MicroStrategy World: AI Best Practices and Real-World Examples

Perficient Data & Analytics

Christine Livingston, Chief Strategy for AI at Perficient spoke on AI best practices and gave some real world examples on how it would work. Standardize tooling by capability. An insurance company wanted to provide information to care providers looking to verify benefits.

Enabling Key Stakeholders in the Insurance Industry

Perficient Data & Analytics

Ensuring that agents and brokers have the best tools to evaluate and close opportunities can be a real differentiator for insurance companies. For example, many companies wish to invest in solutions that effectively automate and improve underwriting, as such solutions can help remove human bias, increase the lendable pool of consumers, and reduce response times.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How to make sure your cyber insurance policy pays out

IT Governance

Cyber insurance is big business these days. Find out how a ransomware victim used cyber insurance to guide its response effort >> A cyber insurance policy doesn’t necessarily guarantee that you will receive aid following a data breach.

Measure Twice, Cut Once: How the Right Data Modeling Tool Drives Business Value

erwin

The need for an effective data modeling tool is more significant than ever. For example, an organization may have 300 applications, with 50 different databases and a different schema for each. Evaluating a Data Modeling Tool – Key Features.

Data Governance Tools: What Are They? Are They Optional?

erwin

Data governance tools used to occupy a niche in an organization’s tech stack, but those days are gone. The rise of data-driven business and the complexities that come with it ushered in a soft mandate for data governance and data governance tools. Data Governance Tools and Data Ethics.

A guide to the GDPR for insurance companies

IT Governance

A report published by research and consultancy company Celent highlights the challenges that the GDPR presents to insurers. Insurers are data controllers: a person, public authority, agency or body that determines the purpose of processing personal data.

GDPR 53

Cybersecurity Standards for the Insurance Sector – A New Patchwork Quilt in the US?

HL Chronicle of Data Protection

In the past two years, multiple state bills that have been introduced in the US to provide for cybersecurity requirements and standards to the insurance sector, with recent legislative activity taking place in particular within the States of Ohio, South Carolina, and Michigan. The entering into effect of multiple state laws in this area may present challenges for insurance providers operating in states where such cybersecurity requirements are provided for.

Hackers Breached Virginia Bank Twice in Eight Months, Stole $2.4M

Krebs on Security

Now the financial institution is suing its insurance provider for refusing to fully cover the losses. The company determined the hacking tools and activity appeared to come from Russian-based Internet addresses. Everest National Insurance Company did not respond to requests for comment.

MY TAKE: Can Hollywood’s highly effective ‘source-code’ security tools help make IoT safe?

The Last Watchdog

Related: HBO hack spurs cyber insurance market. Another example Hearn cited was a company that deploys a unique version of an expensive industrial control system to several different factories. Over the past couple of decades, some amazing advances in locking down software code have quietly unfolded in, of all places, Hollywood. Makes sense, though.

IoT 116

UK Honey Bees and Insurance; an existential threat in the wings?

CGI

UK Honey Bees and Insurance; an existential threat in the wings? There is of course one difference between the hive and the Insurance sector – the ability to respond. shobana.lv@cgi.com. Wed, 09/05/2018 - 04:28.

In a Few Days, Credit Freezes Will Be Fee-Free

Krebs on Security

There are dozens of private companies that specialize in providing consumer credit reports and scores to specific industries, including real estate brokers, landlords, insurers, debt buyers, employers, banks, casinos and retail stores.

Four Use Cases Proving the Benefits of Metadata-Driven Automation

erwin

The banking, financial services and insurance industry typically deals with higher data velocity and tighter regulations than most. These bottlenecks are only made worse when organizations attempt to get by with systems and tools that are not purpose-built.

The trend toward pay-as-you-drive insurance

CGI

The trend toward pay-as-you-drive insurance. Almost every insurance company is currently working on providing pay-as-you-drive insurance. Insurance based on driving behavior can be very attractive for both the insurer and the insured. By adjusting his or her driving behavior, the insured can significantly reduce premium costs while the insurer can benefit from reduced risk and damage. Anonymous. Wed, 03/23/2016 - 08:26.

Risk 40

The Tragedy of the Data Commons

John Battelle's Searchblog

What tools and social structures have we created in response to its emergence as a currency in our world? No, this post is about the business of health insurance. In the essay, Hardin employs a simple example of a common grazing pasture, open to all who own livestock.

Regulatory Update: NAIC Spring 2019 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Spring 2019 National Meeting (Spring Meeting) in Orlando, Florida, from April 6 to 9, 2019. ceding insurer could be eligible for the same reduced collateral requirements that would apply to qualifying EU reinsurers under the revised CFR Model Laws. To date, approximately 30 insurance groups, representing 15 lead states, have volunteered to participate in field testing. Virginia Insurance Commissioner Scott A.

Regulatory Update: NAIC Fall 2018 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Fall 2018 National Meeting (Fall Meeting) in San Francisco, California, from November 15 to 18, 2018. NAIC Continues its Evaluation of Insurers’ Use of Big Data. The NAIC is continuing its review of property and casualty insurers’ use of predictive modeling in rate filings and is developing related guidance materials for states to use in reviewing predictive models.

Paper 65

Regulatory Update: NAIC Summer 2019 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2019 National Meeting (Summer Meeting) in New York City from August 3 to 6, 2019. The New York State Department of Financial Services recently amended its annuity suitability regulation to apply a “best interest” standard in connection with both life insurance and annuity transactions with consumers. Long-Term Care Insurance (EX) Task Force Organizes Six Work Streams Relevant to Its Charges .

Paper 65

#ModernDataMasters: Martin Squires, The Analysis Foundry

Reltio

Things are becoming more flexible and the challenge now is probably that there is lots of technology tools around and they have over-lapping functionality. Don’t get distracted by the tools and shiny new technology toys. Kate Tickner, Reltio.

OCR Provides Insight into Enforcement Priorities and Breach Trends

HL Chronicle of Data Protection

Regulators, industry experts, and researchers provided insight into health privacy and security enforcement trends, emerging threats, and new tools at a recent conference focused on the Health Insurance Portability and Accountability (HIPAA) regulatory framework.

#ModernDataMasters: Steve Whiting, Chief Operations Officer

Reltio

I was trained in Oracle relational databases and GUI tools to deliver group-wide Banking Systems. I worked in several Telcos and latterly in the City for an international insurance company. Kate Tickner, Reltio.

MDM 52

#ModernDataMasters: Tony Saldanha, President, Transformant

Reltio

For example, whilst I was the CIO of P&G India in 1995-8, we realised that our third-party distributors all had names for things like customer, order, financial payment which were not exactly the same as what P&G called them. Kate Tickner, Reltio.

#ModernDataMasters: Bob More, SVP Global Field Operations

Reltio

I’ve seen it most successful when it’s taken in the context of a larger overall initiative, for example a digital transformation or implementation of a new system or process. Kate Tickner, Reltio.

MDM 52

#ModernDataMasters: Scott Taylor, “The Data Whisperer”

Reltio

For example you’re not going to get IoT to work across organisations and devices without having a common data structure. People forget than when you build big, ambitious things – ships, buildings or bridges for example – you need the nuts and bolts and you cannot build without them.

MDM 52

The pros and cons of vulnerability scanning

IT Governance

So when organisations use the same tools, they are able to discover weaknesses and fix them before anyone has a chance to exploit them. Conducting scans using outdated or inferior tools therefore means you are liable to miss vulnerabilities and get a false sense of security.

Data Innovator Spotlight - Interview with Charles Joseph, DataZed

Reltio

1-2 Previous Roles & Companies: Worked as a consultant with general insurers, Lloyd’s market firms, brokers and reinsurers, including Beazley Group and RSA. Summary: Charles specializes in data governance, data quality and data strategy for the insurance industry.

The Case for Limiting Your Browser Extensions

Krebs on Security

Last week, KrebsOnSecurity reported to health insurance provider Blue Shield of California that its Web site was flagged by multiple security products as serving malicious content. How did a browser extension lead to a malicious link being added to the health insurance company Web site?

UK cyber crime rate has doubled in the past five years

IT Governance

Phishing and malware were the most common tools for cyber crime – and the larger the organisation, the more likely they were to fall victim. For example, the report found that: Only 9% of organisations have a documented cyber security policy; Only 10% have cyber insurance; and.

Everteam.iFile | Connect, Extract, Process, Manage and Analyze all your Stored Information

Everteam

Everteam.iFile will analyze large amounts of iFile packages using powerful AI tools to achieve emerging business innovations and maintain the appropriate level of governance compliance as iFile assets and communications are securely stored using record level hash and asset watermarks.

Beginners’ Guide to the Fundamentals of Flowcharting in Business Process Management

AIIM

Flowcharting is one of the first tools used in analyzing an existing business process. Let's use this example to explore the symbols and language of flowcharts. In our example earlier of the lamp, there are 3 endpoints (the green terminal symbols).

SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic

The Last Watchdog

A recent report by network detection and response vendor ExtraHop details how third-party security and analytics tools routinely “ phone home ” in order to exfiltrate network behavior data back to their home base, without explicitly asking permission. In another case, a device management tool was deployed in a hospital and used the WiFi network to insure data privacy, as it provisioned connected devices. LW: Banks are a good example of this.

Cloud 116

Benefits of Enterprise Modeling and Data Intelligence Solutions

erwin

In particular, the tool helped them to design their qualification review, which is necessary in a pharmaceutical business. That capability is something I have not seen in other suppliers’ tools.”. a senior manager, data governance at an insurance company with over 500 employees.

Two New Proposed Rules Would Increase Interoperability of Health Information

InfoGoTo

It would also simplify the process of transitioning between insurance plans and providers by helping patients access their information thereby easing the flow of PHI.

CMS 70

ROUNDTABLE: Huge Capital One breach shows too little is being done to preserve data privacy

The Last Watchdog

That includes social security and social insurance numbers, bank account numbers, phone numbers, birth dates, email addresses and self-reported income; in short, just about everything on an identity thief’s wish list. The tools and tutorials to execute deeply invasive hacks, and the support services and access to black markets – to get lucratively paid – are readily available and accessible.

From the CTO: From Information Governance to Information Asset Management

Everteam

For example, the length of time a particular asset is important differs from one department to another. This is just one example of one criterion among many others.

MY TAKE: Coping with security risks, compliance issues spun up by ‘digital transformation’

The Last Watchdog

A tech stack is the collection of software and tools companies cobble together to deploy apps, websites and other digital products. That included social security and social insurance numbers, bank account numbers, phone numbers, birth dates, email addresses and self-reported income; in short, just about everything on an identity thief’s wish list. One example is Redis, which stands for R e mote Dictionary Server.

5 Pillars of a Successful Digital Transformation

AIIM

For example, an oil and gas company will not have the same objectives as an insurance provider. Consider the impact of digital technology in the insurance sector. The large-scale and lasting impacts of a digital transformation will influence your company for decades to come.

Redcar and Cleveland Borough Council still offline after suffering cyber attack

IT Governance

Unlike an attack on retailers, for example, victims have no alternative when systems are down. According to a report from the insurance broker Gallagher , 49% of local councils have been attacked since the start of 2017 and 37% were attacked in the first half of 2019 alone.

Tokenization: Ready for Prime Time

Thales eSecurity

There are valuable tools to help fight digital security threats, but which tools to use and how to deploy them depend on the type of data and the use case, or application. Among the tools that protect the data itself by making it unusable should it be stolen is tokenization.

NEW TECH: Cequence Security deploys defense against botnets’ assault on business logic

The Last Watchdog

Pick any company in any vertical – financial services, government, defense, manufacturing, insurance, healthcare, retailing, travel and hospitality – and you’ll find employees, partners, third-party suppliers and customers all demanding remote access to an expanding menu of apps — using their smartphones and laptops. Take the airline industry as an example. That isn’t so simple, as organizations don’t want security tools to modify or change the apps in any way.

How to handle a ransomware attack

IT Governance

For example, you should provide them with said pens and paper, direct them to hard copies of information they might need and bring in colleagues who can’t work to help out. If you don’t already have cyber insurance, it’s worth considering.