Ensure your processes, policies and operations align with your security posture.

What controls do you have in place to mitigate security risks?

A comprehensive security posture includes a consistent and evolving set of technical and operational controls that ensure risks of security breaches and data lost are minimized. Controls, processes and policies are an important but often time consuming activity required by many businesses. The Technology and Risk Advisory group are specialists in assisting companies with the process of elicitation of requirements, engaging all parties and ensuring the resulting security controls meet business and operational goals.

Internal Controls Reporting

Specialized internal controls reports tailored to organizational or regulatory requirements.

SOX Reports

Assistance in the creation of investment-related internal controls reports for publicly traded companies.

SOC 1 & 2 Reporting

Assistance in preparing System Organization and Controls reports for compliance and for trust service principles/criteria.

Business Analysis

Developing new ideas? Creating a new application or managing migration from older business applications? BA excercises and consulting can help ensure large projects with many stakeholders stay on task and on budget.

Process Improvement

Evaluate your current processes to gain an understanding of where gaps in security can be closed, and more efficient operations can be achieved.

Technology and Risk Advisory Contacts:

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

Recent Articles:

Threats to international peace and security – Security Council, 8272nd meeting

The Security Council addresses threats to international peace and security ...
Read More
/ Cyber Security News

Sophos Releases a Report About How Fast Cybercriminals Attacks Are

Matthew Boddy, The Security Specialist at Sophos explained: Cyber attacks on Cloud Honeypots, identify the threats organizations migrating to hybrid ...
Read More
/ Cyber Security News

Internet of Things Security Market Revenue and Value Chain 2018 – 2023

This report on Global Internet of Things Security market is a detailed research ... and advantage, Trends, opportunity, and market ...
Read More
/ Cyber Security News

Data Center Logical Security Market 2019 By Recent Trend, Size, Share, Demand Analysis with …

This report on Global Data Center Logical Security market is a detailed research study ... potential and advantage, Trends, opportunity, ...
Read More
/ Cyber Security News

Mobile Biometric Security Service Market Future Technological Trends and Business Opportunities …

This report on Global Mobile Biometric Security Service market is a detailed research ... potential and advantage, Trends, opportunity, and ...
Read More
/ Cyber Security News

Oil Gas Security Service Market Analysis: By Key Players, Types, Applications -Ready To Boost …

This report on Global Oil Gas Security Service market is a detailed research study that ... potential and advantage, Trends, ...
Read More
/ Cyber Security News

Security Appliance Market to Witness Astonishing Growth with Key Players: Cisco Systems …

Their capabilities include UTM, VPN and firewall, IDP systems, web security, and routing, which provide and ... Unified Threat Management ...
Read More
/ Cyber Security News

New Documentary Film, CYBER CRIME, Its Not a Question of “If,” It’s a Question of “When”

Featuring commentary from ten leading experts in the cyber security field, ... This documentary is meant to raise viewers awareness ...
Read More
/ Cyber Security News

Zscaler url

Configured in minutes, Zscaler Internet Security leverages the threat intelligence harnessed from the Zscaler cloud. Hi, The site Review URL ...
Read More
/ Cyber Security News
Loading...