// ABOUT
A cybersecurity practice built for Cyprus's regulated SMEs.
Tessera Cyber is a Cyprus-based cybersecurity practice serving CIFs, law firms, accounting practices, fintechs, and other regulated SMEs. We do one thing: give you a named security lead for a fraction of the cost of a full-time hire, backed by a vetted bench of specialists.
// WHAT WE DO
We sit between your IT provider and your regulator.
Your IT provider keeps systems running. Your regulator, your insurer, and your board want evidence that those systems are secure. Someone has to translate between them — write the policy, audit the access, sign the scorecard, answer the questionnaire, brief the directors.
That's us. Tessera Cyber is the named security function for Cyprus SMEs that need someone accountable for the security layer without hiring a full-time CISO at €100,000+ a year.
// HOW WE'RE BUILT
One accountable lead. A vetted specialist bench.
Tessera engagements are delivered through a deliberately lean model. A single accountable lead owns the client relationship, scopes the work, and signs the deliverables. Specialist contributors — identity engineers, ISO 27001 lead auditors, GRC analysts, offensive-security testers, DORA/NIS2 specialists.
For a Cyprus CIF, an accounting firm, or a fintech, this means two things:
One number to call.
One person who signs the attestation, answers the questionnaire, and sits in the regulator conversation.
The right specialist for the work.
The person reviewing your access controls holds the identity credential. The person running your gap analysis holds the ISO 27001 credential. We don't pretend one generalist covers everything.
// OUR DELIVERY BENCH
Roles and credentials, not headcount.
M365 / Azure Security Engineer
MS-500 certified · 5+ years hands-on
GRC Analyst
ISO 27001 Lead Auditor · CQI/IRCA-trained
Penetration Tester
OSCP-certified · Cyprus and EU engagements
DORA / NIS2 Specialist
Regulated-sector engagements · Big 4 alumni pattern
// THE A.I.D. FRAMEWORK
Identity governance, made auditable.
Modern security starts with identity. Every auditor, insurer, and enterprise client asks the same question: who has access to your systems, and can you prove it?
A.I.D. is the practical framework Tessera uses to give them an answer. It maps to every modern compliance regime — DORA, NIS2, ISO 27001, SOC 2, and the controls your insurer is already scoring you against.
Authority
Who can grant, change, or revoke access? Tessera documents the chain of authority — who decides, who approves, who reviews. Without this, every other control is theatre.
Inventory
What systems, accounts, integrations, and non-human identities (service accounts, API keys, AI agents) exist in your estate? Most firms can't produce this list. Tessera builds it.
Delegation
How are access decisions delegated, and how is that delegation reviewed? The governance loop that turns a list of permissions into a defensible security program.
Originally developed for identity-governance engagements across UK, EU, US, and Australian clients. Published in the Cyprus Mail.
// WHO TESSERA WORKS WITH
Primary focus — Cyprus regulated sector.
CySEC-licensed Investment Firms (CIFs)
DORA · C700 reporting · ICT risk frameworks
Law firms
NIS2 important-entity obligations · client data protection
Accounting & corporate services
NIS2 important entities · GDPR · insurer requirements
Fintechs & CASPs
MiCA authorisation · DORA · audit-ready ICT governance
// ALSO ENGAGING
EU SMEs needing fractional CISO support
Remote vCISO retainers across the EU
Ready to see where you actually stand?
Book a Free 30-min Quick Look. Honest verdict, no obligation.
Book a Free 30-min Quick Look