Ensure your processes, policies and operations align with your security posture.

What controls do you have in place to mitigate security risks?

A comprehensive security posture includes a consistent and evolving set of technical and operational controls that ensure risks of security breaches and data lost are minimized. Controls, processes and policies are an important but often time consuming activity required by many businesses. The Technology and Risk Advisory group are specialists in assisting companies with the process of elicitation of requirements, engaging all parties and ensuring the resulting security controls meet business and operational goals.

Internal Controls Reporting

Specialized internal controls reports tailored to organizational or regulatory requirements.

SOX Reports

Assistance in the creation of investment-related internal controls reports for publicly traded companies.

SOC 1 & 2 Reporting

Assistance in preparing System Organization and Controls reports for compliance and for trust service principles/criteria.

Business Analysis

Developing new ideas? Creating a new application or managing migration from older business applications? BA excercises and consulting can help ensure large projects with many stakeholders stay on task and on budget.

Process Improvement

Evaluate your current processes to gain an understanding of where gaps in security can be closed, and more efficient operations can be achieved.

Technology and Risk Advisory Contacts:

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Articles:

Does Singapore’s Ministry of Health deserve immunity for data breach?

Singapore's largest data breach happened in July 2018 when a government hospital became the target of cyber-hackers. It is believed ...
Read More
/ Cyber Security News

Head-To-Head Review: SINGAPORE TELEC/S (SGAPY) versus Oi SA em Recuperacao Judicial …

The Group Enterprise segment offers mobile, equipment sales, fixed voice and data, managed, cloud computing, cyber security, and IT and ...
Read More
/ Cyber Security News

Social Media Analytics Is A Disaster: Why Can’t We Fix It?

Social media platforms have created a reality distortion field that promotes them as the very definition of “big data” while ...
Read More
/ Data Analytics

Q&A: How to respond to the latest big data breach?

Around 617 million online account details have been stolen from 16 hacked websites, and these have been placed are on ...
Read More
/ Cyber Security News

Q&A: How to respond to the latest big data breach?

According to the seller of these credentials, the data for one of the websites has ... From all that data, ...
Read More
/ Data Analytics

Fontana’s crime rate goes down for the second straight year

Despite the good news regarding the steep decline in thefts, Green ... by a rash of mailbox vandalism, resulting in ...
Read More
/ Cyber Security News

Coinmama Cryptocurrency Exchange Faces Security Breach: Data of 450000 Users At Risk

However, a recent announcement from Coinmama states that the platform has gone through a major security breach - where data ...
Read More
/ Cyber Security News

Technological revolution and the jobs of tomorrow

... cities, the Internet of Things and Internet of Everything, Artificial Intelligence (AI) and Machine Learning, Big Data analytics, Blockchain ...
Read More
/ Data Analytics

Holder Harvard Management Co Has Raised Facebook (FB) Stake; As International Business …

It has underperformed by 21.12% the S&P500. ... greater regulation in the wake of data breach; 14/03/2018 – IBM Study: ...
Read More
/ Cyber Security News
Loading...