A key to retaining operational resiliency is to ensure processes support secure networks and data.

¬†Creating better operational processes to make your business more competitive is also an opportunity to make sure security measures are hardened as well. Evaluating processes to ensure they align with measurable security goals should be an important part of any change management process. The Technology and Risk Advisory group can provide assistance in creating sound ITIL change management processes that ensure a business can mature it’s overall security posture positively and effectively.

Technology and Risk Advisory Contacts:

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Articles:

Check Point Software Technologies Reports Third Quarter 2020 Financial Results

We announced the acquisition of Odo Security, a new cloud-based SASE ... connectivity to datacenter applications, web applications, cloud services ...
Read More
/ Cyber Security News

Mounting cyber threat to critical infrastructure ramps up UK countermeasures

10 steps to reduce the impact of security breaches. According to the NCSC, most cyber attacks have four stages: Survey, ...
Read More
/ Cyber Security News

Cloud Security in Energy Sector Market 2020: Industry Overview by Size, Share, Future Growth …

Cloud Security in Energy Sector Report 2020 (value and volume) by company, regions, product types, end industries, history data and ...
Read More
/ Cyber Security News

Ex-Grand Prix CEO liable for nearly $2 million

... used the corporation to perpetrate a fraud upon its creditors," Bailey wrote in ... and filing false tax returns, ...
Read More
/ Cyber Security News

Beware Microsoft computer messages

Remember, do not allow anyone you don't know access your computer. • • •. If your child's ID is stolen ...
Read More
/ Cyber Security News

Whats The Future Of Cloud

Cloud computing and IoT are allowing for enhanced security features and reliability” says Seedoyal, outlining that future of cloud is ...
Read More
/ Cyber Security News

Web application security testing owasp

web application security testing owasp OWASP has 32 000 volunteers around the world who perform security assessments and research. The ...
Read More
/ OWASP

Toolkit developed by BRC aims to counter cyber attacks in retail sector

Last year, retailers spent over £186 million on cyber security, but the growth in online selling means there's an increasing ...
Read More
/ Cyber Security News

Data Reply Achieves AWS Machine Learning Competency Status

With strong competences in Big Data Engineering, Data Science and IPA, Data Reply builds Big Data platforms and implements ML ...
Read More
/ Data Analytics
Loading...