Ensure your processes, policies and operations align with your security posture.

What controls do you have in place to mitigate security risks?

A comprehensive security posture includes a consistent and evolving set of technical and operational controls that ensure risks of security breaches and data lost are minimized. Controls, processes and policies are an important but often time consuming activity required by many businesses. The Technology and Risk Advisory group are specialists in assisting companies with the process of elicitation of requirements, engaging all parties and ensuring the resulting security controls meet business and operational goals.

Internal Controls Reporting

Specialized internal controls reports tailored to organizational or regulatory requirements.

SOX Reports

Assistance in the creation of investment-related internal controls reports for publicly traded companies.

SOC 1 & 2 Reporting

Assistance in preparing System Organization and Controls reports for compliance and for trust service principles/criteria.

Business Analysis

Developing new ideas? Creating a new application or managing migration from older business applications? BA excercises and consulting can help ensure large projects with many stakeholders stay on task and on budget.

Process Improvement

Evaluate your current processes to gain an understanding of where gaps in security can be closed, and more efficient operations can be achieved.

Technology and Risk Advisory Contacts:

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Articles:

Rekor Launches New AI School Security and Student Safety Software

Rekor Launches New AI School Security and Student Safety Software ... OnGuard enhances student safety by identifying and assessing threats ...
Read More
/ Cyber Security News

Global Web Application Firewall (WAF) Market Size – Industry Insights Top Trends Drivers Growth …

The leading competitors functioning in the Global Web Application Firewall (WAF) Market are focusing on expansions, ... The report provides ...
Read More
/ Cyber Security News

Financial Analysis: ChannelAdvisor (NYSE:ECOM) vs. Rapid7 (NYSE:RPD)

Further, the company provides consulting services in the areas of cyber security maturity assessment, incident response program development, ...
Read More
/ Cyber Security News

Thousands of Movie Pass subscribers have info exposed in data breach

A cyber-security expert reportedly discovered the un-encrypted database of 161 million pieces of information, including personal credit card details, ...
Read More
/ Cyber Security News

7 IT security best practices to know to prevent data breaches

Imagine a hacker trying to break into a secure system. You often envision an expert programmer make attempts at a ...
Read More
/ Cyber Security News

Internet ‘bazaar’ announces it’s selling card data stolen in Hy-Vee data breach

... stolen during a data breach at Hy-Vee went on sale this week at a site that traffics in stolen ...
Read More
/ Cyber Security News

Work-From-Anywhere Cultures Need Work-From-Anywhere Security: The Value of a Managed …

Learn how partners can help secure mobile workforces. ... however, a data breach could outweigh the potential benefits of a ...
Read More
/ Cyber Security News

The Top Cyber Security Trends in 2019 (and What to Expect in 2020)

Verizon's 2019 Data Breach Investigations Report (DBIR) reports that 32% of confirmed data breaches boiled down to phishing, and 78% ...
Read More
/ Cyber Security News

Incident Of The Week: Millions of Hy-Vee Customer Payment Cards Appear For Sale Online

The online “dump” of payment card data appeared online under the breach ... according to reports and images shared with ...
Read More
/ Cyber Security News
Loading...