"We are building Zyense with the goal of becoming one of the leading players in cybersecurity in the Nordics"

Emil Gullers
CEO
Our toolbox
We have the experience, competence, methods, and tools
01
Experiences:
Development of a Cybersecurity Strategy for a leading Telco in the US.
Design and implementation of management systems and operational models for a global company (Fortune 500) in the manufacturing industry.
Support for the implementation of DORA for a Nordic insurance company.
Design and implementation of PKI for a public entity in Sweden.
PMO during the implementation of IAM and PAM for a European media group.
02
Skills:
We have senior, experienced, and certified consultants in security governance, compliance, leading standards, security architecture, identity and access management, internal IT audit, threat modeling, third-party risks, integrated risk management, etc.
Our consultants are always up to date with the latest in cybersecurity.
03
Methods:
We use a range of proven methods in cybersecurity that provide our clients with faster implementations and more sustainable results. For example, methods for:
rapid implementation and certification according to ISO27001.
Identification and protection of critical information assets (“crown jewels”).
Design and implementation of Integrated Cyber Risk Management (ICRM).
Step-by-step implementation of IAM and PAM.
We continue to work with the most commonly used project models, have structured quality assurance in everything we do, and can also provide certified teams for internal IT audits.
04
Tools:
We work with the most widely used standards and the latest regulations:
ISO27001, CIS Controls, NIST800-53, NIST CSF, COBIT, ISF, TOGAF, ITIL, etc.
NIS2, DORA, GDPR, PCI-DSS, Cloud Act, AI Act, TISAX, CER, etc.
CISA, CGEIT, CISM, CRISC, CISSP, etc.
This is zyense
We are always curious, humble, and creative – each assignment is unique, just like our customers.
Emil Gullers
CEO
Lars Elvroth
Senior Advisor
Sofia Dahlström
HR