Secure your data and protect your business from cyber threats.

Being a target is expected. Becoming a case study shouldn't be.

In an increasingly digital world, organizations continue to adopt technologies that put mission-critical data and tools online and in the cloud. As the reliance on technology to make businesses more competitive continues, interruptions caused by security issues can create serious consequences.

The Technology and Risk Advisory group provides services designed to gather situational information, build strategy, and implement effective controls to mitigate risks to technology and critical business data.

Web Application Security

Vulnerability assessment and penetration testing on web applications, as well as customized compliance reports and application remediation assistance.

IT Vulnerability Assessment

Ensuring critical network, server, and data infrastructure is managed and secured against tampering and data loss. TaRA provides advanced reporting to manage vulnerabilities and source solutions to ensure technology infrastructure risk is mitigated.

Business Analysis

Process and technical operation can often expose potential gaps in security that are often overlooked until it is too late. A comprehensive security plan should include evaluation of operation of technology, policies, and business continuity plans.

Critical Incident Response

Having a well designed plan for incidents can mean the difference between a minor inconvenience, and business being interrupted for extended periods. Protect your operations, your data, and your brand by having a ready plan to put into action the moment an issue arises.

Penetration Testing

“Red Team” exercises designed to test all aspects of a business’ technology, policies, procedure and even people. Full penetration testing can provide a complete situational analysis of an organization’s security posture.

Technology and Risk Advisory Contacts:

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

CYBER SECURITY ARTICLES:

OWASP ZAP From Scratch

Stop compromising your system and switch from using pirated Burpsuite tool to Zed Attack Proxy tool ...
Read More
/ OWASP

Cyber Insurance Market Scenario (2019-2028) | In-Depth Study PDF Report

The Global Cyber Insurance Market Report is equipped with market data from 2019 to 2028. The report provides a market ...
Read More
/ Insurance

OWASP ZAP From Scratch

OWASP ZAP From Scratch. Stop compromising your system and switch from using pirated Burpsuite tool to Zed Attack Proxy tool ...
Read More
/ OWASP

Why simplifying cybersecurity is essential for mutual fund boards of directors

Moreover, for mutual fund boards of directors, cybersecurity is a daunting task, and one ... with exercising their business judgement ...
Read More
/ Insurance

Cyber Insurance Market Report 2019 Global Industry Statistics & Regional Outlook to 2025

The ' Cyber Insurance market' research report now available with Market Study Report, LLC, is a compilation of pivotal insights ...
Read More
/ Insurance

Around the P&C insurance industry: June 26, 2019

Coalition, a technology-enabled cyber insurance solution, and Curricula, a security awareness training provider, announced a partnership to bring ...
Read More
/ Insurance

Marshals Service warns of surge in scam calls

... to provide confidential data, potentially leading to identity theft and fraud. ... Collectively, the defendants in these cases were ...
Read More
/ Cyber Security News

Global Digital Valve Positioner Market Forecast, Trend, Marketing Channels, Industry Forecast To …

Place An Inquiry Before Purchase (Use Corporate Details Only):https://market.us/report/global-cyber-insurance-market/inquiry. Some of the Major ...
Read More
/ Insurance

Webgoat zip

The OWASP WebGoat Benchmark is a Java test suite designed to verify the speed and accuracy of vulnerability detection tools ...
Read More
/ OWASP
Loading...