You've requested...

Insurance 2020: Innovating beyond Old Models

If a new window did not open, click here to view this asset.

Download this next:

Insuring the uninsurable: Is cyber insurance worth its salt?

Cyber insurance is one of the fastest growing areas of risk cover in the insurance industry as businesses increasingly turn to specialist insurance in an attempt to cover a portion of their enterprise risk.

 Cyber risk is notoriously difficult to quantify and businesses face an arduous choice in deciding which risks to manage themselves and which risks to transfer to the insurance market.

 This article dips a toe into this emerging risk area and outlines some steps businesses can take to make better informed risk mitigation decisions.

These are also closely related to: "Insurance 2020: Innovating beyond Old Models"

  • A buyers guide to cyber insurance

    With cyberattacks on the rise, the demand for cyber insurance is skyrocketing.

    But with so many classifications and options, how do you know what to look for?

    This buyer’s guide highlights and breaks down the key types of cyber insurance to give you a stronger understanding of what to look for in a solution, including:

    • Hacksurance
    • Theft and fraud
    • Forensic investigation
    • And more

    Download now to unlock a deeper understanding of the cyber insurance landscape.

  • Strategies for winning the battle for the policyholder

    According to recent research, insurance profits fell by about 15% across the sector over the last year.

    The insurance industry is under incredible pressure, with economic pressure and talent shortage making a serious impact.

    This white paper examines the opportunities for insurance businesses willing to lean in on new and emerging technologies and outline the strategies that could bring success in a sector in flux.

    Download now to learn more.

Find more content like what you just read:

  • Tanium for Cyber Insurance

    Managing and protecting the thousands of devices that are connected to your network has never been more challenging. Cyber insurance is a key tool to mitigate the associated risks. Explore 10 steps for assessing cyber risk for cyber insurance when you download this guide.

    Download

  • A Computer Weekly buyer's guide to cyber insurance

    In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.

    Download

  • How advanced data analytics is changing the game for insurers

    This research content illustrates how advanced data analytics and digital transformation are changing the game for insurers. Inside, you’ll discover how you can leverage the full power of CX and learn about the potential of automation in insurance. Download the full report now to find out how the insurance landscape is evolving in the age of CX.

    Download

  • Cyber insurance: Heads they win, tails they win, too?

    “Insurance, as it’s currently practiced, is usually heads they win and tails they win, too,” explains cybersecurity expert Eric Gyasi to Tanium’s magazine Focal Point. “Cyber has upended that model quite a bit.” In this white paper, discover strategies for navigating the tricky terrain of cyber insurance.

    Download

  • The key to cloud upskilling in an evolving digital environment

    Discover in this case study how Cloud Academy proved a critical part of instilling a learning culture in technology talent across AIA while building the in-house capabilities to leverage and enhance investments in cloud transformation.

    Download

  • Strategies to simplify insurance discovery

    Uninsured and self-pay patients are on the rise. Have you taken action to address the uptick? Robust insurance verification is key to protecting your margins and collecting the revenue you’ve earned.

    Download

  • Computer Weekly – 11 June 2019: Are schools delivering on digital skills?

    In this week's Computer Weekly, we look at the differing approaches to teaching computer science across the UK and assess the pros and cons of each. Our latest buyer's guide examines the technologies and best practices of multicloud environments. And we find out what you get for your money when buying cyber insurance. Read the issue now.

    Download

  • Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk

    Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.

    Download

  • Computer Weekly – 5 July 2022: How to get the right level of cyber insurance

    In this week's Computer Weekly, we look at how the market for cyber insurance is evolving and how to avoid buying the wrong level of cover. We find out what role hydrogen technologies could play in reducing datacentre carbon emissions. And we hear how a 125-year old bicycle maker is embracing digital innovation. Read the issue now.

    Download

  • CW Buyers Guide To Finance and Insurance

    This 11-page buyer's guide looks at mitigating the risks of data breaches with liability insurance; how to finance your organisation's technology platforms; and funding software investment for the economic recovery while budgets remain tight.

    Download

  • Achieving an agile cloud migration

    When this insurance and financial services organization began to struggle with Contact Center as a Service (CCaaS) migration, they sought out a way they could combat a handful of cloud challenges. Access this case study to hear the full story.

    Download

  • Fintech: Meet ten financial services disruptors - Part One

    In this e-guide we meet ten up-and-coming financial services disruptors and discuss what the driving force behind their success is. These were interviews published on the Computer Weekly blog: Fintech Makes the World go Around.

    Download

  • Fintech: Meet ten financial services disruptors - Part One

    In this e-guide we meet ten up-and-coming financial services disruptors. This series of interviews were originally published on the Computer Weekly blog: Fintech Makes the World go Around.

    Download

  • What is XDR and why do you need it?

    The prerequisite question before even thinking of buying an extended detection and response (XDR) solution is: Do you need it? Multiple pain points could trigger such a need ranging from the rise of ransomware, the risk of supply-chain attacks, to regulatory and insurance requirements. Download this e-book for a buyer’s guide to XDR.

    Download

  • Computer Weekly – 20 September 2022: A gold medal performance for networking

    In this week's Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance, how the centuries-old London insurance market is going digital, thanks to Lloyd's of London, and how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now.

    Download

  • How this insurance company secured its attack surface

    A fortune 500 insurance and financial services company found itself with increased risks throughout its organization. With IONIX Attack Surface Management, the company was able to discover and inventory all internet-facing assets. Download now to unlock the full case study.

    Download

  • Inside MLC Life Insurance's cloud journey

    When MLC decided to move all its infrastructure, applications and services to the public cloud, its journey was more about people than technology. Learn how MLC overcame these people-related challenges in its move to cloud, improved its security posture and reduced infrastructure spending.

    Download

  • Focus ASEAN: Security & Digital Transformation

    With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.

    Download

  • How Conduit helped achieve a 87% ED avoidance rate

    In this case study, discover why Conduit’s URAC-accredited 24/7 nurse-first line was a perfect fit for one of Ohio’s largest health insurance companies, significantly decreasing call hold times and abandonment rates while increasing member satisfaction.

    Download

  • 2024 threat report: 10 vulnerabilities to watch out for

    Security pros, what vulnerabilities should you be on the lookout for in 2024? In Arctic Wolf Labs’ 2024 threat report, learn about 10 top vulnerabilities and how you can mitigate threats.

    Download

  • Fintech : Meet ten financial services disruptors - Part Two

    Whether it's the insurance sector, lending or full service banking there are a number of companies, often still in their early stages, disrupting the financial services sector. But who are these companies, where do they come from, and what drives them? In this e-guide, the second in a series, we meet another ten of them.

    Download

  • QR code phishing on the rise: How to protect yourself

    QR code phishing attacks are on the rise, exploiting the ubiquitous technology to steal data. Learn how to spot malicious QR codes, protect yourself, and train employees. Read on for details on real-world attacks and defense strategies. Learn more in this resource.

    Download

  • Elevating analytics excellence with cloud-powered innovation

    A leading insurance agency recognized the need to transition its analytics operations to the cloud, driven by the escalating demands of managing ever-growing datasets. Download this case study now to learn how the agency leveraged a data platform to make insights readily available and enable real-time decision-making.

    Download

  • A simple, AI-powered digital platform made for seniors

    When the largest American health insurance company needed an online digital platform for their elderly customers, the goal was to ensure that not only could seniors connect with others but have access to apps for both their physical and mental health. To do this, they needed a partner to turn the idea into a reality. Read on to see who they chose.

    Download

  • The 4 key pillars of insurance transformation

    Insurance companies are grappling with rapidly increasing disruption and competition. To succeed in this tumultuous landscape, they must digitally transform their businesses to become more resilient. Read on to discover how you can stay competitive through market disruptions by tapping into the value of your data.

    Download

  • HITRUST CSF Certification: Most commonly asked questions

    The HITRUST Common Security Framework (CSF) was developed by IT and healthcare professionals to provide a framework for managing the security requirements inherent in the Health Insurance Portability and Accountability Act (HIPAA). Find more about some of the answers to the most common questions in this document.

    Download

  • Guide to Measuring Software Delivery through Metrics

    Review this guide to learn about how 3 software leaders leverage metrics to measure software delivery.

    Download

  • 2024 IVF sector growth: Better access, results, care

    IVF 2024 Trends: Market leaders note shifts to wider access, fertility preservation, big data, and AI. Clinics shift from academic centers, enhancing patient experience with personalized care, digital tools, and hybrid models. Key advancements in clinical tech. See full report for more insights.

    Download

  • Nurture patient loyalty with convenient payments

    How can you increase patient payments on the front-end without burdening billing staff? Improving the payment experience could help you receive more payments while saving billers time and boosting patient satisfaction. Tune into this webcast to learn more.

    Download

  • With InterSystems Financial Services Suite, data silos are a past relic

    Consider the challenges and barriers (such as silos and time-intensive data validation processes) to effective financial services data management in this InContext Paper by Bloor. You’ll also understand how InterSystems Financial Services Solution Suite resolves these issues with a 360-degree view of enterprise and customer data.

    Download

  • Adjust to the modern insurance industry: 8 steps for success

    As the insurance industry continues to change rapidly, it has become business-critical for workers to adapt to the new standards of service presented by customers and other top organizations. However, many insurers can be daunted by this new wave of expectations and struggle to know where to begin. Browse this guide to learn more.

    Download

  • Computer Weekly - 16 November 2021: How cosmetics retailer Lush authenticates with ease

    In this week's Computer Weekly, we find out how Lush has modernised authentication, governed by a desire to care for customer data. We talk to Nasa's CDO about data as a strategic asset. And we foreground a call for the government and the Post Office to compensate Horizon victims without delay. Read the issue now.

    Download

  • Do Your Members Know About Your Price Transparency Tool?

    Did you know that most health plan members have no idea that they have cost estimation tools available from their health insurance plan? In fact, only 1 in 3 people recall ever being told about these resources, but a whopping 67% list this as one of the top five most important health plan resources.

    Download

  • Computer Weekly – 21 May 2019: Managing software updates in Windows 10

    In this week's Computer Weekly, we find out how technology is fighting poverty by increasing financial inclusion. We examine how best to manage the challenges of Microsoft's new plan for ongoing Windows 10 updates. And we find out how data innovation at Lloyd's of London is supporting a wider digital modernisation. Read the issue now.

    Download

  • New wave BI and analytics: turning modern data stores to account

    This e-guide looks at how companies and other organisations are doing BI and analytics on the newer data stores.

    Download

  • Traditional vs. enterprise risk management: How do they differ?

    Businesses understand they cannot exist in a risk-free environment. How to manage the risks they face depends on many variables, including the industry the business is in and its size. In this e-guide, we compare traditional risk management and enterprise risk management and outline the important differences between the two.

    Download

  • The Future of Financial Services: Part 1

    In the first part of our 'Future of Financial Services' e-guide series, we interview 5 fledgling fintech companies that are working on a wide range of products and services to help reduce costs and make businesses more effective.

    Download

  • The currency of trust: why banks and insurers must make customer data safer and more secure

    Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.

    Download

  • 7 risk mitigation strategies to protect business operations

    Risk mitigation strategies must not only identify risks and threats, but also stress the importance of identifying vulnerabilities that could open the door to risk events. In this infographic, we put together the seven most widely used risk mitigation strategies with to help business keep their data safe.

    Download

  • Computer Weekly - 19 July 2022: Tracking the rise of homeworking across the UK

    In this week's Computer Weekly, homeworking has more than doubled in the UK due to the pandemic – we look at the regional differences. The pressure is growing on cyber security teams – we find out how to avoid staff burnout and lost talent. And we examine the role that tech startups play in the growth of Amazon Web Services. Read the issue now.

    Download

  • Computer Weekly - 12 July 2022: The most influential people in UK technology

    In this week's Computer Weekly, we reveal the 50 most influential people in UK IT for 2022, and talk to the winner of the 12th annual UKtech50, National Cyber Security Centre CEO Lindy Cameron. Also, we take an in-depth look at the crisis in chip supply and what's needed to solve it. Read the issue now.

    Download

  • The future of enterprise IT: Social, social, mobile, analytics and cloud

    Cloud and data technologies are allowing organizations to provide service levels not even dreamt of a few years ago. This guide looks at some examples of these technologies transforming organizations in South-East Asia.

    Download

  • CW Middle East Oct to Dec 2017

    This year the Gitex event in Dubai had a focus on how technology is disrupting organisations across the Middle East. One of the main themes of discussion was smart cities and with Dubai recognised as a world leader, this was no surprise.

    Download

  • CW Nordics: Bergen's tech hub seeks global success

    Norway's second largest city, Bergen, is building a tech ecosystem that is beginning its development with a focus on the city's industrial heritage. Also in this issue, read how Norway's government has had to backtrack on a law that removed tax relief on energy consumption at datacentres that process cryptocurrency mining.

    Download

  • CW Nordics - August-October 2020: Bergen's tech hub seeks global success

    Norway's second largest city, Bergen, is building a tech ecosystem that is beginning its development with a focus on the city's industrial heritage. Also in this issue, read how Norway's government has had to backtrack on a law that removed tax relief on energy consumption at datacentres that process cryptocurrency mining.

    Download

  • Cybersecurity Market Insights & Decision Guide

    Done correctly, cybersecurity goes beyond tools and applications to encompass how you deploy and configure technology. With this guide, learn how to protect your organization and prepare for an audit.

    Download

  • Top IT Predictions in APAC in 2023

    In this round-up, we review some of the key IT trends that are likely to shape the industry across the APAC region in 2023.

    Download