What does Risk Management mean to you? If you have read my blog you know that I focus on topics like Security or Compliance. You may have noticed, as well, that my title is Chief Risk Officer and you may have wondered how this fits together. Compliance cannot exist without the appropriate controls (security) in place. Moreover, Risk Management can be said to be the art of balancing the value of the cost of a control versus the value of the benefit derived from the control.
With the holiday season upon us and another year coming to a close, we wish to express appreciation to our clients, partners and shareholders for their continued support of Layered Tech.
We had many accomplishments in 2012, all with the objective of setting the standard for what clients should expect from their PCI-, HIPAA- and FISMA-compliant managed hosting provider. Our extraordinary team of security and compliance experts worked day and night to understand the goals of our clients and solve their business challenges.
A lot of people in the credit card industry focus on the compliance and security component of the payment processing chain that they control. This is expected and is the right thing to do. Most people do not have an appreciation of the steps needed for a successful transaction. Some merchants, cards and banks could have varying processes but most transactions involve, at a minimum, a consumer, a merchant, a payment gateway or processor, the card brand and the bank issuing the card. In order for a transaction to complete, the reverse path is taken to validate the transaction. Add in credits, refunds and loyalty programs and that’s a lot of moving parts in a system that appears to act instantaneously. The system works well and we all depend on that.
Continue reading ‘The Payment Processing Chain – Holistic Risk Management’
Earlier this year Microsoft Corporation contracted with Layered Tech to provide “Microsoft Dynamics for Government – Hosted by Layered Tech”; a FISMA compliant cloud offering for their Dynamics solutions.
We hope you can join Layered Tech at the “Intelligence in the Cloud” workshop, which is a unique opportunity to understand the challenges of migrating secure multimedia assets to the cloud. The workshop, jointly sponsored by the National Association of Broadcasters (NAB) and the Distributed Computing Industry Association (DCIA), will focus on how military and government agencies with responsibilities for intelligence gathering can safely leverage the benefits of cloud computing.
Continue reading ‘Intelligence in the Cloud – Security and Compliance’
Welcome to the holiday season! Along with the holiday cheer, parties, presents and spending come some risks of which we should all be aware. Situational Awareness is a phrase that some might not recognize. Situational Awareness entails being aware of your surroundings and environment and adapting your behaviors to address the risks being presented.
An interview with Suzie Adams, Federal Chief Technology Advisor for Microsoft
This week, Microsoft Dynamics announced the availability of new cloud-based business solutions built specifically for federal government agencies. These solutions are delivered through a FISMA-compliant, federal-only infrastructure environment hosted by Microsoft partner Layered Tech. The solutions provide agencies with a private and secured cloud hosting environment built specifically to deploy mission critical solutions, enabling federal agencies to collaborate, manage data, improve processes, and access actionable business intelligence, while taking advantage of the flexibility, security, performance and cost savings of a cloud delivery model.
The FutureFed blog team had the opportunity to catch up with Susie Adams, Microsoft’s Federal Chief Technology Advisor, to help give some perspective to this announcement and answer a few questions on cloud offerings for federal agencies.
READ THE FULL BLOG HERE.
We are now 90 days into the merger of Layered Tech and NEW WORLD APPS, so we thought it would be helpful to send out an update from the front lines: How is the integration going?
Quite often, cloud service providers neglect to make security and compliance of their cloud environments their responsibility. Many service providers leave it to the client to manage their own security. This is not ideal. The client cannot control all elements of the environment and is at a disadvantage. It is startling to me, that 69% of cloud service providers do not believe that security is their responsibility, and even more, do not offer easy to implement security controls as a service according to the Ponemon Institute in 2011.
Continue reading ’5 Questions to Ask Your Cloud Service Provider’
Everyone knows that a lot of information about each of us is floating around various segments of the internet. The prevalence of online shopping, social media and portable computing has made us comfortable with this and in many ways that is a good thing for commerce, society and individuals. Many of us feel very confident in the controls that exist to protect data about us and in most cases that confidence is well founded.
Continue reading ‘How Much is Your Data Worth?’