CIO Areas of Interest

Disaster Recovery Planning, Job Descriptions, Salary Survey, Business Continuity, ITSM, SOA, Compliance, SOX, and HIPAA

The Janco News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

    17% of all companies do not have specific policies in place for electronic communication

    September 15th, 2014

    In an interview by Janco Associates, Inc. (JAI) of a CIO in a Fortune 100 company, the CIO disclosed that his financial data is at risk because of the proliferation of devices. JAI verified that this CIO was not alone as in a recent survey of CFOs, only 1/3 said they have a formal enterprise-wide plan for controlling the electronic exchange of financial information.

    In that survey had the following major observations

    • 45%  did not have a formal enterprise-wide plan
    • 40%  a company wide directive had been issued
    • 17%  had not developed or communicated specifice policies 
    Order PolicySample policy


    - more info

    Compliance to mandated security requirements is a critical focus of CIOs

    September 11th, 2014

    Compliance is ever changing, and it's getting harder to keep up. In a survey by Janco Assocaites, Inc. (JAI), a management consulting firm focused to helping CIOs meet policy and compliance goals, 70 percent of all respondents reported being subject to multiple regulatory compliance mandates, as well as contractual obligations and industry standards.

    Order Compliance Kit

    Meanwhile, IT budgets are getting leaner as organizations strive to increase cost efficiency in tough economic times, and the emergence of cloud-based services has increased the complexity of compliance management. Given these challenges and tight deadlines, many organizations are addressing compliance requirements in silos using a "checklist" approach.

    Compliance Process

    - more info

    CIO best practices readings

    August 22nd, 2014

    CIO best practices readings:

    CIO - CTO  Changing Role

    Chief Information Officer - Chief Technology Officer

    Order CIO Job Description
    • CIO Issues with workload, budgeting, and staffing CIO issues are made more complex as staffing levels and budgets remain flat As the 2014 budgeting cycle starts, CIOs clearly have their hands full...
    • 10 BYOD Best Practices for CIOs BYOD Best Practices for CIOs Bring Your Own Devices (BYOD) is exploding all over corporations.  CIOs are in the cross hairs and need to follow...
    • IT Staffing 2015 IT staffing 2015 IT staffing companies and researchers released a flurry of information as the  first half of the year ended.  2015 is looking great...
    • Top 10 Backup Best Practices 10 Backup Best Practices – Rules of the Road for CIOs and DR/BC Managers Top 10 Backup Best Practices – Many CIOs want to improve...
    • Top 10 IT Professional Staff Issues for CIO Top 10 IT Professional Staff Issues for CIO As budgeting starts for 2015, the top 10 IT professional staff issues that CIOs and HR departments...
    - more info

    CIOs in the million dollar club get stock

    August 13th, 2014

    Janco Associates has identified 29 CIOs who made over $1,000,000 in 2013. Interestingly not get to that number via base compensation.  Almost all get grants of stock which by itself is over $1,000,000.

    CIO Compensation

    Order Salary Survey    Free Salary Survey
    - more info

    Many data breaches take over 1 year to fix after the first intrusion

    July 28th, 2014

    Security Audit Program

    ISO 28000, 27001, & ISO 27002 / HIPAA / SOX PCI-DSS Compliant

    Severs and coprorate data are breached on a daily basis.  While this is happening most companies are  unaware that their propritary information is being stolen. Janco has found that over 90% of cybercrime victims find out about the compromise only after a 3rd party notifies them.  Then after a cybercriminal gains access to an enterprise's network it takes an average 416 days to detect the intrusion.

    OrderTable of Contents

    - more info