A key to retaining operational resiliency is to ensure processes support secure networks and data.

¬†Creating better operational processes to make your business more competitive is also an opportunity to make sure security measures are hardened as well. Evaluating processes to ensure they align with measurable security goals should be an important part of any change management process. The Technology and Risk Advisory group can provide assistance in creating sound ITIL change management processes that ensure a business can mature it’s overall security posture positively and effectively.

Technology and Risk Advisory Contacts:

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Articles:

Grandma Ordered To Delete Grandchildren’s Photos From Facebook Or Pay Fine

GDPR rules typically don't apply to “purely personal” or “household” processing of data, but in this case the judge ruled ...
Read More
/ GDPR

Truecaller data of 47 million Indians breached, company denies

Security report suggest data of popular caller ID app Truecaller was leaked. That's not all, it says the data was ...
Read More
/ Cyber Security News

Naga Munchetty erupts at Matt Hancock over track and trace scheme ‘Sticks in our throat!’

GDPR nightmare.' ... “There are very strict confidentiality rules that are in place, both under GDPR and the medical system ...
Read More
/ GDPR

Why zero trust security needs strong hardware foundations

These are the ability to detect and protect against threats; keeping user ... at boosting the ability of security tools ...
Read More
/ Cyber Security News

Antivirus Software Market 2020 Industry Insights by Growth, Emerging Trends and Forecast to 202

Over the years, cyber security threats have increased rapidly worldwide. ... In addition, usage of the internet and growth in ...
Read More
/ Cyber Security News

Yotpo releases report on user generated content

Compliance with GDPR rules is the biggest challenge facing brands when it comes to leveraging user-generated content. The Rise of ...
Read More
/ GDPR

Solving the security challenges of remote working

The use of data loss prevention (DLP) technology can significantly mitigate this, giving businesses much more ... to quickly detect ...
Read More
/ Cyber Security News

Top 10 Vulnerabilities In Web Apps You Can Prevent With Testing

The OWASP Top 10 2017 is a list of the most significant web application security risks. How are you addressing ...
Read More
/ OWASP

Analytics Round Table 2020: Diagnosing Data

Akixi's Colin Gill told us that some of the biggest challenges businesses face today are analysis paralysis and figuring out ...
Read More
/ Data Analytics
Loading...