How I Work

Security Transformation is a Capability You Build

Security Transformation is a Capability You Build

Security transformation is not a product you purchase. It is a capability you build. I offer four interconnected service pillars that can be engaged individually or as a comprehensive program, depending on where you are in your security journey. Every engagement begins with a conversation, not a sales pitch.

Schedule a Conversation

Frequently Asked Questions

Common questions about working with GrayMatter. If your question is not answered here, let's talk directly.

Start a Conversation
Image about how does an engagement typically start?

How does an engagement typically start?

Every engagement begins with a conversation. We discuss your challenges, I ask questions to understand your context, and together we determine if there is a fit. If there is, I propose a scope and approach. No lengthy procurement processes unless you require them.

Learn More
Image about are you affiliated with any vendors?

Are you affiliated with any vendors?

No. Zero vendor partnerships. Zero referral fees. Zero kickbacks. When I recommend a product or approach, it is because I believe it serves your interests, not because I have a financial relationship with the vendor. This independence is non-negotiable.

Learn More
Image about can you handle multiple clients?

Can you handle multiple clients?

Yes, within limits. I typically work with 2-3 clients concurrently, depending on engagement intensity. I am transparent about availability and will tell you upfront if timeline constraints exist. I do not overcommit.

View Services
Image about what do i actually get at the end?

What do I actually get at the end?

Concrete deliverables, not just advice. Every engagement produces tangible artifacts: assessment reports, architecture documents, roadmaps, decision matrices, or board presentations. You own these deliverables. See each service page for specific artifact lists.

Schedule a Conversation
Image about what is your communication style?

What is your communication style?

Direct, honest, and efficient. I tell you what I think, including when I think you are wrong or when a timeline is unrealistic. I do not pad estimates or tell you what you want to hear. If that directness is not a fit, I am not the right consultant for you.

00 years

Enterprise security experience at Swiss Post including Zero Trust program leadership

000 +

Subsidiaries Managed

000000 +

End Users Served

40000

Endpoints in Transformation Program

A image about [object object]

Why Direct Engagement Works

Large consulting firms have their place, but for security architecture and transformation leadership, direct engagement with an independent architect often delivers better outcomes. You get the expert directly. My success is measured by your outcomes, not my utilization.

  • No consultant rotation problem with constant re-education
  • No incentive misalignment from utilization pressure
  • Recent hands-on experience, not abstract guidance
  • Swiss-based with deep regulatory expertise
  • Transparent pricing and availability
  • Knowledge transfer built into every engagement
Related Services

Explore Other Service Pillars

Image about assess

Assess

Understand your current security posture, Zero Trust maturity, and AI readiness through structured evaluation against proven frameworks.

Read MoreDetails
Image about architect

Architect

Design the target state architecture that balances security requirements, business constraints, and implementation feasibility.

Read MoreDetails
Image about guide

Guide

Navigate vendor selection and oversee implementation to ensure the architecture vision translates into operational reality.

Read MoreDetails

Common Questions About This Service

Every engagement begins with a conversation - not a sales pitch. We discuss your challenges, I ask questions to understand your context, and together we determine if there's a fit. If there is, I propose a scope and approach. No lengthy procurement processes unless you require them.

Get Started

Ready to Transform Your Security Posture?

Whether you need a Zero Trust maturity assessment, a security architecture review, or guidance on integrating AI into your security operations, I am here to help. No sales process. No discovery calls with junior staff. Let us talk directly about your challenges.

000000 +

End Customers

B2C, B2B, and B2E user populations served

000 +

Subsidiaries

Each with varying security maturity integrated

0000 +

Public Domains

Secured across the enterprise footprint