You've requested...

Insurance 2020: Innovating beyond Old Models

If a new window did not open, click here to view this asset.

Download this next:

Insuring the uninsurable: Is cyber insurance worth its salt?

Cyber insurance is one of the fastest growing areas of risk cover in the insurance industry as businesses increasingly turn to specialist insurance in an attempt to cover a portion of their enterprise risk.

 Cyber risk is notoriously difficult to quantify and businesses face an arduous choice in deciding which risks to manage themselves and which risks to transfer to the insurance market.

 This article dips a toe into this emerging risk area and outlines some steps businesses can take to make better informed risk mitigation decisions.

These are also closely related to: "Insurance 2020: Innovating beyond Old Models"

  • Cyber Liability Insurance

    Like health and car insurance, cyber insurance is a line of coverage designed to mitigate losses from cyber incidents.

    This white paper looks at how cyber liability insurance can help organizations secure themselves in the case of a cyber incident, highlighting how it deals with a number of threat scenarios, including:

    • Loss or destruction of data
    • Damage to software/hardware
    • Extortion demands to appease bad actors
    • And more

    The paper then goes on to discuss how security controls such as multi-factor authentication (MFA) and endpoint security, can bolster the effects of insurance, and lower rates.

    Download the white paper to learn more about the benefits of a trusted cyber insurance policy.

  • A buyers guide to cyber insurance

    With cyberattacks on the rise, the demand for cyber insurance is skyrocketing.

    But with so many classifications and options, how do you know what to look for?

    This buyer’s guide highlights and breaks down the key types of cyber insurance to give you a stronger understanding of what to look for in a solution, including:

    • Hacksurance
    • Theft and fraud
    • Forensic investigation
    • And more

    Download now to unlock a deeper understanding of the cyber insurance landscape.

Find more content like what you just read:

  • Strategies for winning the battle for the policyholder

    According to recent research insurance profits fell by about 15% across the sector over the last year. This white paper examines the opportunities for insurance businesses willing to lean in on new and emerging technologies and outline the strategies that could bring success in a sector in flux. Download now to learn more.

    Download

  • Insurance in the age of digital services

    In order to scale their business and fulfill customer needs, La Mobilière decided it was time to digitize their insurance products. But this digitization process is complex and can lead to many organizational challenges. Download this case study to see how La Mobilière uses Miro to digitize its insurance offerings.

    Download

  • Tanium for Cyber Insurance

    Managing and protecting the thousands of devices that are connected to your network has never been more challenging. Cyber insurance is a key tool to mitigate the associated risks. Explore 10 steps for assessing cyber risk for cyber insurance when you download this guide.

    Download

  • A Computer Weekly buyer's guide to cyber insurance

    In this 14-page buyer's guide, Computer Weekly looks at how the market is evolving, why the devil is in the detail when it comes to assessing what's missing from policies and what steps companies need to take when investing in an insurance package.

    Download

  • How advanced data analytics is changing the game for insurers

    This research content illustrates how advanced data analytics and digital transformation are changing the game for insurers. Inside, you’ll discover how you can leverage the full power of CX and learn about the potential of automation in insurance. Download the full report now to find out how the insurance landscape is evolving in the age of CX.

    Download

  • Protect your margins with robust insurance verification

    Uninsured and self-pay patients are on the rise. Have you taken action to address the uptick? Robust insurance verification is key to protecting your margins and collecting the revenue you’ve earned. Learn how to leverage insurance discovery to fight bad debt in this webinar with FinThrive.

    Download

  • Rewinding PHE work could help with Medicaid and CHIP final regulation compliance

    Some states have already cut in-person interviews and limited renewals to once a year, aligning with Medicaid and CHIP final rule policies.

    Download

  • Strategies to simplify insurance discovery

    Uninsured and self-pay patients are on the rise. Have you taken action to address the uptick? Robust insurance verification is key to protecting your margins and collecting the revenue you’ve earned.

    Download

  • Computer Weekly – 11 June 2019: Are schools delivering on digital skills?

    In this week's Computer Weekly, we look at the differing approaches to teaching computer science across the UK and assess the pros and cons of each. Our latest buyer's guide examines the technologies and best practices of multicloud environments. And we find out what you get for your money when buying cyber insurance. Read the issue now.

    Download

  • Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk

    Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.

    Download

  • Computer Weekly – 5 July 2022: How to get the right level of cyber insurance

    In this week's Computer Weekly, we look at how the market for cyber insurance is evolving and how to avoid buying the wrong level of cover. We find out what role hydrogen technologies could play in reducing datacentre carbon emissions. And we hear how a 125-year old bicycle maker is embracing digital innovation. Read the issue now.

    Download

  • Balancing innovation, safety, compliance, and risk in life sciences

    The life sciences sector is evolving rapidly, collaboration, compliance, and proactive risk management are key to patient safety.

    Download

  • XDR vs other cybersecurity solutions

    The prerequisite question before even thinking of buying an extended detection and response (XDR) solution is: Do you need it? Multiple pain points could trigger such a need ranging from the rise of ransomware, the risk of supply-chain attacks, to regulatory and insurance requirements. Read this blog for a buyer’s guide to XDR.

    Download

  • Achieving an agile cloud migration

    When this insurance and financial services organization began to struggle with Contact Center as a Service (CCaaS) migration, they sought out a way they could combat a handful of cloud challenges. Access this case study to hear the full story.

    Download

  • Fintech: Meet ten financial services disruptors - Part One

    In this e-guide we meet ten up-and-coming financial services disruptors and discuss what the driving force behind their success is. These were interviews published on the Computer Weekly blog: Fintech Makes the World go Around.

    Download

  • Fintech: Meet ten financial services disruptors - Part One

    In this e-guide we meet ten up-and-coming financial services disruptors. This series of interviews were originally published on the Computer Weekly blog: Fintech Makes the World go Around.

    Download

  • How Sentry Insurance saved $1M in training & support costs with Whatfix

    In this video, Sentry Insurance talks about how Whatfix helped them to build personalized, in-app learning across Workday and seven other internal and customer-facing systems, including customer administration, policy management, claims, and a customer portal.

    Download

  • Computer Weekly – 20 September 2022: A gold medal performance for networking

    In this week's Computer Weekly, we find out how the IT team behind the 2022 Commonwealth Games in Birmingham delivered a winning performance, how the centuries-old London insurance market is going digital, thanks to Lloyd's of London, and how low-cost high street stores succumbed to the inevitable and are going online. Read the issue now.

    Download

  • How to do both mainframe AND cloud better

    When enterprise insurance talks about the evolution of their technology strategy, they seldom mention mainframe and public cloud in the same breath. In this e-book, discover the secrets to bridging the gap between mainframe and cloud.

    Download

  • Focus ASEAN: Security & Digital Transformation

    With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.

    Download

  • Inside MLC Life Insurance's cloud journey

    When MLC decided to move all its infrastructure, applications and services to the public cloud, its journey was more about people than technology. Learn how MLC overcame these people-related challenges in its move to cloud, improved its security posture and reduced infrastructure spending.

    Download

  • 3 ways providers can bend the denials curve in their favor

    Healthcare providers and insurance companies are increasingly at odds, and at the heart of the fight lies denials. Check out this guide to explore the reasons why denials have become an even larger problem in recent years— and access three proven solutions providers can use to flip the script in their favor.

    Download

  • How Conduit helped achieve a 87% ED avoidance rate

    In this case study, discover why Conduit’s URAC-accredited 24/7 nurse-first line was a perfect fit for one of Ohio’s largest health insurance companies, significantly decreasing call hold times and abandonment rates while increasing member satisfaction.

    Download

  • Data management: When payers and providers come together

    As cost of care increases, payers are realizing they can no longer just be an insurance company. Meanwhile, providers are going through their own business model revolution as they face increased pressure from retail health. Discover how healthcare payers are growing their data ecosystems to work better with providers in this on-demand webinar.

    Download

  • Fintech : Meet ten financial services disruptors - Part Two

    Whether it's the insurance sector, lending or full service banking there are a number of companies, often still in their early stages, disrupting the financial services sector. But who are these companies, where do they come from, and what drives them? In this e-guide, the second in a series, we meet another ten of them.

    Download

  • How do Medicare Advantage providers create health plans tailored to a particular population?

    Medicare Advantage insurers should prioritize data collection and provider collaboration when establishing population-specific health plans.

    Download

  • A simple, AI-powered digital platform made for seniors

    When the largest American health insurance company needed an online digital platform for their elderly customers, the goal was to ensure that not only could seniors connect with others but have access to apps for both their physical and mental health. To do this, they needed a partner to turn the idea into a reality. Read on to see who they chose.

    Download

  • Identity attacks are on the rise: An analysis of Cozy Bear

    How can you stay protected from Cozy Bear and other modern cyberattacks? Learn how Falcon Identity Protection can protect your sprawling attack surfaces in this webinar. For instance, using Falcon resulted in 85% faster responses to threats with full attack path visibility for Commercial Bank of California.

    Download

  • How personalized services can boost trust in banking and insurance

    Discover how leading banks and insurance companies use cloud-based communication solutions to personalize customer experiences, prevent fraud, enhance service, and build trust. Read the full case study to learn more.

    Download

  • Presentation transcript: Compare 8 authentication strategies

    To compare 8 authentication strategies for boosting email security, read this 15-page presentation transcript featuring expert insights from Echoworx leaders.

    Download

  • Protecting your business from the growing ransomware threat

    As ransomware threats continue to surge, cybercriminals are using advanced tactics, which are crippling businesses. In fact, 66% of companies were hit in the past year, making it critical for organizations to have the right measures in place to combat them. Access this white paper to learn more.

    Download

  • With InterSystems Financial Services Suite, data silos are a past relic

    Consider the challenges and barriers (such as silos and time-intensive data validation processes) to effective financial services data management in this InContext Paper by Bloor. You’ll also understand how InterSystems Financial Services Solution Suite resolves these issues with a 360-degree view of enterprise and customer data.

    Download

  • Innovate rapidly with generative AI assisted model operations

    Download this product overview to accelerate your AI and GenAI journey with LTIMindtree and AWS using Canvas.ai, a platform that provides a personalized build-to-run workflow and resource optimization to scale your AI/ML initiatives.

    Download

  • IT secuirty: Delivering superior business value to unlock opportunities

    As the IT services management industry evolves, the fragmented and point-solution heavy security solution market only increases the challenge of effectively managing security risk. This e-book outlines a security maturity model for ITSPs, helping ITSPs create competitive advantages. Read the e-book to learn more.

    Download

  • CW EMEA – October 2023: Prepare for AI explosion

    In this month's CW EMEA, we look at generative AI, which Accenture claims is the next big thing in enterprise IT. We also look at a demo of multi-supplier non-real-time RAN optimisation, a Ryder Cup tech testbed, and how Zurich Insurance has cut the time it takes to develop ServiceNow apps. Read the issue now.

    Download

  • Adjust to the modern insurance industry: 8 steps for success

    As the insurance industry continues to change rapidly, it has become business-critical for workers to adapt to the new standards of service presented by customers and other top organizations. However, many insurers can be daunted by this new wave of expectations and struggle to know where to begin. Browse this guide to learn more.

    Download

  • Computer Weekly - 16 November 2021: How cosmetics retailer Lush authenticates with ease

    In this week's Computer Weekly, we find out how Lush has modernised authentication, governed by a desire to care for customer data. We talk to Nasa's CDO about data as a strategic asset. And we foreground a call for the government and the Post Office to compensate Horizon victims without delay. Read the issue now.

    Download

  • Do Your Members Know About Your Price Transparency Tool?

    Did you know that most health plan members have no idea that they have cost estimation tools available from their health insurance plan? In fact, only 1 in 3 people recall ever being told about these resources, but a whopping 67% list this as one of the top five most important health plan resources.

    Download

  • Computer Weekly – 21 May 2019: Managing software updates in Windows 10

    In this week's Computer Weekly, we find out how technology is fighting poverty by increasing financial inclusion. We examine how best to manage the challenges of Microsoft's new plan for ongoing Windows 10 updates. And we find out how data innovation at Lloyd's of London is supporting a wider digital modernisation. Read the issue now.

    Download

  • New wave BI and analytics: turning modern data stores to account

    This e-guide looks at how companies and other organisations are doing BI and analytics on the newer data stores.

    Download

  • Traditional vs. enterprise risk management: How do they differ?

    Businesses understand they cannot exist in a risk-free environment. How to manage the risks they face depends on many variables, including the industry the business is in and its size. In this e-guide, we compare traditional risk management and enterprise risk management and outline the important differences between the two.

    Download

  • The Future of Financial Services: Part 1

    In the first part of our 'Future of Financial Services' e-guide series, we interview 5 fledgling fintech companies that are working on a wide range of products and services to help reduce costs and make businesses more effective.

    Download

  • MDR: The key to mastering cyber risk management & more

    As organizations continue to search for new ways to reduce costs while staying better protected, many IT leaders have turned to building their active threat mitigation strategies, including managed detection and response (MDR) tactics. But what exactly is MDR? Browse this guide to learn more.

    Download

  • The currency of trust: why banks and insurers must make customer data safer and more secure

    Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.

    Download

  • Computer Weekly - 19 July 2022: Tracking the rise of homeworking across the UK

    In this week's Computer Weekly, homeworking has more than doubled in the UK due to the pandemic – we look at the regional differences. The pressure is growing on cyber security teams – we find out how to avoid staff burnout and lost talent. And we examine the role that tech startups play in the growth of Amazon Web Services. Read the issue now.

    Download

  • 7 risk mitigation strategies to protect business operations

    Risk mitigation strategies must not only identify risks and threats, but also stress the importance of identifying vulnerabilities that could open the door to risk events. In this infographic, we put together the seven most widely used risk mitigation strategies with to help business keep their data safe.

    Download

  • Quarterly cyber threat bulletin: 5 threats in 2024

    In this Quarterly Cyber Threat Bulletin from Coalition, learn about 5 prevalent threats targeting organizations in 2024 – and how you can defend against them.

    Download