Insurance 2020: Innovating beyond Old Models
By: IBM Line of Business View more from IBM Line of Business >>
Download this next:
Insuring the uninsurable: Is cyber insurance worth its salt?
By: TechTarget ComputerWeekly.com
Type: Research Content
Cyber insurance is one of the fastest growing areas of risk cover in the insurance industry as businesses increasingly turn to specialist insurance in an attempt to cover a portion of their enterprise risk.
Cyber risk is notoriously difficult to quantify and businesses face an arduous choice in deciding which risks to manage themselves and which risks to transfer to the insurance market.
This article dips a toe into this emerging risk area and outlines some steps businesses can take to make better informed risk mitigation decisions.
These are also closely related to: "Insurance 2020: Innovating beyond Old Models"
-
Cyber Liability Insurance
By: Cisco
Type: White Paper
Like health and car insurance, cyber insurance is a line of coverage designed to mitigate losses from cyber incidents.
This white paper looks at how cyber liability insurance can help organizations secure themselves in the case of a cyber incident, highlighting how it deals with a number of threat scenarios, including:
- Loss or destruction of data
- Damage to software/hardware
- Extortion demands to appease bad actors
- And more
The paper then goes on to discuss how security controls such as multi-factor authentication (MFA) and endpoint security, can bolster the effects of insurance, and lower rates.
Download the white paper to learn more about the benefits of a trusted cyber insurance policy.
-
A buyers guide to cyber insurance
By: WatchGuard Technologies, Inc.
Type: Resource
With cyberattacks on the rise, the demand for cyber insurance is skyrocketing.
But with so many classifications and options, how do you know what to look for?
This buyer’s guide highlights and breaks down the key types of cyber insurance to give you a stronger understanding of what to look for in a solution, including:
- Hacksurance
- Theft and fraud
- Forensic investigation
- And more
Download now to unlock a deeper understanding of the cyber insurance landscape.
Find more content like what you just read:
-
Strategies for winning the battle for the policyholder
By: Ensono Limited
Type: White Paper
According to recent research insurance profits fell by about 15% across the sector over the last year. This white paper examines the opportunities for insurance businesses willing to lean in on new and emerging technologies and outline the strategies that could bring success in a sector in flux. Download now to learn more.
-
A Computer Weekly buyer's guide to cyber insurance
By: TechTarget ComputerWeekly.com
Type: eBook
In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.
-
Identity security for insurance providers
By: SailPoint Technologies
Type: Infographic
Insurance providers possess vast quantities of their customers’ personal information. Without the proper security precautions, this data presents a serious risk to the business. Download this infographic to unlock 5 strategies that can help insurance companies tackle common challenges and get identity security right.
-
How does Groupe Mutuel defend against phishing?
By: SoSafe
Type: Case Study
To learn how insurance company Groupe Mutuel augments the security awareness of its 3,000 employees, check out this case study.
-
Cyber insurance: Heads they win, tails they win, too?
By: Tanium
Type: White Paper
“Insurance, as it’s currently practiced, is usually heads they win and tails they win, too,” explains cybersecurity expert Eric Gyasi to Tanium’s magazine Focal Point. “Cyber has upended that model quite a bit.” In this white paper, discover strategies for navigating the tricky terrain of cyber insurance.
-
The key to cloud upskilling in an evolving digital environment
By: Cloud Academy
Type: Case Study
Discover in this case study how Cloud Academy proved a critical part of instilling a learning culture in technology talent across AIA while building the in-house capabilities to leverage and enhance investments in cloud transformation.
-
Strategies to simplify insurance discovery
By: Inovalon, Inc.
Type: Webcast
Uninsured and self-pay patients are on the rise. Have you taken action to address the uptick? Robust insurance verification is key to protecting your margins and collecting the revenue you’ve earned.
-
Computer Weekly – 11 June 2019: Are schools delivering on digital skills?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look at the differing approaches to teaching computer science across the UK and assess the pros and cons of each. Our latest buyer's guide examines the technologies and best practices of multicloud environments. And we find out what you get for your money when buying cyber insurance. Read the issue now.
-
Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
By: TechTarget ComputerWeekly.com
Type: Resource
Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
-
Computer Weekly – 5 July 2022: How to get the right level of cyber insurance
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look at how the market for cyber insurance is evolving and how to avoid buying the wrong level of cover. We find out what role hydrogen technologies could play in reducing datacentre carbon emissions. And we hear how a 125-year old bicycle maker is embracing digital innovation. Read the issue now.
-
CW Buyers Guide To Finance and Insurance
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This 11-page buyer's guide looks at mitigating the risks of data breaches with liability insurance; how to finance your organisation's technology platforms; and funding software investment for the economic recovery while budgets remain tight.
-
Achieving an agile cloud migration
By: Cyara
Type: Case Study
When this insurance and financial services organization began to struggle with Contact Center as a Service (CCaaS) migration, they sought out a way they could combat a handful of cloud challenges. Access this case study to hear the full story.
-
Fintech: Meet ten financial services disruptors - Part One
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we meet ten up-and-coming financial services disruptors and discuss what the driving force behind their success is. These were interviews published on the Computer Weekly blog: Fintech Makes the World go Around.
-
Fintech: Meet ten financial services disruptors - Part One
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we meet ten up-and-coming financial services disruptors. This series of interviews were originally published on the Computer Weekly blog: Fintech Makes the World go Around.
-
Cloud data platform: Democratize analytics for your business
By: Teradata
Type: Case Study
After seeking out a system to centralize and analyze data, a leading insurance agency discovered a connected, multi-cloud data platform for enterprise analytics. Access this case study to learn how they were able to integrate data scattered across the company and push their digital transformation efforts forward.
-
Computer Weekly – 20 September 2022: A gold medal performance for networking
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance, how the centuries-old London insurance market is going digital, thanks to Lloyd's of London, and how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now.
-
How this insurance company secured its attack surface
By: Ionix
Type: Case Study
A fortune 500 insurance and financial services company found itself with increased risks throughout its organization. With IONIX Attack Surface Management, the company was able to discover and inventory all internet-facing assets. Download now to unlock the full case study.
-
Zero-day fire drill with Tidelift
By: Tidelift
Type: Case Study
EMPLOYERS insurance used to deal with false positive security alerts constantly. But after bringing Tidelift into their workflows, the company was able to tackle over 150 projects overnight and quickly identify which ones needed to be fixed right away. Check out the case study to learn more.
-
Inside MLC Life Insurance's cloud journey
By: TechTarget ComputerWeekly.com
Type: eGuide
When MLC decided to move all its infrastructure, applications and services to the public cloud, its journey was more about people than technology. Learn how MLC overcame these people-related challenges in its move to cloud, improved its security posture and reduced infrastructure spending.
-
Focus ASEAN: Security & Digital Transformation
By: TechTarget ComputerWeekly.com
Type: eGuide
With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.
-
A healthcare payor’s cloud evolution: Case study
By: Hinduja Global Solutions
Type: Case Study
A Fortune 100 company in the managed healthcare insurance industry set 4 goals, one of them being to boost their development team’s efficiency. To discover how the company tackled those goals, explore this case study.
-
How Conduit helped achieve a 87% ED avoidance rate
By: Conduit
Type: Case Study
In this case study, discover why Conduit’s URAC-accredited 24/7 nurse-first line was a perfect fit for one of Ohio’s largest health insurance companies, significantly decreasing call hold times and abandonment rates while increasing member satisfaction.
-
2024 threat report: 10 vulnerabilities to watch out for
By: Arctic Wolf
Type: Research Content
Security pros, what vulnerabilities should you be on the lookout for in 2024? In Arctic Wolf Labs’ 2024 threat report, learn about 10 top vulnerabilities and how you can mitigate threats.
-
E-book: 6 security leaders’ biggest challenges
By: SoSafe
Type: eBook
What do security leaders cite as their biggest challenges? In this 27-page e-book, 6 security leaders – from Signal Iduna, Randstad and more – share their thoughts. Keep reading to unlock those insights.
-
Provider uses on-demand experts to reduce cloud migration efforts by 80%
By: Hinduja Global Solutions
Type: Infographic
HGS brought on over 90 on-demand experts across various workstreams to reinforce existing teams, support essential operations, and enable innovation for a health provider. The results? Read the infographic to view the stats and to see how leveraging on-demand experts could assist your own workload migrations.
-
Fintech : Meet ten financial services disruptors - Part Two
By: TechTarget ComputerWeekly.com
Type: eGuide
Whether it's the insurance sector, lending or full service banking there are a number of companies, often still in their early stages, disrupting the financial services sector. But who are these companies, where do they come from, and what drives them? In this e-guide, the second in a series, we meet another ten of them.
-
QR code phishing on the rise: How to protect yourself
By: Cofense
Type: Blog
QR code phishing attacks are on the rise, exploiting the ubiquitous technology to steal data. Learn how to spot malicious QR codes, protect yourself, and train employees. Read on for details on real-world attacks and defense strategies. Learn more in this resource.
-
Elevating analytics excellence with cloud-powered innovation
By: Exponentia.ai and Databricks
Type: Case Study
A leading insurance agency recognized the need to transition its analytics operations to the cloud, driven by the escalating demands of managing ever-growing datasets. Download this case study now to learn how the agency leveraged a data platform to make insights readily available and enable real-time decision-making.
-
A simple, AI-powered digital platform made for seniors
By: Reply
Type: Case Study
When the largest American health insurance company needed an online digital platform for their elderly customers, the goal was to ensure that not only could seniors connect with others but have access to apps for both their physical and mental health. To do this, they needed a partner to turn the idea into a reality. Read on to see who they chose.
-
HITRUST CSF Certification: Most commonly asked questions
By: Coalfire
Type: White Paper
The HITRUST Common Security Framework (CSF) was developed by IT and healthcare professionals to provide a framework for managing the security requirements inherent in the Health Insurance Portability and Accountability Act (HIPAA). Find more about some of the answers to the most common questions in this document.
-
Guide to Measuring Software Delivery through Metrics
By: VMware Tanzu
Type: eBook
Review this guide to learn about how 3 software leaders leverage metrics to measure software delivery.
-
Strategies to Simplify Insurance Discovery
By: Inovalon, Inc.
Type: Webcast
In unpredictable times, revenue stability is the key to longevity. Strengthen your financial position by finding all available coverage for all claims. Learn how a comprehensive insurance discovery tool can help you maximize time, resources, and revenue.
-
With InterSystems Financial Services Suite, data silos are a past relic
By: InterSystems
Type: Analyst Report
Consider the challenges and barriers (such as silos and time-intensive data validation processes) to effective financial services data management in this InContext Paper by Bloor. You’ll also understand how InterSystems Financial Services Solution Suite resolves these issues with a 360-degree view of enterprise and customer data.
-
Best practices to manage & automate M365 security scenarios
By: SkyKick
Type: White Paper
Read this paper to ascertain best practices MSPs can use to manage and automate M365 security scenarios, all to deliver the M365 security your customers need.
-
Adjust to the modern insurance industry: 8 steps for success
By: Hyland Software
Type: eBook
As the insurance industry continues to change rapidly, it has become business-critical for workers to adapt to the new standards of service presented by customers and other top organizations. However, many insurers can be daunted by this new wave of expectations and struggle to know where to begin. Browse this guide to learn more.
-
Computer Weekly - 16 November 2021: How cosmetics retailer Lush authenticates with ease
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how Lush has modernised authentication, governed by a desire to care for customer data. We talk to Nasa's CDO about data as a strategic asset. And we foreground a call for the government and the Post Office to compensate Horizon victims without delay. Read the issue now.
-
Do Your Members Know About Your Price Transparency Tool?
By: HealthSparq
Type: White Paper
Did you know that most health plan members have no idea that they have cost estimation tools available from their health insurance plan? In fact, only 1 in 3 people recall ever being told about these resources, but a whopping 67% list this as one of the top five most important health plan resources.
-
The 4 key pillars of insurance transformation
By: SAS
Type: eBook
Insurance companies are grappling with rapidly increasing disruption and competition. To succeed in this tumultuous landscape, they must digitally transform their businesses to become more resilient. Read on to discover how you can stay competitive through market disruptions by tapping into the value of your data.
-
Master the HICN to MBI Transition
By: Inovalon, Inc.
Type: Webcast
With Medicare’s recent switch from Health Insurance Claim Number (HICN) to the Medicare Beneficiary Identifier (MBI), assessing its impact is critical. In this webinar, look at using the latest technology to streamline this transition and perform real-time requests.
-
Computer Weekly 21 May 2019: Managing software updates in Windows 10
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how technology is fighting poverty by increasing financial inclusion. We examine how best to manage the challenges of Microsoft's new plan for ongoing Windows 10 updates. And we find out how data innovation at Lloyd's of London is supporting a wider digital modernisation. Read the issue now.
-
Save Time and Money with Streamlined Eligibility Verification
By: Inovalon, Inc.
Type: Webcast
There’s no easy way to manually keep up with changes in eligibility and coverage. Discover an all-payer health insurance eligibility software that will help your organization fast-track eligibility checks, reduce claims denials and maximize efficiency in this webinar.
-
New wave BI and analytics: turning modern data stores to account
By: TechTarget ComputerWeekly.com
Type: eGuide
This e-guide looks at how companies and other organisations are doing BI and analytics on the newer data stores.
-
Traditional vs. enterprise risk management: How do they differ?
By: TechTarget ComputerWeekly.com
Type: eGuide
Businesses understand they cannot exist in a risk-free environment. How to manage the risks they face depends on many variables, including the industry the business is in and its size. In this e-guide, we compare traditional risk management and enterprise risk management and outline the important differences between the two.
-
The Future of Financial Services: Part 1
By: TechTarget ComputerWeekly.com
Type: eGuide
In the first part of our 'Future of Financial Services' e-guide series, we interview 5 fledgling fintech companies that are working on a wide range of products and services to help reduce costs and make businesses more effective.
-
The currency of trust: why banks and insurers must make customer data safer and more secure
By: TechTarget ComputerWeekly.com
Type: Research Content
Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
-
7 risk mitigation strategies to protect business operations
By: TechTarget ComputerWeekly.com
Type: Infographic
Risk mitigation strategies must not only identify risks and threats, but also stress the importance of identifying vulnerabilities that could open the door to risk events. In this infographic, we put together the seven most widely used risk mitigation strategies with to help business keep their data safe.
-
Computer Weekly - 19 July 2022: Tracking the rise of homeworking across the UK
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, homeworking has more than doubled in the UK due to the pandemic – we look at the regional differences. The pressure is growing on cyber security teams – we find out how to avoid staff burnout and lost talent. And we examine the role that tech startups play in the growth of Amazon Web Services. Read the issue now.