Ensure your processes, policies and operations align with your security posture.

What controls do you have in place to mitigate security risks?

A comprehensive security posture includes a consistent and evolving set of technical and operational controls that ensure risks of security breaches and data lost are minimized. Controls, processes and policies are an important but often time consuming activity required by many businesses. The Technology and Risk Advisory group are specialists in assisting companies with the process of elicitation of requirements, engaging all parties and ensuring the resulting security controls meet business and operational goals.

Internal Controls Reporting

Specialized internal controls reports tailored to organizational or regulatory requirements.

SOX Reports

Assistance in the creation of investment-related internal controls reports for publicly traded companies.

SOC 1 & 2 Reporting

Assistance in preparing System Organization and Controls reports for compliance and for trust service principles/criteria.

Business Analysis

Developing new ideas? Creating a new application or managing migration from older business applications? BA excercises and consulting can help ensure large projects with many stakeholders stay on task and on budget.

Process Improvement

Evaluate your current processes to gain an understanding of where gaps in security can be closed, and more efficient operations can be achieved.

Technology and Risk Advisory Contacts:

Paul Schmidt

CPA, CA, CITP, Information Technology

Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881

Vaclav Vincalek

Managing Director,
Technology & Advisory Services

Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Articles:

Check Point Software Technologies Reports Third Quarter 2020 Financial Results

We announced the acquisition of Odo Security, a new cloud-based SASE ... connectivity to datacenter applications, web applications, cloud services ...
Read More
/ Cyber Security News

Mounting cyber threat to critical infrastructure ramps up UK countermeasures

10 steps to reduce the impact of security breaches. According to the NCSC, most cyber attacks have four stages: Survey, ...
Read More
/ Cyber Security News

Cloud Security in Energy Sector Market 2020: Industry Overview by Size, Share, Future Growth …

Cloud Security in Energy Sector Report 2020 (value and volume) by company, regions, product types, end industries, history data and ...
Read More
/ Cyber Security News

Ex-Grand Prix CEO liable for nearly $2 million

... used the corporation to perpetrate a fraud upon its creditors," Bailey wrote in ... and filing false tax returns, ...
Read More
/ Cyber Security News

Beware Microsoft computer messages

Remember, do not allow anyone you don't know access your computer. • • •. If your child's ID is stolen ...
Read More
/ Cyber Security News

Whats The Future Of Cloud

Cloud computing and IoT are allowing for enhanced security features and reliability” says Seedoyal, outlining that future of cloud is ...
Read More
/ Cyber Security News

Web application security testing owasp

web application security testing owasp OWASP has 32 000 volunteers around the world who perform security assessments and research. The ...
Read More

Toolkit developed by BRC aims to counter cyber attacks in retail sector

Last year, retailers spent over £186 million on cyber security, but the growth in online selling means there's an increasing ...
Read More
/ Cyber Security News

Data Reply Achieves AWS Machine Learning Competency Status

With strong competences in Big Data Engineering, Data Science and IPA, Data Reply builds Big Data platforms and implements ML ...
Read More
/ Data Analytics