Ensure your processes, policies and operations align with your security posture.

What controls do you have in place to mitigate security risks?

A comprehensive security posture includes a consistent and evolving set of technical and operational controls that ensure risks of security breaches and data lost are minimized. Controls, processes and policies are an important but often time consuming activity required by many businesses. The Technology and Risk Advisory group are specialists in assisting companies with the process of elicitation of requirements, engaging all parties and ensuring the resulting security controls meet business and operational goals.

Internal Controls Reporting

Specialized internal controls reports tailored to organizational or regulatory requirements.

SOX Reports

Assistance in the creation of investment-related internal controls reports for publicly traded companies.

SOC 1 & 2 Reporting

Assistance in preparing System Organization and Controls reports for compliance and for trust service principles/criteria.

Business Analysis

Developing new ideas? Creating a new application or managing migration from older business applications? BA excercises and consulting can help ensure large projects with many stakeholders stay on task and on budget.

Process Improvement

Evaluate your current processes to gain an understanding of where gaps in security can be closed, and more efficient operations can be achieved.

Technology and Risk Advisory Contacts:

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Articles:

AI for CyberSecurity: Managing Threats and Upscaling Risk Management

The manipulation of political systems, threat to national security, ... Incorporating, an AI-driven cybersecurity model to augment current cyber ...
Read More
/ Cyber Security News

‘Oblivious’ Drizly Reported Breach 5 Months Late, Suit Says

"Despite Drizly's claims of 'trust,' Drizly's deficient data security measures left its customers' sensitive customer data vulnerable to hackers who ...
Read More
/ Cyber Security News

SSP to host education event on identity theft

ALTON — Senior Services Plus is hosting a Zoom presentation discussing identity theft on Monday, Sept. 21 from 10-11 a.m ...
Read More
/ Cyber Security News

More than 400000 hit by data breach at online exam site — what to do

It added, “ProctorU has implemented additional security measures to prevent any recurrence. We have begun notifying affected universities and ...
Read More
/ Cyber Security News

Crystal Kinzel recognized for work on Identity Theft and Fraud Alert Task Force

... your personal records from criminals seeking to steal your identity. ... she has been proud to work closely with ...
Read More
/ Cyber Security News

Games, not shame: Why security awareness training needs a makeover

"If you opened up the Verizon Data Breach Investigations Report this year," ... Hacking and breaches in general, according to ...
Read More
/ Cyber Security News

Financial Services Security Software Market 2020 Industry Size, Trends, Global Growth, Insights …

The rapidly changing market scenario and initial and future assessment of the impact is covered in the report. The report ...
Read More
/ Cyber Security News

More fraud in the midst of pandemic: Emergency funding scamm

More fraud in the midst of pandemic: Emergency funding scamm ... The scammers use stolen identities to file claims for ...
Read More
/ Cyber Security News

Ransomware Hackers Post Data From 2 Providers, Device Manufacturer

... a potential data breach. Suspicious activity was detected in a number of employee email accounts, and steps were taken ...
Read More
/ Cyber Security News
Loading...