Ensure your processes, policies and operations align with your security posture.

What controls do you have in place to mitigate security risks?

A comprehensive security posture includes a consistent and evolving set of technical and operational controls that ensure risks of security breaches and data lost are minimized. Controls, processes and policies are an important but often time consuming activity required by many businesses. The Technology and Risk Advisory group are specialists in assisting companies with the process of elicitation of requirements, engaging all parties and ensuring the resulting security controls meet business and operational goals.

Internal Controls Reporting

Specialized internal controls reports tailored to organizational or regulatory requirements.

SOX Reports

Assistance in the creation of investment-related internal controls reports for publicly traded companies.

SOC 1 & 2 Reporting

Assistance in preparing System Organization and Controls reports for compliance and for trust service principles/criteria.

Business Analysis

Developing new ideas? Creating a new application or managing migration from older business applications? BA excercises and consulting can help ensure large projects with many stakeholders stay on task and on budget.

Process Improvement

Evaluate your current processes to gain an understanding of where gaps in security can be closed, and more efficient operations can be achieved.

Technology and Risk Advisory Contacts:

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Articles:

Limiting social media and online activity can protect you from ID theft

Limiting social media and online activity can protect you from ID theft ... because it can expose you to hackers ...
Read More
/ Cyber Security News

Lawsuit filed in Hy-Vee data breach

The lawsuit claims that Hy-Vee left millions vulnerable to fraud and identity theft by taking so long to respond. While ...
Read More
/ Cyber Security News

Limiting social media and online activity can protect you from ID theft

Tyler Russell with the Better Business Bureau says one way people can prevent identity theft and scams is using their ...
Read More
/ Cyber Security News

Athens man sues local health agency for data breach

Athens man sues local health agency for data breach ... the private information of patients, putting them at “grave risk” ...
Read More
/ Cyber Security News

Giving force to Nigeria’s data protection regulation

Nigeria recently took a cue from the European GDPR by coming up with a data protection regulation. However, while the ...
Read More
/ GDPR

Kansas AG urges US Supreme Court to block limit on theft prosecutions

Kansas AG urges U.S. Supreme Court to block limit on theft prosecutions ... I-9 form whenever building criminal cases for ...
Read More
/ Cyber Security News

Haaretz Exclusive No Kremlin Link Found to Russian Hacker Awaiting Extradition in Israel, Lead …

... counts of fraud, identity theft, computer hacking and money laundering. ... Rasmussen has been following developments in the case ...
Read More
/ Cyber Security News

Police: Woman used baby car seat to hide stolen items from Tulsa Target store

Police arrested Edwards on suspicion of identity theft, possession of someone else's cards, stolen property, larceny and possession of fake ...
Read More
/ Cyber Security News

Reuters US Domestic News Summary

Following is a summary of current US domestic news briefs. Classes ... U.S. Supreme Court divided over Kansas immigrant identity ...
Read More
/ Cyber Security News
Loading...