Exploitable weaknesses within credit union system architecture and devices, many of which are vendor created, were an important focal point at the CU InfoSecurity 2015 conference in Las Vegas, Nev.

"The way most IT security evolved was from the 70s and 80s when there was no threat from the outside world," Kirk Drake, president/CEO of the Wash., D.C-based business continuity CUSO Ongoing Operations, LLC, and one of the conference's sponsors, said. "Security was all built out of a world where nothing was protected and we're constantly trying to add on security after the fact."

Drake pointed out credit unions need an overall security assessment.

Complete your profile to continue reading and get FREE access to CUTimes.com, part of your ALM digital membership.

  • Critical CUTimes.com information including comprehensive product and service provider listings via the Marketplace Directory, CU Careers, resources from industry leaders, webcasts, and breaking news, analysis and more with our informative Newsletters.
  • Exclusive discounts on ALM and CU Times events.
  • Access to other award-winning ALM websites including Law.com and GlobeSt.com.
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.

Roy Urrico

Roy W. Urrico specializes in articles about financial technology and services for Credit Union Times, as well as ghostwriting, copywriting, and case studies. Also: writer/editor of a semi-annual newsletter for Association for Financial Technology since 1997 and history projects funded by the U.S Interior Department, National Park Service and Warren County (N.Y.).