for the design and implementation of Zscaler solutions! Book a Demo Today, businesses operate with applications hosted in the cloud, allowing their employees to access them from the office, on the road or from home. Rather than relying on traditional perimeter protection, these businesses require security solutions that protect data and applications with a Zero Trust approach, and a great user experience regardless of the user location or device used. Simplification of your infrastructure Protection against cyber threats everywhere and from any device Improved user experience We're not alone, neither are you. Trusted Partnerships and Solutions Cybersherpa brings its pragmatic and independent cyber expertise to help your organization select and integrate cybersecurity solutions adapted to its needs. Our strong experience also relies on building trusted relationships, training, certifications and partnerships with technology providers to meet business needs. Cybersherpa advises your organization on opportunities to reduce cyber risks with these solutions while ensuring that budget, privacy, compliance, operations, IT and security architecture, and user experience are fully taken into account. Our Mission? Guiding enterprises towards cyber resilience, protecting what matters most. The rapid adoption of cloud and AI services, combined with the shift to working from anywhere on any device, has amplified the need for secure, seamless access—anytime, anywhere, from any device. Legacy networking and perimeter-based security models can no longer deliver the required security and user experience, and they become increasingly complex in hybrid environments. Zero Trust architectures and Security Service Edge (SSE) offer powerful opportunities to address these challenges. Cybersherpa takes a pragmatic, step-by-step approach to help enterprises adopt Zero Trust and SSE solutions—focusing on realistic use cases that deliver measurable value at each stage. While cloud and AI adoption continues, the future of cyber infrastructures remains firmly hybrid for most enterprises. Security and Technology leaders must deal with an increasing attack surface, often fragmented cyber defences and rapidly evolving cyber threats. Developing a Zero Trust architecture with Security Service Edge (SSE) is an opportunity for enterprises to achieve a higher cyber resilience when they implement it with a stepped approach and pragmatic use cases. Jean-Loup Ravinet Founder Cybersherpa Compliance is no longer a constraint—it’s a strategic advantage and a catalyst for responsible innovation. In an era defined by AI, cloud, and hyperconnectivity, aligning with regulatory and ethical frameworks isn’t just a legal necessity—it’s the foundation for trust, resilience, and sustainable growth. Omar Guemmi Partner Application Security and Data Protection Leader To be the trusted partner for secure digital transformation—where Zero Trust and cyber resilience are the norm, not the exception. We envision a future where organisations thrive in hybrid and cloud environments with confidence, powered by intelligent security, embedded forensics, and continuous governance. At Cybersherpa, we believe cybersecurity should be an enabler of innovation, helping businesses move faster, smarter, and safer. Our Vision? We're right here. Based in Switzerland Cybersherpa is now located at Voie du Chariot 3/4th floor, 1003 Lausanne Book a meeting Firstname Name Email Message I accept the terms and conditions of use. Consult here. Send Thank you for your message !

  • Security Service Edge | Cybersherpa

    Cyber Security Advisory & Implementation Services Aligned with Zero Trust Principles Cyber Security Posture Review Cyber Security Roadmap Delivery Management Identity Security Device Security Network and Cloud Security Applications - DevSecOps Data Security What are the principles of Zero Trust? Zero Trust is an architecture framework based on the concept of "never trust, always verify". Core principles include: Assume Breach – operate as if attackers are already inside. Least Privilege Access Continuous Verification of identity, device posture Segmentation – breaking networks into smaller, isolated zones. Title Make It Aunt Bette's Homemade Pecan Pie Make It Rockin’ Rocky Road Ice Cream Make It Tom’s Heavenly Apple Strudel Make It Joe’s Divine Butter Tarts Make It Zero Trust is an architecture principle or framework. SASE is an architecture pattern which is in line with the zero trust principles. Security Service Edge is the security component of SASE and can be directly associated with a range of solutions and products. What are the benefits for Security Service Edge? The main benefits of SSE over legacy on-premises solutions are: - User experience - Improved security - Cost and operational complexity What are the main use cases for the use of SSE? Example of use cases 1- Improving user experience and security for a geographically distributed workforce 2- Replace VPN with Zero Trust Network Access 3 - Secure access to SaaS apps 4 - Enable secure access for 3rd party teams and replace VDI

  • Top 5 Zero Trust Use Cases, 20 June 2024 in Geneva | Cybersherpa

    Zero Trust Workshop Register now Zero Trust does not consist of implementing a new product, but to change the way IT approaches architecture. Our Workshop aims at gaining a fast understanding of a company structure Approach Workshop that last between half a day or a full day depending on the industry, the size of the company, and the complexity of the architecture Understand Busines Context - Drivers and Pain Points Capture Top Use Cases for Zero Trust Describe initial Zero Trust Architecture Consider existing capabilities in line with Zero Trust Vision Project Oriented Roadmap Use Case Presentation Get in touch ! First name Last name Company Position Email I agree to the terms & conditions Send Message sent ! ✅

  • DuoKey | Cybersherpa

    Cybersherpa is a certified reseller of DuoKey with an integrated team of cybersecurity, data protection and legal specialists to support you. NEWS! Cybersherpa has partnered with DuoKey and is an authorized reseller . Partnership with DuoKey A recurring challenge in cloud adoption and expansion across multiple sectors is securing the “5 to 10% most sensitive assets” while maintaining sovereignty and meeting strict regulatory requirements. Too often, cloud projects result in long, siloed discussions between legal, cybersecurity, and technical teams— slowing down innovation. We break through these barriers with two key differentiators: ✅ Advanced Encryption Solution with DuoKey : per-user pricing, managed services, drastically reducing complexity and costs compared to traditional encryption solutions. ✅ An Integrated Compliance & Security approach with a team of cybersecurity supported by a network of Swiss and EU-qualified technology lawyers. More to come on this soon. Our services powered by DuoKey Securing your most sensitive assets in M365 with DKE Address sovereignty and security risks for your most sensitive assets in M365 with Double Key Encryption Book a meeting Secure your Data in AWS with XKS Achieve Data Sovereignty and Regulatory Compliance in AWS with External Key Store and DuoKey Book a meeting Safeguard Your Financial Data in the Cloud Achieve Data Sovereignty and Regulatory Compliance Enhance Consumer Trust and Data Security Book a meeting

  • Copy of Event | Cybersherpa

    Our next event in Geneva, on September 24th ! Top 5 Business Use Cases enabled by Security Service Edge Register now With the participation of Hosted by Sept 24th, 2024 5:30 pm to 8 pm For all sectors Registration Only Geneva Event in FR & EN You have heard of Zero Trust Architecture and Security Service Edge (SSE) but, You are unsure what about the true business benefits for your organisation. You want an open discussion about challenges to adopt such architecture. You want industry leaders point of view as well as peers across sectors. Join us for an event where we'll dive into five use cases for Zero Trust and Security Service Edge (SSE). This event, facilitated by specialists in the field, in collaboration with Zscaler, will enable the collaborative presentation of concrete cases encountered by swiss organisations from multiple sectors. Agenda The event kicks off at 5:30 pm with welcome discussions and an opportunity for networking. At 5.40 we will start with an intro on the global cybersecurity outlook in 2024, followed by an introduction to the concepts of Zero Trust and Security Service Edge. At 6 pm, we delve into five meticulously crafted use cases. These cases are designed to highlight common business challenges, offering new insights into potential solutions. At 7 pm, using a round table format, we will discuss challenges to adopt this type of architecture and how to overcome them. We the invite everyone to unwind and continue their conversations over refreshing drinks and finger foods. 17h30 Doors Opening & Welcome coffee 17h40 Cyber security outlook 17h45 Intro to Zero Trust and Security Service Edge (SSE) 18h 5 Use cases interactive presentation 19h Round table - challenges with SSE adoption 19h30 Drinks Use Cases Presentation Cybersherpa has meticulously chosen five use cases that represent significant business challenges encountered by organisations of multiple sectors. Our event is designed to foster collaboration, providing security professionals from various sectors with a platform to exchange ideas and collaborate on addressing common challenges. USE CASE 1 20 min Improve User Experience & Security for a Distributed Workforce with SSE This use case is developed from the Swiss financial services growth over the last few decades, expanding into key markets such as Singapore, Dubai, and Hong Kong. However, despite this expansion, the communication infrastructure has predominantly remained hosted in Swiss data centers. Additionally, the adoption of remote working and cloud services has placed added strain on the existing infrastructure. As a result, banks and investment firms are now prioritizing the enhancement of employee experience while maintaining a focus on security and compliance as core elements of their architectural strategy. We will share experience and challenges of SSE adoption in the regulated industry. USE CASE 2 15 min Replace VPNs with Zero Trust Network Access (ZTNA) Given the recent series of critical vulnerabilities affecting most VPN technologies, IT and security teams of all sectors are dedicating a significant amount of effort to patching and maintaining legacy infrastructure. These outdated architectures, with an expanded attack surface, fail to adequately protect company data. In light of the escalating cyber threats, nothing within a company network should be implicitly trusted, and verification should consistently be enforced based on a set of policies. USE CASE 3 15 min Accelerate Threat Detection and Response with a Zero Trust Architecture The increase of cyber threats requires that all security solutions work synchronously to detect and prevent breaches. Intelligence should be created and shared across security solutions when near-miss occurs or when specific users are breached. However, multiples solutions tend to create silos which reduce visibility and detection, how can Swiss organisations access to sensitive data based on a dynamic posture aggregated from multiple security signals ? USE CASE 4 20 min Enable productivity with Gen AI Tools while preventing Data Loss with SSE Using generative AI (GenAI) tools like ChatGPT is becoming essential for enhancing employee efficiency, but this widespread adoption introduces new security concerns. As more employees leverage these tools to boost productivity, significant cybersecurity risks, such as leakage of sensitive data, emerge. Blocking access to GenAI sites is non-sense because they are crucial for maintaining a competitive edge. But how can we balance security and innovation, by enforcing robust security policies without hindering access to these innovative tools and stifling progress? USE CASE 5 20 min Enable Secure 3rd party Collaboration and replace legacy VDI More and more banks outsourced part of their activities outside of Switzerland due to shortage of specialist IT staff. But how to enable those teams in an efficient way while remaining compliant with FINMA regulations? Until now, VDI has been the widely adopted solution, but financial services are faced with cost, security and operational challenges. Lighter and more secure options are emerging. Registration First name Last name Email Select the use case you are most interested in Choose an option I accept the terms and conditions of use. Consult here. Register Registration confirmation email sent. Thank you ✅ Location We have a great location at the heart of Geneva thanks to the Geneva TrustVillage . A 5 min walk from Geneva Sécheron train station or Tram 15 stop Maison de la Paix. Location : Av. de Sécheron 15, 1202 Genève, Switzerland An event's carbon footprint significantly decreases when attendees use public transportation. For assistance planning your route, please visit SBB.ch. Cybersherpa Sàrl Main Office: Unlimitrust campus, route des Flumeaux, 48 - 1008 Prilly Lausanne Office: Rue de Genève, 100 - 1004 Lausanne +41 (0) 21 561 36 48 contact@cybersherpa.ch CHE-285.577.616

  • Cyber Infrastructure Security Architect | Cybersherpa

    Cybersherp is recruiting a Cyber Infrastructure Security Architect Cyber Infrastructure Security Architect Contract type Full time employment in Switzerland – contract basis possible. Language French and English (Fluent). German desired. Location Based in our Prilly office near Lausanne. Remote option possible. About the role As a Cyber Infrastructure Security Architect, you will guide our clients towards cyber resilience by co-designing the cyber infrastructure transformation considering governance, protection, detection, response and recovery aspects. Hybrid infrastructures, cloud and on-premises, are there to stay for many organisations in Switzerland. In this context, as a Security Architect you will come with an open mind to solving cybersecurity infrastructure challenges. You will bring innovative approaches (e.g. cloud first and zero trust architecture) as well as an ability to carefully listen to clients' operational, budget and regulatory considerations. You will bring a pragmatic approach to co-develop an enterprise security architecture, suitable for mid-size organisations, that supports clients’ business and security objectives. You will be able to guide the clients to turn this architecture into implementation projects. Using Cybersherpa recommended security architecture framework (SABSA or similar) you will: Rapidly identify the clients’ business context, IT landscape, threats and risks to anchor the transformation in the business objectives. Co-develop with the client a conceptual security architecture with design principles across security functions (e.g. Identify, Protect, Detect, Respond and Recover) Co-develop with the client an overall logical security architecture, the associated transformation roadmap and plans to put it into action. Assist, with the client and other Cybersherpa specialists, in the development of High Level Design (HLD) and Low Level Design (LLD) for the security components such as: Identity and Access Management (IAM, AD, PAM), Network security (NGFW, IPS, WAF, SASE), Cloud Security, Endpoint Security (EDR), secure infrastructure CI/CD pipeline, Security Monitoring (SIEM, XDR). Assist in the solutions proof of concept and technical selection. Act as a Subject Matter Expert through the implementation of the components and provide assurance that the security architecture objectives are met. Co-develop the activities to manage the architecture through life. Who we are looking for You have a minimum of 5 years’ experience in cybersecurity with a proven experience as a security architect in several domains (e.g. network, IAM) and previous experience in contributing to an overall cyber infrastructure security architecture. You have a passion for cybersecurity, are able to communicate with clarity and simplify complex concepts to collaborate effeciently within cross functional teams. You have an educational background in Cybersecurity, or a related field. You have a strong foundation across the Cybersecurity technology stack, including secure Cloud infrastructure in AWS, Azure, or GCP, experience with enterprise networking, security engineering (on-premises and Cloud), and Identity and Access Management principles. You have experience using security technologies such as Zscaler, TrendMicro, Fortinet, Cisco, or similar. An experience of designing cyber infrastructure in an Operational Technology context is desired. Cyber infrastructure certifications desired: CCNA/CCNP, AWS Security and Network Specialties, GCP Network and Security engineer, Azure Security Engineer Associate, Azure Security Architect Expert Other certification desired: SABSA, TOGAF, CISSP, CISM What we offer A unique opportunity to accelerate your career development within a fast-growing cybersecurity firm, strong mentoring, shoulder-to-shoulder learning on practical projects which go from strategy to implementation. An opportunity to continue shaping Cybersherpa services based on market needs. A market competitive salary. A vibrant working environment within the Trust Village, an incubator for trust and cyber start-up. Multiple opportunities to meet other cyber professionals and start-ups. We understand that you may not fulfil all the requirements for this position. We prefer hiring candidates who know their strengths and weaknesses and mentor them to develop. Job Application Please complete the form to apply for a position with us. First Name Last Name Phone Email Address Available Start Date Are you allowed to work in Switzerland? Yes No I accept terms & conditions View terms of use Upload CV Upload supported file (Max 15MB) Submit Thanks for submitting!

  • Top 5 Zero Trust Use Cases, 24th September 2024 in Geneva | Cybersherpa

    Top 5 Zero Trust use cases for cyber resilience Our next event in Geneva, on September 24th ! Top 5 Business Use Cases enabled by Security Service Edge Register now With the participation of Hosted by Sept 24th, 2024 5:30 pm to 8 pm For all sectors Registration Only Geneva Event in FR & EN You have heard of Zero Trust Architecture and Security Service Edge (SSE) but, You are unsure what about the true business benefits for your organisation. You want an open discussion about challenges to adopt such architecture. You want industry leaders point of view as well as peers across sectors. Join us for an event where we'll dive into five use cases for Zero Trust and Security Service Edge (SSE). This event, facilitated by specialists in the field, in collaboration with Zscaler, will enable the collaborative presentation of concrete cases encountered by swiss organisations from multiple sectors. Agenda The event kicks off at 5:30 pm with welcome discussions and an opportunity for networking. At 5.40 we will start with an intro on the global cybersecurity outlook in 2024, followed by an introduction to the concepts of Zero Trust and Security Service Edge. At 6 pm, we delve into five meticulously crafted use cases. These cases are designed to highlight common business challenges, offering new insights into potential solutions. At 7 pm, using a round table format, we will discuss challenges to adopt this type of architecture and how to overcome them. We the invite everyone to unwind and continue their conversations over refreshing drinks and finger foods. 17h30 Doors Opening & Welcome coffee 17h40 Cyber security outlook 17h45 Intro to Zero Trust and Security Service Edge (SSE) 18h 5 Use cases interactive presentation 19h Round table - challenges with SSE adoption 19h30 Drinks Use Cases Presentation Cybersherpa has meticulously chosen five use cases that represent significant business challenges encountered by organisations of multiple sectors. Our event is designed to foster collaboration, providing security professionals from various sectors with a platform to exchange ideas and collaborate on addressing common challenges. USE CASE 1 20 min Improve User Experience & Security for a Distributed Workforce with SSE This use case is developed from the Swiss financial services growth over the last few decades, expanding into key markets such as Singapore, Dubai, and Hong Kong. However, despite this expansion, the communication infrastructure has predominantly remained hosted in Swiss data centers. Additionally, the adoption of remote working and cloud services has placed added strain on the existing infrastructure. As a result, banks and investment firms are now prioritizing the enhancement of employee experience while maintaining a focus on security and compliance as core elements of their architectural strategy. We will share experience and challenges of SSE adoption in the regulated industry. USE CASE 2 15 min Replace VPNs with Zero Trust Network Access (ZTNA) Given the recent series of critical vulnerabilities affecting most VPN technologies, IT and security teams of all sectors are dedicating a significant amount of effort to patching and maintaining legacy infrastructure. These outdated architectures, with an expanded attack surface, fail to adequately protect company data. In light of the escalating cyber threats, nothing within a company network should be implicitly trusted, and verification should consistently be enforced based on a set of policies. USE CASE 3 15 min Accelerate Threat Detection and Response with a Zero Trust Architecture The increase of cyber threats requires that all security solutions work synchronously to detect and prevent breaches. Intelligence should be created and shared across security solutions when near-miss occurs or when specific users are breached. However, multiples solutions tend to create silos which reduce visibility and detection, how can Swiss organisations access to sensitive data based on a dynamic posture aggregated from multiple security signals ? USE CASE 4 20 min Enable productivity with Gen AI Tools while preventing Data Loss with SSE Using generative AI (GenAI) tools like ChatGPT is becoming essential for enhancing employee efficiency, but this widespread adoption introduces new security concerns. As more employees leverage these tools to boost productivity, significant cybersecurity risks, such as leakage of sensitive data, emerge. Blocking access to GenAI sites is non-sense because they are crucial for maintaining a competitive edge. But how can we balance security and innovation, by enforcing robust security policies without hindering access to these innovative tools and stifling progress? USE CASE 5 20 min Enable Secure 3rd party Collaboration and replace legacy VDI More and more banks outsourced part of their activities outside of Switzerland due to shortage of specialist IT staff. But how to enable those teams in an efficient way while remaining compliant with FINMA regulations? Until now, VDI has been the widely adopted solution, but financial services are faced with cost, security and operational challenges. Lighter and more secure options are emerging. Registration First name Last name Email Select the use case you are most interested in Choose an option I accept the terms and conditions of use. Consult here. Register Registration confirmation email sent. Thank you ✅ Location We have a great location at the heart of Geneva thanks to the Geneva TrustVillage . A 5 min walk from Geneva Sécheron train station or Tram 15 stop Maison de la Paix. Location : Av. de Sécheron 15, 1202 Genève, Switzerland An event's carbon footprint significantly decreases when attendees use public transportation. For assistance planning your route, please visit SBB.ch. Cybersherpa Sàrl Main Office: Unlimitrust campus, route des Flumeaux, 48 - 1008 Prilly Lausanne Office: Rue de Genève, 100 - 1004 Lausanne +41 (0) 21 561 36 48 contact@cybersherpa.ch CHE-285.577.616

  • Partners | Cybersherpa

    Cybersherpa brings its pragmatic and independent cyber expertise to help your organization select and integrate cybersecurity solution from trusted partners. Cybersherpa advises your organization on opportunities to reduce cyber risks with these solutions while ensuring that budget, privacy, compliance, operations, IT and security architecture, and user experience are fully taken into account Trusted Partners Cybersherpa brings its pragmatic and independent cyber expertise to help your organization select and integrate cybersecurity solutions adapted to its needs. Our strong experience also relies on building trusted relationships, training, certifications and partnerships with technology providers to meet business needs. Cybersherpa advises your organization on opportunities to reduce cyber risks with these solutions while ensuring that budget, privacy, compliance, operations, IT and security architecture, and user experience are fully taken into account. Panop

  • Trend Micro | Cybersherpa

    Cybersherpa has partnered with TrendMicro and is an authorized reseller of TrendMicro products and services. Cybersherpa brings a pragmatic cyber expertise to help your organisation select and integrate the fit for purpose cyber solutions. Cybersherpa will advise on the cyber risk reduction opportunities while making sure budget, operations, IT & security architecture, as well as user experience are fully considered. NEWS! Cybersherpa has partnered with Trend Micro and is an authorized reseller of Trend Micro products and services. Partnership with Trend Micro We believe that managing your cyber risk is an integral part of your business strategy and ultimate success. Leveraging over 35 years of security expertise and technology foresight, Trend Micro is transforming the world of cybersecurity. Cybersherpa brings a pragmatic cyber expertise to help your organisation select and integrate the fit for purpose cyber solutions. Cybersherpa will advise on the cyber risk reduction opportunities while making sure budget, operations, IT & security architecture, as well as user experience are fully considered. Register for a Free Trial Trend Vision One Trend Vision One provides a holistic view of all risks, vulnerabilities and what needs to be done to continuously increase resilience. Centralised management of solutions, management of the attack surface, high automation, modular system are just some of the advantages of a platform. The most important, however, is that silos are broken down and visibility can be guaranteed across all security tools - so an attacker can be stopped quickly and efficiently. The technical analysis will consist of: Cloud Posture Assessment External Attack Surface Assessment Exchange Online Mailbox/Gmail Assessment At-Risk Endpoint Assessment Phishing Simulation Assessment Vulnerability Assessment

  • 404 | Cybersherpa

    THERE’S NOTHING HERE... The link you followed may be broken, or the page might have moved. Back to Homepage

  • About | Cybersherpa

    We are thrilled to introduce our founding members, the driving force behind Cybersherpa's vision and success. Based in the vibrant cyber landscape of Switzerland, our founding partners brings a wealth of experience as a highly regarded cybersecurity professionals. With careers spanning major cyber consulting firms, proven cyber experience in public and private sectors, we bring a rich variety of skills and insights that enrich our team's capabilities. Who are we? Team of proven professionals, with deep and pragmatic cyber expertise Based in the vibrant cyber landscape of Switzerland, our founding partners brings a wealth of experience as a highly regarded cybersecurity professionals. With careers spanning major cyber consulting firms, proven cyber experience in public and private sectors, we bring a rich variety of skills and insights that enrich our team's capabilities. Our common passion in cybersecurity is to make a sustainable impact for our clients by helping their organisation become cyber-resilient. Jean-Loup Ravinet Founder, Partner Jean-Loup is a seasoned cyber security leader with more than 20 years’ experience helping organisations strengthen their security posture and achieve business resilience. He specialises in designing and leading security programmes that transform clients’ cyber infrastructures in line with strategic objectives. He holds industry-recognised certifications, including CISSP and CCSP, and is a certified Security Architect (SABSA). In addition, he is trained as an AWS and Google Cloud Security Engineer and is Zscaler Zero Trust certified. Jean-Loup also brings strong business acumen as an MBA-qualified leader, bridging the gap between technical expertise and executive priorities. Omar Guemmi Partner Omar is an international leader in application security, AI governance, and data protection with more than 17 years of global experience helping organizations strengthen cyber resilience, ensure digital sovereignty, and secure cloud environments. He specialises in designing and leading security and governance programmes that align with corporate strategy, protect critical assets, and enable trusted digital transformation. He holds industry-recognised certifications, including ISO/IEC 42001:2023 (AI Management System), ISO/IEC 27001 Lead Implementer, CISM, CISA, PMP, and AIGP, as well as Microsoft Certified Cybersecurity Architect Expert and Azure Solutions Architect. Fluent in several languages and a former Swiss Kung Fu champion, Omar combines discipline, innovation, and executive insight to bridge the gap between technology, governance, and business priorities. Dergin Tiritoglu Partner Dergin is a senior security architect, with over 10 years of experience, breadth and depth of technical knowhow to safely deliver the business mission. Extensive technical skills and expertise gained in high-profile sectors including finance, energy, telecoms, pharmaceuticals, and public sector. Skilled in security strategy, and delivery of ‘secure by design' solutions that meet both current and future challenges across cloud, on-prem and managed platforms. Join us Cybersherpa is recruiting! Cyber Infrastructure Security Architect The Cybersherpas Community Cybersherpa has developed a worldwide network of independent cyber talents, “the cybersherpas”, who join forces on project basis. This ensures our clients get the right level of specialised support while our community grows with Cybersherpas who do what they love and are best at what they do. We continuously grow our community, in particular for the following domains of expertise: Enterprise Security Architecture Cyber Infrastructure Security Architecture and Engineering Cloud Native Security Architecture and Engineering Join our Cybersherpas' community What is happening? Company News News latest Aout 2025 Omar Guemmi joins Cybersherpa as a Partner, bringing his expertise in Governance & Compliance, Microsoft security, Application security and Data protection. Welcome Omar! New Point of view paper published May 2025 Cybersehrpa published, in collaboration with Artes Juris a PoV on cloud security and sovereignty in EU and Switzerland Partnership with DuoKey February 2025 Cybersherpa has partnered with DuoKey to unlock cloud & AI security and sovereignty ! Partnership with Palo Alto January 2025 Cybersherpa is very pleased to announce a partnership with Palo Alto with a specialisation on Prisma Cloud and AI SPM Selected by the >_Trust Village March 2024 Cybersherpa has been selected to join the Trust Village in Lausanne, an incubator of cyber and trust companies in Switzerland. The move will be effective by March 15th. Our head office remains unchanged. TrendMicro is now a partner! February 2024 Cybersherpa is very pleased to announce a partnership with Trend Micro and is now an authorised reseller of Trend Micro products and services. Zero Trust event in Geneva September 2024 Cybersherpa hosts a successful event at the Geneva Trust Village with its partners: Zscaler, Ducksify (Panop) and e3. Cybersherpa partners with Panop for Attack Surface Management June 2024 Cybersherpa accelerates its Zero Trust assessments with Panop, an innovative solution to detect and remediate the cyber attack surface Cybersherpa launches Cloud Security Assurance June 2024 Cybersherpa extends its services to cloud with combining its cloud security specialists and AI powered tooling to establish a diagnostic of clients' cloud security posture and provide actionable recommendations. Zscaler is now a partner! February 2024 Cybersherpa is very pleased to announce a partnership with Zscaler and is now an authorised reseller of Zscaler products and services in EMEA. Cybersherpa is registered December 2023 Cybersherpa is registered as a Sàrl in Lausanne.

  • Cybersherpa Cloud Security Assurance

    Cloud and AI Security Assurance Book a meeting Approach A 5 steps approach combining our cloud security specialists and AI powered tooling to establish a diagnostic of your cloud security posture and provide actionable recommendations. Day 1- Initiate the service. 1-2h call to gather business and architecture context Day 2 - Onboarding of AI-SPM Palo Alto Primsa tool Day 2 to 4 - Monitoring with Prisma tool for a minimum 48h. Expert analysis Day 4 - Share interim report during 1-2h feedback call to refine findings Day 5 - Issue final report with 1-2h workshop to go through recommendations Scope of Services Comprehensive cloud security assessments designed for SMEs to augment your cloud and security team with a specialized service. Cloud and AI Security Initial Health Check Objective: Identify vulnerabilities and security gaps. Scope: Configuration review against chosen security framework (vendor specific, CIS, NIST, ISO) Deliverables: Report with actionable recommendations, 2-4 hours workshop in-person to detail actionable recommendations and jointly articulate risks Ongoing Cloud Security Remediation Services Objective: Continuous security monitoring and updates. Scope: Implement recommendations, regular audits, incident response, employee training. Deliverables: Monthly reports, real-time alerts, quarterly reviews. Scope of services Module options Infrastructure security review (default) Code pipeline security review Workload security review Microservices (Kubernetes) Security review Services covered: Platforms: AWS, Azure, GCP, Oracle Cloud Infrastructure (OCI), SaaS : Microsoft M365, Google Cloud Workspace, Salesforce Microservices : Kubernetes Cloud Security Posture Management tooling: Leading CSPM (Palo Alto Prisma Cloud) or Native Cloud Security tooling or other CSPM on demand. Why Cybersherpa for cloud and AI security assurance? 1 - Tailored security assurance. We adapt to the context of your company profile and data sensitivity. 2- Our experts and methodology enable us to get to the essential quickly. We use automation and AI powered tools to maximise the impact and value of our cloud security review. 3 - You get to choose the tooling (3rd party CSPM or native security assessment) so that you can continue using it once the review is completed. 4 - Our output comes with actionable recommendations to remediate security issues with clear prioritisation 5 - We provide a range of options to continue support you on an ongoing basis.

bottom of page