MicroStrategy World: AI Best Practices and Real-World Examples

Perficient Data & Analytics

Christine Livingston, Chief Strategy for AI at Perficient spoke on AI best practices and gave some real world examples on how it would work. Standardize tooling by capability. An insurance company wanted to provide information to care providers looking to verify benefits.

How to make sure your cyber insurance policy pays out

IT Governance

Cyber insurance is big business these days. Find out how a ransomware victim used cyber insurance to guide its response effort >> A cyber insurance policy doesn’t necessarily guarantee that you will receive aid following a data breach.

Enabling Key Stakeholders in the Insurance Industry

Perficient Data & Analytics

Ensuring that agents and brokers have the best tools to evaluate and close opportunities can be a real differentiator for insurance companies. For example, many companies wish to invest in solutions that effectively automate and improve underwriting, as such solutions can help remove human bias, increase the lendable pool of consumers, and reduce response times.

Measure Twice, Cut Once: How the Right Data Modeling Tool Drives Business Value

erwin

The need for an effective data modeling tool is more significant than ever. For example, an organization may have 300 applications, with 50 different databases and a different schema for each. Evaluating a Data Modeling Tool – Key Features.

Data Governance Tools: What Are They? Are They Optional?

erwin

Data governance tools used to occupy a niche in an organization’s tech stack, but those days are gone. The rise of data-driven business and the complexities that come with it ushered in a soft mandate for data governance and data governance tools. Data Governance Tools and Data Ethics.

Data Governance Tools: What Are They? Are They Optional?

erwin

Data governance tools used to occupy a niche in an organization’s tech stack, but those days are gone. The rise of data-driven business and the complexities that come with it ushered in a soft mandate for data governance and data governance tools. Data Governance Tools and Data Ethics.

Cybersecurity Standards for the Insurance Sector – A New Patchwork Quilt in the US?

HL Chronicle of Data Protection

In the past two years, multiple state bills that have been introduced in the US to provide for cybersecurity requirements and standards to the insurance sector, with recent legislative activity taking place in particular within the States of Ohio, South Carolina, and Michigan. The entering into effect of multiple state laws in this area may present challenges for insurance providers operating in states where such cybersecurity requirements are provided for.

MY TAKE: Can Hollywood’s highly effective ‘source-code’ security tools help make IoT safe?

The Last Watchdog

Related: HBO hack spurs cyber insurance market. Another example Hearn cited was a company that deploys a unique version of an expensive industrial control system to several different factories. Over the past couple of decades, some amazing advances in locking down software code have quietly unfolded in, of all places, Hollywood. Makes sense, though.

IoT 117

Hackers Breached Virginia Bank Twice in Eight Months, Stole $2.4M

Krebs on Security

Now the financial institution is suing its insurance provider for refusing to fully cover the losses. The company determined the hacking tools and activity appeared to come from Russian-based Internet addresses. Everest National Insurance Company did not respond to requests for comment.

In a Few Days, Credit Freezes Will Be Fee-Free

Krebs on Security

There are dozens of private companies that specialize in providing consumer credit reports and scores to specific industries, including real estate brokers, landlords, insurers, debt buyers, employers, banks, casinos and retail stores.

UK Honey Bees and Insurance; an existential threat in the wings?

CGI

UK Honey Bees and Insurance; an existential threat in the wings? There is of course one difference between the hive and the Insurance sector – the ability to respond. shobana.lv@cgi.com. Wed, 09/05/2018 - 04:28.

Four Use Cases Proving the Benefits of Metadata-Driven Automation

erwin

The banking, financial services and insurance industry typically deals with higher data velocity and tighter regulations than most. These bottlenecks are only made worse when organizations attempt to get by with systems and tools that are not purpose-built.

The trend toward pay-as-you-drive insurance

CGI

The trend toward pay-as-you-drive insurance. Almost every insurance company is currently working on providing pay-as-you-drive insurance. Insurance based on driving behavior can be very attractive for both the insurer and the insured. By adjusting his or her driving behavior, the insured can significantly reduce premium costs while the insurer can benefit from reduced risk and damage. Anonymous. Wed, 03/23/2016 - 08:26.

Risk 40

The Tragedy of the Data Commons

John Battelle's Searchblog

What tools and social structures have we created in response to its emergence as a currency in our world? No, this post is about the business of health insurance. In the essay, Hardin employs a simple example of a common grazing pasture, open to all who own livestock.

#ModernDataMasters: Martin Squires, The Analysis Foundry

Reltio

Things are becoming more flexible and the challenge now is probably that there is lots of technology tools around and they have over-lapping functionality. Don’t get distracted by the tools and shiny new technology toys. Kate Tickner, Reltio.

Regulatory Update: NAIC Spring 2019 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Spring 2019 National Meeting (Spring Meeting) in Orlando, Florida, from April 6 to 9, 2019. ceding insurer could be eligible for the same reduced collateral requirements that would apply to qualifying EU reinsurers under the revised CFR Model Laws. To date, approximately 30 insurance groups, representing 15 lead states, have volunteered to participate in field testing. Virginia Insurance Commissioner Scott A.

Regulatory Update: NAIC Summer 2019 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2019 National Meeting (Summer Meeting) in New York City from August 3 to 6, 2019. The New York State Department of Financial Services recently amended its annuity suitability regulation to apply a “best interest” standard in connection with both life insurance and annuity transactions with consumers. Long-Term Care Insurance (EX) Task Force Organizes Six Work Streams Relevant to Its Charges .

Paper 65

#ModernDataMasters: Steve Whiting, Chief Operations Officer

Reltio

I was trained in Oracle relational databases and GUI tools to deliver group-wide Banking Systems. I worked in several Telcos and latterly in the City for an international insurance company. Kate Tickner, Reltio.

MDM 52

Regulatory Update: NAIC Fall 2018 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Fall 2018 National Meeting (Fall Meeting) in San Francisco, California, from November 15 to 18, 2018. NAIC Continues its Evaluation of Insurers’ Use of Big Data. The NAIC is continuing its review of property and casualty insurers’ use of predictive modeling in rate filings and is developing related guidance materials for states to use in reviewing predictive models.

Paper 65

OCR Provides Insight into Enforcement Priorities and Breach Trends

HL Chronicle of Data Protection

Regulators, industry experts, and researchers provided insight into health privacy and security enforcement trends, emerging threats, and new tools at a recent conference focused on the Health Insurance Portability and Accountability (HIPAA) regulatory framework.

#ModernDataMasters: Tony Saldanha, President, Transformant

Reltio

For example, whilst I was the CIO of P&G India in 1995-8, we realised that our third-party distributors all had names for things like customer, order, financial payment which were not exactly the same as what P&G called them. Kate Tickner, Reltio.

#ModernDataMasters: Bob More, SVP Global Field Operations

Reltio

I’ve seen it most successful when it’s taken in the context of a larger overall initiative, for example a digital transformation or implementation of a new system or process. Kate Tickner, Reltio.

MDM 52

#ModernDataMasters: Scott Taylor, “The Data Whisperer”

Reltio

For example you’re not going to get IoT to work across organisations and devices without having a common data structure. People forget than when you build big, ambitious things – ships, buildings or bridges for example – you need the nuts and bolts and you cannot build without them.

MDM 52

Everteam.iFile | Connect, Extract, Process, Manage and Analyze all your Stored Information

Everteam

Everteam.iFile will analyze large amounts of iFile packages using powerful AI tools to achieve emerging business innovations and maintain the appropriate level of governance compliance as iFile assets and communications are securely stored using record level hash and asset watermarks.

SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic

The Last Watchdog

A recent report by network detection and response vendor ExtraHop details how third-party security and analytics tools routinely “ phone home ” in order to exfiltrate network behavior data back to their home base, without explicitly asking permission. In another case, a device management tool was deployed in a hospital and used the WiFi network to insure data privacy, as it provisioned connected devices. LW: Banks are a good example of this.

Cloud 117

Two New Proposed Rules Would Increase Interoperability of Health Information

InfoGoTo

It would also simplify the process of transitioning between insurance plans and providers by helping patients access their information thereby easing the flow of PHI.

CMS 70

ROUNDTABLE: Huge Capital One breach shows too little is being done to preserve data privacy

The Last Watchdog

That includes social security and social insurance numbers, bank account numbers, phone numbers, birth dates, email addresses and self-reported income; in short, just about everything on an identity thief’s wish list. The tools and tutorials to execute deeply invasive hacks, and the support services and access to black markets – to get lucratively paid – are readily available and accessible.

MY TAKE: Coping with security risks, compliance issues spun up by ‘digital transformation’

The Last Watchdog

A tech stack is the collection of software and tools companies cobble together to deploy apps, websites and other digital products. That included social security and social insurance numbers, bank account numbers, phone numbers, birth dates, email addresses and self-reported income; in short, just about everything on an identity thief’s wish list. One example is Redis, which stands for R e mote Dictionary Server.

How to handle a ransomware attack

IT Governance

For example, you should provide them with said pens and paper, direct them to hard copies of information they might need and bring in colleagues who can’t work to help out. If you don’t already have cyber insurance, it’s worth considering.

From the CTO: From Information Governance to Information Asset Management

Everteam

For example, the length of time a particular asset is important differs from one department to another. This is just one example of one criterion among many others.

Tokenization: Ready for Prime Time

Thales eSecurity

There are valuable tools to help fight digital security threats, but which tools to use and how to deploy them depend on the type of data and the use case, or application. Among the tools that protect the data itself by making it unusable should it be stolen is tokenization.

A Low Code Option for the Complex Data World

Perficient Data & Analytics

With that car comes the purchase of a driver’s license, maybe some training costs to get it, new car insurance, and the acceptance of future purchases for gas and maintenance to use it. Tableau and Power BI are great tools. Let’s Go Car Shopping!

Catches of the month: Phishing scams for August 2019

IT Governance

There’s plenty of advice on how to spot phishing scams , but without any real-world examples that explain how they work, it can be easy to see the threat as purely theoretical. For example, Discord gives individuals the choice to set up two-factor authentication.

NEW TECH: Cequence Security deploys defense against botnets’ assault on business logic

The Last Watchdog

Pick any company in any vertical – financial services, government, defense, manufacturing, insurance, healthcare, retailing, travel and hospitality – and you’ll find employees, partners, third-party suppliers and customers all demanding remote access to an expanding menu of apps — using their smartphones and laptops. Take the airline industry as an example. That isn’t so simple, as organizations don’t want security tools to modify or change the apps in any way.

MY TAKE: What it takes to beat cybercrime in the age of DX and IoT: personal responsibility

The Last Watchdog

Uber is a prime example of an Internet-centric enterprise comprised of a collection of tools and services hosted by myriad partners. A report from insurance underwriting giant Lloyd’s of London and risk modeling consultancy, Air Worldwide, showed how a three-day outage of the top cloud services providers would cause $15 billion in damage to the U.S.

IoT 112

How to create an ISO 27001-compliant risk treatment plan

IT Governance

For example, you might address the risk of a work-issued laptop being stolen by creating a policy that instructs employees to keep devices with them and to store them safely.

Risk 77

How To Start Your Own Cybersecurity Business

Cyber Info Veritas

For example, when I was working on the different businesses from my different mentors, I did it for free. I also got my own Liability insurance. You can get a quote from an insurance company. Besides, you’ll have to get this insurance anyway after you form your business.