Mission

Hi and welcome to ITCUStrategy.com – the world’s first blog on IT strategy for the Credit Union Industry.

The purpose for this blog is sharing, learning, and education. My deepest wish is to share what I am experiencing with credit unions regarding Compliance, Risk, Security, Infrastructure, Disaster Recovery, and IT Strategy with other credit unions. My hope is that the topics listed here will grow and that credit union IT managers and executives will use this blog to spur dialogue, debate, and further learning in the community. The issues facing credit unions are significant, non stop and neverending. Where do you go for insight? Where do you go to validate an approach or an idea that you have? The times we are in are exciting as well because technologies are available now that truly give credit unions an ability to meet compliance requirements with a common set of infrastructure technologies. Planning and Strategy are needed. The ability to look over several budget cycles is an imperative.  

This blog is for credit union executives who view IT as a strategic imperative in order to repond to outside pressures facing the credit union community, (outside threats, inside threats, and compliance pressure).

Specifically, I plan to address the following topics in the days and weeks ahead:

1) NCUA compliance issues

2) IS&T document interpretation and strategy development.

3) IT Strategy, design, architecture – Regardless of size how can you incorporate IT design and architecture elements into ones planning in order to drive down your cost structure and optimize your spending.

4) Success Stories – What is working and why they did it?

5) Vendor Community – What is working and what is affordable for your size credit union.

6) Reduction of complexity – How simplicity reduces risk and increases security.

I’ll discuss the impact of IT strategy on the day-to-day operations of your credit union within the following areas:

1) Infrastructure – Blueprints for systems architecture that support compliance and risk management over the long term.

2) Security, Identity and Privacy Strategy (SIPS). Develop two-year security road maps that match spending for products and solutions to compliance and risk management.

3) IT Disaster Recovery (DR) planning that supports BCP objectives – cut through all the options and develop a comprehensive IT recovery plan.

Again, thanks for visiting our blog. Please tell your colleagues about it, and come back soon.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: