Ensure your processes, policies and operations align with your security posture.

What controls do you have in place to mitigate security risks?

A comprehensive security posture includes a consistent and evolving set of technical and operational controls that ensure risks of security breaches and data lost are minimized. Controls, processes and policies are an important but often time consuming activity required by many businesses. The Technology and Risk Advisory group are specialists in assisting companies with the process of elicitation of requirements, engaging all parties and ensuring the resulting security controls meet business and operational goals.

Internal Controls Reporting

Specialized internal controls reports tailored to organizational or regulatory requirements.

SOX Reports

Assistance in the creation of investment-related internal controls reports for publicly traded companies.

SOC 1 & 2 Reporting

Assistance in preparing System Organization and Controls reports for compliance and for trust service principles/criteria.

Business Analysis

Developing new ideas? Creating a new application or managing migration from older business applications? BA excercises and consulting can help ensure large projects with many stakeholders stay on task and on budget.

Process Improvement

Evaluate your current processes to gain an understanding of where gaps in security can be closed, and more efficient operations can be achieved.

Technology and Risk Advisory Contacts:

Paul Schmidt

CPA, CA, CITP, Information Technology

Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881

Vaclav Vincalek

Managing Director,
Technology & Advisory Services

Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Articles:

The Flip Side of Amazon

Amazon tends to be a dirty word in the residential security services industry, because ... Taking this path requires that ...
Read More
/ Cyber Security News

Network Segmentation: The First Line of Defense

Network segmentation is the security integrator's first and most important line of defense against a data breach. It is a ...
Read More
/ Cyber Security News

Lightning can strike twice: Marriott International suffers second data breach

After the previous data breach, one would have hoped that Marriott had really locked down its cybersecurity to ensure it ...
Read More
/ Cyber Security News

EHNAC Announces Launch of Privacy and Security Toolkit

... healthcare data, today announced the addition of new Privacy and Security ... cybersecurity, breach and enforcement, makes privacy and ...
Read More
/ Cyber Security News

Data science to debut as the UO’s newest major this fall

With all reviews completed and final approvals in hand, the data science ... “I am thrilled that the UO is ...
Read More
/ Data Analytics

Rise of the Machines: How Big Data is Changing More Than Just Portfolio Management

For policy-making efforts, the various SEC divisions rely on the Office of Data Science and the Division of Economic Research ...
Read More
/ Data Analytics

Okta Waves Flag For ‘Platform-First’ Approach To Identity Management

... it's User eXperience analysis or whether it's big data analytics and so on. ... But if firms like Okta ...
Read More
/ Data Analytics

Big Data Analytics in Healthcare Market Size Analysis, Top Manufacturers, Shares, Growth …

Big Data Analytics in Healthcare Market Size Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026. By Navanath R ...
Read More
/ Data Analytics

Cyber Insurance Market (COVID-19 UPDATE) Anticipated to Grow at a Significant Pace by 2026 …

Global “Cyber Insurance Market” 2020 Report comprises of strong research of global business which empowers the consumer to look at ...
Read More
/ Insurance