Exploitable weaknesses within credit union system architecture and devices, many of which are vendor created, were an important focal point at the CU InfoSecurity 2015 conference in Las Vegas, Nev.
"The way most IT security evolved was from the 70s and 80s when there was no threat from the outside world," Kirk Drake, president/CEO of the Wash., D.C-based business continuity CUSO Ongoing Operations, LLC, and one of the conference's sponsors, said. "Security was all built out of a world where nothing was protected and we're constantly trying to add on security after the fact."
Drake pointed out credit unions need an overall security assessment.
Complete your profile to continue reading and get FREE access to CUTimes.com, part of your ALM digital membership.
Your access to unlimited CUTimes.com content isn’t changing.
Once you are an ALM digital member, you’ll receive:
- Breaking credit union news and analysis, on-site and via our newsletters and custom alerts
- Weekly Shared Accounts podcast featuring exclusive interviews with industry leaders
- Educational webcasts, white papers, and ebooks from industry thought leaders
- Critical coverage of the commercial real estate and financial advisory markets on our other ALM sites, GlobeSt.com and ThinkAdvisor.com
Already have an account? Sign In Now
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.