Ensure your processes, policies and operations align with your security posture.

What controls do you have in place to mitigate security risks?

A comprehensive security posture includes a consistent and evolving set of technical and operational controls that ensure risks of security breaches and data lost are minimized. Controls, processes and policies are an important but often time consuming activity required by many businesses. The Technology and Risk Advisory group are specialists in assisting companies with the process of elicitation of requirements, engaging all parties and ensuring the resulting security controls meet business and operational goals.

Internal Controls Reporting

Specialized internal controls reports tailored to organizational or regulatory requirements.

SOX Reports

Assistance in the creation of investment-related internal controls reports for publicly traded companies.

SOC 1 & 2 Reporting

Assistance in preparing System Organization and Controls reports for compliance and for trust service principles/criteria.

Business Analysis

Developing new ideas? Creating a new application or managing migration from older business applications? BA excercises and consulting can help ensure large projects with many stakeholders stay on task and on budget.

Process Improvement

Evaluate your current processes to gain an understanding of where gaps in security can be closed, and more efficient operations can be achieved.

Technology and Risk Advisory Contacts:

Paul Schmidt

CPA, CA, CITP, Information Technology

Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881

Vaclav Vincalek

Managing Director,
Technology & Advisory Services

Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Articles:

Barbara Corcoran Lost Nearly $400000 and It Shows the Real Risk of Email Phishing Scams

Barbara Corcoran Lost Nearly $400,000 and It Shows the Real Risk of Email ... That means it's worth considering whether ...
Read More
/ Cyber Security News

Michigan Healthcare Group Hack Went Undetected for Six Months

A data breach that exposed patients' personal health information (PHI) for almost three months went undetected for half a year ...
Read More
/ Cyber Security News

The Rise of Data Privacy Regulations Offers New Opportunities for CPA Firms

At this time, approximately 41 U.S. states have laws mandating data breach notification, which is among the central focuses of ...
Read More
/ Cyber Security News

Exploitation, Phishing Top Worries for Mobile Users

The majority of companies suffered downtime or loss of data in a breach, but many also found that other devices ...
Read More
/ Cyber Security News

South Carolina’s firewall faces billions of breach attempts

South Carolina's firewall faces billions of breach attempts ... The state also employs measures of cybersecurity to ensure tabulated results ...
Read More
/ Cyber Security News

TQL cyber breach is latest example of the industry’s vulnerability to hacking

The breach was "an information/data phishing attempt," according to an announcement on the company's website. "Our IT security teams identified ...
Read More
/ Cyber Security News

Cyberattacks Target US DoD and Mexico’s Economy Ministry | Avast

Ransomware was part of 70% of total malware infections observed by the Verizon Data Breach Investigations Report. Malware hits 61% ...
Read More
/ Cyber Security News

Phishing attack affects participants in Brunswick Co. Schools benefits plan

BRUNSWICK COUNTY, N.C. (WECT) - A data breach has affected Brunswick County Schools employees who participated in one of its ...
Read More
/ Cyber Security News

One in four Americans won’t do business with data-breached companies

Security company Security.org surveyed over 1,000 people in the US including over 300 data breach victims to learn more about ...
Read More
/ Cyber Security News