Ensure your processes, policies and operations align with your security posture.

What controls do you have in place to mitigate security risks?

A comprehensive security posture includes a consistent and evolving set of technical and operational controls that ensure risks of security breaches and data lost are minimized. Controls, processes and policies are an important but often time consuming activity required by many businesses. The Technology and Risk Advisory group are specialists in assisting companies with the process of elicitation of requirements, engaging all parties and ensuring the resulting security controls meet business and operational goals.

Internal Controls Reporting

Specialized internal controls reports tailored to organizational or regulatory requirements.

SOX Reports

Assistance in the creation of investment-related internal controls reports for publicly traded companies.

SOC 1 & 2 Reporting

Assistance in preparing System Organization and Controls reports for compliance and for trust service principles/criteria.

Business Analysis

Developing new ideas? Creating a new application or managing migration from older business applications? BA excercises and consulting can help ensure large projects with many stakeholders stay on task and on budget.

Process Improvement

Evaluate your current processes to gain an understanding of where gaps in security can be closed, and more efficient operations can be achieved.

Technology and Risk Advisory Contacts:

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Articles:

The Latest: Trial Against Ex-Police Chief, Wife Delayed

Katherine and Louis Kealoha are facing a trial on bank fraud, identity theft and obstruction charges. They're also facing a ...
Read More
/ Cyber Security News

Police calls — update for Oct. 23, 2018

People booked into the Shawnee County Jail in connection with felonies. Nicole Marie Twemlow, 34, in connection with identity theft, ...
Read More
/ Cyber Security News

Asia-Pacific’s cybersecurity workforce gap hits 2.14m

According to a Cybersecurity Workforce Study by the International ... two years in order to advance in their careers include ...
Read More
/ Cyber Security News

HITRUST® Statement Regarding HIPAA Settlement of the 2015 Anthem Breach

A key component of any comprehensive information risk management ... (such as a board of directors, senior management, regulators and ...
Read More
/ Insurance

SaaS based IT Security Market Growing at High CAGR by 2025 – Cisco, IBM, Intel Security …

An exclusive SaaS based IT Security Market research report created through ... Adoption of cloud computing by organizations, for reducing ...
Read More
/ Cyber Security News

Safety first: AI adoption in the healthcare sector

However, in the healthcare sector, the convergence of big data, cloud ... Predictive analytics tools support clinical decision-making and actions ...
Read More
/ Data Analytics

Police Report for Oct. 24

Gadsden. IDENTITY THEFT. A Gadsden woman told police she learned she'd become a victim of identity theft Saturday when she ...
Read More
/ Cyber Security News

On Medicare? Watch out for fraud

... away from using beneficiaries' Social Security numbers for identification. The new cards have a random number that is less ...
Read More
/ Cyber Security News

Data Security Tops New Zealand Public’s Concerns

Wellington, 24 October 2018 – New Zealanders are more concerned about data security issues spanning identity theft, credit card fraud ...
Read More
/ Cyber Security News
Loading...