An internal control system creates advantages for organizations by gaining the ability to make better business decisions faster.

Internal control system improvement assistance provides the ability for companies to identify and assess risks related to the accuracy of their financial statements, the efficiency of the business processes,  and the security of the assets. Based upon these risks an assessment is prepared as to the adequacy of the internal controls designed and checks are subsequently performed on whether these procedures are appropriately implemented. Upon completion of these assessments carefully prepared documentation clearly outlines process, risk and controls.

The Technology and Risk Advisory controls team have tools and methods designed within best practice guidelines and allows our consultants to focus on only those controls that cover the priority risks of the company, resulting in a more efficient review process.

ERP Planning

Implementation of an Enterprise Resource Planning (ERP) system is a major undertaking for any organization. These far reaching and often expensive projects can make or break a company. Inevitably, the creation of such systems require considerable transformation of business systems, technology, processes, and the control environment to govern all of these parts.

Guidance throughout the entire lifecycle of an ERP project from designing controls and security to ensuring effective implementation through ongoing monitoring and assessment can be valuable lifelines to a company reaching the limits of internal resources in business transformation.

Technology and Risk Advisory Contacts:

Vaclav Vincalek

Managing Director,
Technology & Advisory Services


Email: vvincalek@wm.ca

Phone: 778-945-2996

Paul Schmidt

Partner,
CPA, CA, CITP, Information Technology


Email: pschmidt@wm.ca

Phone: 604-691-6826

Killian Ruby
Partner, CPA, CA, I.A.C.T,
Audit and Accounting

Email: kruby@wm.ca

Phone: 604-691-6881


Recent Articles:

Global Personal Cloud Market Trends Analysis Report By End Use (Individual,Enterprises) And …

For instance, in 2018, according to Identity Theft Resource Centre hackers stole approximately 446 million consumer records. Market Key Players ...
Read More
/ Cyber Security News

Owasp zap azure ad authentication

env files or providing environment variables Mar 26, 2017 · OWASP Top 10: A2 Broken Authentication and Session Management ZAP ...
Read More
/ OWASP

School portal accounts may have been compromised

The security breach would have allowed the hacker to student and parent information, including the student's and parent's names, home ...
Read More
/ Cyber Security News

Data Security Concerns are Prominent Among Indians: Unisys Security Index™ 2020

It was that concerns around the risk of a data security breach while working remotely were the least among all ...
Read More
/ Cyber Security News

Data Security Concerns are Prominent Among Indians: Unisys Security Index™ 2020

It was that concerns around the risk of a data security breach while working remotely were the least among all ...
Read More
/ Cyber Security News

Data Security Concerns are Prominent Among Indians: Unisys Security Index™ 2020

It was that concerns around the risk of a data security breach while working remotely were the least among all ...
Read More
/ Cyber Security News

Why Do We Need Data Science?

It is their every day schedule, yet big data made this activity simpler for them. With the assistance of a ...
Read More
/ Data Analytics

How Do Data Laws Apply To Web Developers?

All security breaches must be disclosed immediately, otherwise fines for violating GDPR are quite hefty. The total amount of GDPR ...
Read More
/ Cyber Security News

New law ‘powerful’ in curbing terror threats

New law 'powerful' in curbing terror threats ... The new law repeals Republic Act 9372 or the Human Security Act ...
Read More
/ Cyber Security News
Loading...