Janco Associates - IT Governance - IT Infrastrucure - job descriptions - salary survey

Security Compliance just became easier with the latest Security Manual template

Janco has just updated its Security Manual Template to meet the latest mandated compliance requirements and added a Firewall Policy Security ChecklistSecurity Manual Template

Janco Associates, Inc. has just released it latest update to its Security Infrastructure product line. The Security Manual Template (Version 10.3)  has been updated with the latest Electronic Forms for BYOD and added a Firewall Policy Security Checklist. The CEO of Janco, Victor Janulaitis said, "In a recent survey by a leading research firm, it was found that over 30% of all organizations do not meet the entire universe of compliance requirements, which include:

  1. Broadly applicable regulations like SOX, HIPAA and GLB;
  2. Industry specific requirements like ISO, FISMA and HIECH;
  3. Key state laws like those in California, Nevada and Massachusetts; and
  4. International laws for the EU, Canada and Mexico. "

Janulaitis added. "In Janco's continuing effort to provide enterprises of all sizes the infrastructure tools necessary to meet ever increasing compliance requirements, Janco has expanded the Security Manual Template and provided a vehicle to integrate Janco's risk assessment with a CIO's daily responsibilities. " Janco's CEO added, "Our latest electronic forms use Adobe's state of the art FormCentral to allow organizations to capture and assess all manner of security and compliance risk via a cloud based application. "

The ELECTRONIC forms included with the Security Manual template are: Blog Policy Compliance Agreement, BYOD Access and Use Agreement, Company Asset Employee Control Log, Email Employee Agreement, Employee Termination Procedures and Checklist, FIPS 199 Assessment, Internet Access Request Form, Internet and Electronic Communication Employee Agreement, Internet use Approval, Mobile Device Access and Use Agreement, New Employee Security Acknowledgment and Release, Preliminary Security Audit Checklist, Security Access Application, Security Audit Report, Security Violation Procedures, Sensitive Information Policy Compliance Agreement, Server Registration, Social networking Policy Compliance Agreement, Telecommuting Work Agreement and Threat and Vulnerability Assessment Inventory (Adobe FormCentral and PDF).

The CEO said, "Every CIO needs to be concerned about security and protection of enterprise information assets. With this template, the CIO can quickly implement a program that meets the requirements that auditors are demanding and executive management is expecting. " In addition, "This proven tool is the best in the marketplace today. "

All of Janco's products use the latest technology and are delivered electronically. The firm includes in its customer base organizations from over 100 countries and across most industry segments.

Janco is an international consulting firm that follows issues that concerns CIOs and CFOs and publishes a series of IT and business infrastructure HandiGuides™ and Templates including a Disaster Recovery/Business Continuity Template, Security Template and IT Salary Survey.

Security Manual Template purchase options

Security Manual Template - Standard Edition

Security Manual TemplateSecurity Manual Template

  • Business and IT Impact Questionnaire
  • Threat and Vulnerability Assessment Toolkit
  • Security Management Checklist
  • Full Detail Policies for
    • Blog and Personal Website Policy
    • Mobile Device Policy
    • Physical and Virtural File Server Policy
    • Sensitive Information Policy
    • Travel and Off-Site Meeting Policy
  • HIPAA Audit Program
  • Sarbanes Oxley Section 404 Checklist
  • Security Audit Program- fully editable -- Comes in MS EXCEL and PDF formats -- Meets ISO 28000, 27001, 27002, Sarbanes-Oxley, PCI-DSS, HIPAA FIPS 199, and NIS SP 800-53 requirements -- Over 400 unique tasks divided into 11 areas of audit focus which are the divided into 38 separate task groupings
  • Electronic forms that can be Emailed, completed via a computer or tablet, and stored electronically including: Blog Policy Compliance, BYOD Access and Use, Company Asset Employee Control Log, Email - Employee Acknowledgment, Employee Termination Checklist, FIPS 199 Assessment Electronic Form, Internet Access Request, Internet Use Approval, Internet & Electronic Communication - Employee Acknowledgment, Mobile Device Access and Use Agreement, Employee Security Acknowledgement Release, Preliminary Security Audit Checklist, Risk Assessment, Security Access Application, Security Audit Report, Security Violation Reporting, Sensitive Information Policy Compliance Agreement, Server Registration, and Threat and Vulnerability Assessment
  • eReader version of the Security Manual Template

Security Manual Template - Premium Edition

Security Manual TemplateSecurity Manual Template

  • Business and IT Impact Questionnaire
  • Threat and Vulnerability Assessment Form
  • Security Management Checklist
  • HIPAA Audit Program
  • Sarbanes Oxley Section 404 Checklist
  • Security Audit Program
  • Over two dozen Electronic Forms
  • eReader version of the Security Manual Template

Security Job Descriptions MS Word Format 

  • Chief Security Officer (CSO), Chief Compliance Officer (CCO), VP Strategy and Architecture, Director e-Commerce, Database Administrator, Data Security Administrator, Manager Data Security, Manager Facilities and Equipment, Manager Network and Computing Services, Manager Network Services, Manager Training and Documentation, Manager Voice and Data Communication, Manager Wireless Systems, Network Security Analyst, System Administrator - Unix, and System Administrator - Windows

Security Manual Template - Gold Edition

Security Manual TemplateSecurity Manual Gold Edition

  • Business and IT Impact Questionnaire
  • Threat and Vulnerability Assessment Form
  • Security Management Checklist
  • HIPAA Audit Program
  • Sarbanes Oxley Section 404 Checklist
  • Security Audit Program
  • Over two dozen Electronic Forms
  • eReader version of the Security Manual Template

IT Job Descriptions  MS Word Format - Updated to meet all mandated security requirements

  • 281 Job Descriptions from the Internet and IT Job Descriptions HandiGuide in MS Word Format including all of the job descriptions in the Premium Edition. Each job description is at least 2 pages long and some of the more senior positions are up to 8 pages in length.

DR BC SecurityDisaster Recovery Business Continuity & Security Manual Templates Standard

  • Disaster Recovery Business Continuity Template

  • Security Manual Template

Both of the templates have been recently updated to meet new compliance requirements for ransomware, EU madated issues and BREXIT operational considerations

"Best of Breed - Best Practices Disaster Recovery Planning / Business Continuity Planning and Security Policies" according to the IT Productivity Center

DR BC SecurityDisaster Recovery Business Continuity & Security Manual Templates Premium

  • Disaster Recovery Business Continuity Template
  • Security Manual Template
  • 25 Job Descriptions
    • Chief Information Officer - CIO; Chief Compliance Officer - CCO; Chief Security Officer - CSO;VP Strategy and Architecture; Director e-Commerce; Database Administrator; Data Security Administrator; Manager Data Security; Manager Database; Manager Disaster Recovery; Manager Disaster Recovery and Business Continuity; Pandemic Coordinator; Manager Facilities and Equipment; Manager Media Library Support; Manager Network and Computing Services; Manager Network Services; Manager Site Management; Manager Training and Documentation; Manager Voice and Data Communication; Manager Wireless Systems;Capacity Planning Supervisor; Disaster Recovery Coordinator; Disaster Recovery - Special Projects Supervisor; Network Security Analyst; System Administrator - Unix; System Administrator - Windows

DR BC SecurityDisaster Recovery Business Continuity & Security Manual Templates Gold

  • Disaster Recovery Business Continuity Template
  • Security Manual Template
  • 281 Job Descriptions which includes all of the job descriptions in the premium edition

"Best of Breed - Best Practices Disaster Recovery Planning / Business Continuity Planning, Security Policies, IT Job Descriptions" according to the IT Productivity Center

Order Security Policies and ProceduresDownload TOC security policiesVersion History Security Policies