Should banks risk lightning hitting twice for CrowdStrike?

Bank tech teams divided on whether to give security vendor a second chance after update crash

Credit: Risk.net montage/Getty/GK Images/Alamy Stock Photo

As bank technology and information security teams return from their vacations in the US and Europe, one question sits at the top of their in-trays: ‘What to do about CrowdStrike?’ After a software update by the security vendor triggered a widespread outage in July, many companies including banks are reassessing the firm’s products and capabilities, while its rivals see an opportunity to expand their market share.

An operational risk manager at a global bank – whose system was directly affected

Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.

To access these options, along with all other subscription benefits, please contact info@risk.net or view our subscription options here: http://subscriptions.risk.net/subscribe

You are currently unable to copy this content. Please contact info@risk.net to find out more.

Sorry, our subscription options are not loading right now

Please try again later. Get in touch with our customer services team if this issue persists.

New to Risk.net? View our subscription options

Most read articles loading...

You need to sign in to use this feature. If you don’t have a Risk.net account, please register for a trial.

Sign in
You are currently on corporate access.

To use this feature you will need an individual account. If you have one already please sign in.

Sign in.

Alternatively you can request an individual account here