When security breaches occur, CIO's jobs are at risk

Version 11.1 of the Security Manual Template includes 25 ready to use electronic forms to help CIOs and CSOs implement world class security infrastructure

Security Policies

Park City UT -- https://e-janco.com - When security breaches occur, CIO's jobs are at risk - Janco Associates has just released version 11.1 of its industry standard Security Manual Template which addresses the need to improve the IT and business technology security infrastructure. Mr. M. V. Janulaitis, the CEO of Janco Associates, Inc. said, "In interviews with over 100 organizations that have faced major security breaches, Janco has found that there is a 20 to 25% chance that there will be a new CIO in the organization within 12 to 16 months after a major breach. As a result there is a lot of stress in CIO ranks focusing on preventing security breaches and compliance failures. " He added, "CIOs and CSOs are struggling to get a handle on the every changing landscape of security. With all of the cyber-attacks and data breaches, it is clear that the Security infrastructure for most enterprises needs to be constantly reviewed and re-vamped. Janco's Security Manual temple does that in a very pragmatic fashion. " The CEO said, "As a matter of fact over 1,200 companies in over 150 countries have already selected Janco's Security Manual Template as the basis of shoring up their security infrastructure. "

CIO Job Description

Included with this version of the Security Manual are 25 specific electronic forms, Business Impact Analysis Questionnaire, Threat and Vulnerability Assessment Tool, SOX checklist, and PCI audit program all of which help create a living security infrastructure. In addition, all of the included electronic forms have been updated to meet the latest governmental, industry and international compliance requirements.

The CEO added, "The best features of the template are the definition of industry standard best practices for security and compliance, organization role and responsibility definitions, an update to deal with shadow IT, BYOD and the updated and newly created electronic forms. " The forms included with the Security Manual Template are: Blog Policy Compliance Agreement; BYOD Access and Use Agreement; Company Asset Employee Control Log; Email Employee Agreement; Employee Termination Procedures and Checklist; FIPS 199 Assessment; Internet Access Request Form; Internet and Electronic Communication Employee Agreement; Internet use Approval; Mobile Device Access and Use Agreement; Mobile Device Security and Compliance Checklist; New Employee Security Acknowledgment and Release; Outsourcing and Cloud Security Compliance Agreement; Outsourcing Security Compliance Agreement; Preliminary Security Audit Checklist; Risk Assessment; Security Access Application; Security Audit Report; Security Violation Procedures; Sensitive Information Policy Compliance Agreement; Server Registration; Social networking Policy Compliance Agreement; Telecommuting Work Agreement; Text Messaging Sensitive Information Agreement; and Threat and Vulnerability Assessment Inventory.

The Security Manual template is delivered electronically and comes as an easily modifiable MS WORD document. The template is over 250 pages long and includes everything needed to customize the security infrastructure to fit an organization's specific requirements.

More information on the template can be found on the Janco's web site at Security Manual and full table of contents can be found at Security Manual Table of Contents.

Janco is an international consulting firm that follows and addresses issues that concerns CIOs and CFOs. It publishes a series of IT and business infrastructure HandiGuides® and Templates including a Disaster Recovery/Business Continuity Template, Security Template, IT Job Descriptions, and a semi-annual IT Salary Survey.

Order Security Manual Template Download Sample