Immediate Return for a SOA with New and Exciting Purposes

Web 2.0 & Enterprise Mashups

Subscribe to Web 2.0 & Enterprise Mashups: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Web 2.0 & Enterprise Mashups: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Layered Technologies, Inc. (Layered Tech), a leading global provider of compliant and secure cloud and hosting services supporting mission-critical e-business applications, announced that Chief Risk Officer Jeff Reich will present a session entitled “Did you want controls with that? A Model for IT Assurance as a Service – The Emergence of Controls in Infrastructure as a Service SLA,” tomorrow at the ISACA Silicon Valley Chapter 2012 Summer Conference, “Enabling Trust: Business in The Cloud.” The event is being held at the Biltmore in Santa Clara, Calif.

With more than 30 years of experience, Reich is a well-known risk management and security expert in the hosting market. Reich is responsible for driving Layered Tech’s security and compliance services and guiding customers’ risk mitigation efforts.

Reich’s session will not only focus on what to look for in a Service SLA, but it will also provide recommended best practices for how enterprises can maximize their relationship with managed service providers so companies can refocus internal IT resources on meeting overall business goals. Reich will also explain the steps needed to create a cloud environment that is less risky than traditional platforms.

“The complex compliance landscape has overlapping requirements, tools and practices and some of these are even contradictory,” Reich said. “Every time you have to focus some of your already limited resources on navigating through the compliance jungle, you pull further and further away from effectively utilizing those resources to drive your organization forward.”

Reich added: “Managed services and cloud services have matured enough to allow companies to compartmentalize their compliance initiatives and leverage service providers who are qualified to manage compliance needs on their behalf. Like any other outsourced service, you should expect support and service levels to meet or exceed your expectations.”

Reich holds CRISC, CISSP and CHS-III certifications and is an ISSA Distinguished Fellow. His extensive background includes successful programs that have dealt with security policies, information security, internal controls, physical security, liaison work with local and federal law enforcement, regulatory and audit compliance, business continuity planning, abuse and policy enforcement management, and change control. Reich, one of the industry’s most sought-after speakers who regularly appears at thought-leadership events such as ISACA, guides domestic and international enterprises’ compliance, security and risk-mitigation practices. Prior to joining Layered Tech, Reich was the chief security officer for Rackspace Hosting, and he also held positions as vice president and chief security officer of CheckFree and senior manager of information protection at Dell Inc.

More information about the ISACA Silicon Valley Chapter 2012 Summer Conference is available at

Layered Technologies

Layered Technologies (Layered Tech), a leading global provider of compliant and secure cloud and hosting services, supporting mission-critical e-business applications, offers PCI-, HIPAA- and FISMA-compliant hosting solutions, managed dedicated hosting and cloud computing services, including Compliance Guaranteed, which ensures that all Layered Tech compliance services are guaranteed to pass 100 percent of every IT audit or assessment. By providing high-quality technology, infrastructure and support, Layered Tech enables clients to eliminate capital expenses and save on operating costs so they can focus on core initiatives. Layered Tech’s scalable infrastructure powers millions of sites and Internet-enabled applications, including e-commerce and SaaS. Clients include federal, state and local government agencies; large enterprises with advanced data security, compliance and uptime requirements; and leading-edge Web 2.0 startups. For more information, visit

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.