Home | About JCHCI | Services | Contact Info | Partners | Calendar | Press Releases
Security Compliance Controls
Business is impacted by many compliance requirements governing information protection. These include but are not limited to: regulatory/statutory, legal, contractual, industry driven, regional, policies, etc.  More details...

Security Program Framework Development
It is almost impossible to reach a destination without a map and a plan to guide you.  A structured approach to information security management can dramatically reduce the cost of security and provide a measured response to risk. More details...

Information Security Risk Assessment
Risk management is the controlled response to the potential harm that can occur to  people, property, and reputation. A high-level risk assessment provides the necessary guidance to key decision makers. More details...

Disaster Recovery (DR) & Incident Response (IR) Planning
Everyday we make decisions to accept the possibility that a threat to our world can be realized.  DR and IR Planning is the means to recover the business as quickly as possible in the event one of these “accepted” threats are realized. More details...

Monitoring and Detection Program
It is said you cannot manage something you cannot measure.  It is critical to ensure policies and other security controls are providing the protection you expect.  Most regulatory controls require effective compliance monitoring. More details...

Secure Systems Architecture
“An ounce of prevention is worth a pound of cure”.   See how our Secure Systems Architecture can enable your business and help prevent expensive business interruptions from occurring. More details...

Security Policy Development
Policies are intended to convey management’s direction for the organization.  Policies also represent a control to risks impacting the business.  A formal security policy is critical to successfully addressing a company’s liability risks. More details...

Security Awareness Planning
Too often companies spend a fortune on technology to protect their interests.  Information risk management is more a human issue than a technical one.  Learn how to improve your security by applying effective awareness training. More details...

Vulnerability & Threat Management
Common sense practices can prevent the majority of security related incidents and issues.  Reviewing the quality defects and applying simple corrective actions to resources can keep your business operating during most events. More details...

Physical Security Controls
Protecting people and property is the first line of defense and can provide adequate security for many issues you can spend ten times the amount to protect against. Reviewing you physical security practices can be very revealing. More details...

Change Management Controls
Unmanaged change is usually the cause of most events that cause harm to the business.  A pre-defined strategy to manage change can reduce costs, unplanned business disruptions, and project failures. More details...

If your organization is not staffed or budgeted to dedicate a person to oversee your security efforts, JCHCI can provide a trained security officer as part of our “CSO on Loan” program.

©2007 JC Hanlon Consulting, Inc. . | . (586) 435-6231