Sarbanes-Oxley (SOX)Resource Compliance Kit

Sarbanes Oxley Compliance

Mandated Requirements

The SOX kit contains all of the tools that are need to comply with the Sarbanes-Oxley legislation.  This tool kit has been used successfully by over 500 publicly traded companies.

 

Download Selected Pages

ITIL and "Best Practices" are no longer sufficient to conform to the Sarbanes Oxley and COBIT requirements. There are many products on the market that claim they can track changes, that they can control/manage changes or that they can audit the use of products and the changes made to systems.

Almost all of the Change Management products are either "Electronic Paper" (i.e. they cannot prevent unauthorized changes from being made) or they react after the event based on cyclic comparisons of the various data sets. The time between the cyclic comparisons is an open door for anyone trying to manipulate the systems, and paper based systems offer no protection at all.

Sarbanes-Oxley Section 404 requires that:

  • Enterprises have an enterprise wide security policy;
  • Enterprises have enterprise wide classification of data for security, risk, and business impact;
  • Enterprises have security related standards and procedures;
  • Enterprises have formal security based documentation, auditing, and testing in place;
  • Enterprise enforce separation of duties; and
  • Enterprises have policies and procedures in place for Change Management, Help Desk, Service Requests, and changes to applications, policies, and procedures.

To meet these needs the Sarbanes Oxley Kit, which comes in four editions (Standard, Silver, Gold, and Platinum) contains:

  • Security Policies (all editions);
  • Threat & Vulnerability Assessment Tool (all editions);
  • Business & IT Impact Questionnaire Risk Assessment Tool (all editions);
  • Safety Program Template (all editions);
  • Disaster Recovery Template (all editions);
  • Outsourcing guide update to reflect what you vendors need to do (all editions);
  • Software tool to monitor key data files (all editions);
  • Internet and IT Job Descriptions (Silver, Gold, and Platinum Editions) and;
  • IT Service Management Template (Platinum Edition).

The tools provided in these kits address not only the needs of Sarbanes-Oxley, COBIT and ISO -- they also provide a vehicle to comply with the IT Governance requirements.

Download Selected Pages

 

 

 

 

CIO - CTO - CSO News


4th Industrial Revolution

4th Industrial RevolutionCIOs have been inundated with the potential and the rapid pace of innovation in technology. This is referred to as the 4th Industrial Revolution, and it can be more accurately described as the ‘Hurricane of Innovation’. Janco terms this as the ‘Age of the Customer’ and the imperative for customer obsession to be successful . Never before have we seen this level of innovation intensity. Almost every company is experimenting with the potential, and sometimes it is about finding the diamonds in the ‘data’. Data is now the next platform which provides insight, intelligence, and ability to create new platforms for a company and industry. Connecting data with IoT, and in many cases machine learning is proving to be a winning formula. The business value and realization of digitization is in progress, and now we have real world examples of new business models and potential revenues for traditional companies. Digital disruption is here and it is real.

Order IT Infrastructure KitDownload Selected Pages

- more info


Feds look to increase cybersecurity spending by $19 billion

Feds look to increase cybersecurity spending by $19 billion

CybersecurityThe administration is seeking to boost federal cybersecurity spending. Its 2017 IT budget calls for a 35% increase in cybersecurity spending to $19 billion.

Victor Janulaitis, CEO of Janco Associates, a research firm that analyzes IT labor trends, said the "government is not always the solution.

"Rather the solution needs to be in the private sector where what can be done will be done and real jobs will be created," said Janulaitis. "The solution of 'thousands' of new government employees only adds to our deficit and governmental bloat," he said.

Order Security ManualDownload Selected Pages

- more info


Over 1/3 of IT pros do work from home

Over 1/3 of IT pros do work from home

38 percent of workers in management, business, and financial operations
occupations, and 35 percent of those employed in professional and related occupations,did some or all of their work from home on days they worked, according to the U.S. Bureau of Labor Statistics. Workers employed in other occupations were less likely to work from home on days they worked.

Order IT Job Description
Sample job description
 Download Selected IT Job Descriptions

- more info


Importance of infrastructure policies and a focused security program is critical

Importance of infrastructure and security programImportance of infrastructure policies and a focused security program is critical

The digital landscape today is now open to increased cyber-attacks. The increase in frequency of attacks need a well-developed set of infrastructure procedures and a focused security program. IT pros need a focused awareness to bolster their security policies and practices as the foundational structure of an overall risk-management strategy.

Cyber-attacks cannot be prevented but with concentrated awareness and efforts, organizations can arm their customers, partners, and employees with safeguard measures require focused awareness to bolster their security policies and practices as the foundational structure of an overall risk-management strategy. Cyber-attacks cannot be prevented but with concentrated awareness and efforts, organizations can arm their customers, partners, and employees with safeguard measures.

Order Security ManualDownload Selected PagesVersion History

- more info