Podcast Episode 117: Insurance Industry Confronts Silent Cyber Risk, Converged Threats

The Security Ledger

In this episode of the podcast (#117), we go deep on one of the hottest sectors around: cyber insurance. In the first segment, we talk with Thomas Harvey of the firm RMS about the problem of “silent cyber” risk to insurers and how better modeling of cyber incidents is helping to address that threat. In this episode of the podcast (#117), we go deep on one of the hottest sectors around: cyber insurance. The insurance was dirt cheap. Are insurers ready?

Top 10 Governance, Risk and Compliance (GRC) Vendors

eSecurity Planet

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Third-party governance. IT governance and security. Privacy governance and management.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Reltio Cloud – Your Key to a Successful SAP S/4HANA Migration

Reltio

Reltio Cloud also acts as the governance platform to address the data quality problems before S/4HANA ingestion. Business IT B Business B Customer 360 B Digital Transformation B Financial Services & Insurance B Graph B Healthcare B High-Tech & Manufacturing B IT B Life Sciences B Machine Learning B media & entertainment B Product 360 B Retail & CPG B Supplier 360 B Travel & hospitalityGuy Vorster, Principal Solutions Consultant, Reltio.

Government survey reveals GDPR awareness is falling short

IT Governance

Of the businesses surveyed, those in the finance and insurance industries had the highest levels of awareness (79%), followed by information and communications (67%) and education (52%). The industries with the least awareness were construction (25%) and production and manufacturing (27%).

IT 43

#ModernDataMasters: Mike Evans, Chief Technology Officer

Reltio

It will be possible to put more emphasis on the people, process and data governance which really make MDM live and breathe.”. We teach that problem solving is at the core of MDM, and how important data governance principles are regardless of the configuration of the underpinning technology.”. Prioritise people, process and governance. Kate Tickner, Reltio.

MDM 63

Reltio Supports Apple CEO Tim Cook’s Clarion Call for Stronger US Customer Data Privacy Laws

Reltio

But today modern data management solutions that include technologies like machine learning empower organizations to implement data governance and privacy initiatives at scale, and are an essential part of their overall Customer 360 data strategy. Privacy law and as Reltio customers can attest they are already ahead of the game, with Reltio governing their sensitive customer data at scale throughout their organization using master data management, graph, and machine learning technologies.

#ModernDataMasters: Henrik Liliendahl, Chairman & CTO, Product Data Lake

Reltio

But that was my route into data management and going from there into MDM PIM and data governance. Product data looks very different depending on the product you are talking about and manufacturers see products very differently from the merchants. “On On the technology side you can exploit cloud services and data lake concepts which means you can receive the data in the form that say, a manufacturer might submit it, but consume it in a way that a merchant might want to.”.

MDM 46

#ModernDataMasters: Lewis Ownes, CEO Agile Solutions

Reltio

If you ask people about data management and all they talk about is governance then you know they are only being driven by regulation or a concern. On the other side of things in the start up world and data driven companies, they can be purely about data and development and that is innovative as companies like FaceBook have found, often the data governance is lacking. “A In the same way if you just show up talking about governance you can stifle innovation.

#ModernDataMasters: Steve Whiting, Chief Operations Officer

Reltio

I worked in several Telcos and latterly in the City for an international insurance company. Ethical data management means you need data governance and data security by design – these initiatives are hard to retrofit. In the past organisations often mobilized for large MDM programmes and had to retrospectively drive the governance throughout – now we are seeing that data governance is often leading – it has become a non-negotiable.”. Kate Tickner, Reltio.

MDM 40

Digital Enterprises: Built on Modern MDM

Reltio

To ensure no wall between data, governance, and insight, she shares her mantras: invest intelligently, source strategically, and collaborate. Business Compliance Customers IT Partners B Business B Data Science B Digital Transformation B Financial Services & Insurance B High-Tech & Manufacturing B IT B Life Sciences B Machine Learning B Patient & Member 360 B Retail & CPG DataDriven19Ankur Gupta, Sr. Product Marketing Manager, Reltio.

MDM 40

Spigraph, Everteam & ImageFast Provide Critical Information Governance Solutions to European Market

Everteam

London (UK), Paris (FR) – April 2, 2019 Spigraph, one of the leading European Value Added distributors in the capture and digital transformation market and part of Everteam Group, a leader in information governance solutions, is pleased to announce the availability of two products from the Everteam Information Governance Suite to their portfolio: everteam.discover and everteam.policy. We have on boarded ImageFast as our reseller for the Everteam Information Governance products.

#ModernDataMasters: Tony Saldanha, President, Transformant

Reltio

What is the role of data governance in these processes? Thanks to the effort of that group there are now standards across master data fields in most of the manufacturing related items. Driving those standards and governing them for the industry and the company are some of the most important roles that an IT professional can play. “I Kate Tickner, Reltio.

#ModernDataMasters: David Balzan, Business Unit Manager MDM

Reltio

I believe that operational data governance will continue to rise in importance. You can only do that and demonstrate that you have done it is via excellent data governance – the systems and processes must be in place to do this. Kate Tickner, Reltio. David Balzan , Business Unit Manager MDM, Viqtor Davis is a driven data management professional, enthusiastic leader and technical architect.

MDM 40

List of data breaches and cyber attacks in February 2022 – 5.1 million records breached

IT Governance

First, Russia targeted banks and government departments, then Ukraine hit back, attacking the Moscow stock exchange. If you find yourself facing a cyber security disaster, IT Governance is here to help. million records breached appeared first on IT Governance UK Blog.

List of data breaches and cyber attacks in May 2021 – 116 million records breached

IT Governance

If you find yourself facing a cyber security disaster, IT Governance is here to help. The post List of data breaches and cyber attacks in May 2021 – 116 million records breached appeared first on IT Governance UK Blog.

List of data breaches and cyber attacks in August 2020 – 36.6 million records breached

IT Governance

Author of FastPOS malware revealed, pleads guilty Cyber insurance: The moral quandary of paying criminals who stole your data For six months, security researchers have secretly distributed an Emotet vaccine Please stop hard-wiring AWS credentials in your code.

List of Data Breaches and Cyber Attacks in March 2021 – 21 Million Records Breached

IT Governance

The post List of data breaches and cyber attacks in March 2021 – 21 million records breached appeared first on IT Governance UK Blog.

List of data breaches and cyber attacks in December 2020 – 148 million records breached

IT Governance

The post List of data breaches and cyber attacks in December 2020 – 148 million records breached appeared first on IT Governance UK Blog. What else would you expect from the final month of 2020 than the highest number of publicly disclosed incidents we’ve ever recorded?

Catches of the month: Phishing scams for July 2021

IT Governance

Patients’ names, dates of birth, addresses, medical record numbers, patient account numbers, medical diagnoses, treatment and/or clinical information, test results, prescription information and health insurance details were all affected.

List of data breaches and cyber attacks in June 2021 – 9.8 million records breached

IT Governance

If you find yourself facing a cyber security disaster, IT Governance is here to help. million records breached appeared first on IT Governance UK Blog. We found a comparatively low 9,780,931 breached records from publicly disclosed security incidents in June 2021.

List of data breaches and cyber attacks in October 2020 – 18.4 million records breached

IT Governance

million records breached appeared first on IT Governance UK Blog. With 117 publicly reported security incidents, October 2020 is the leakiest month we’ve ever recorded. The good news is that those data breaches and cyber attacks accounted for just 18,407,479 breached records.

Top 4 takeaways from the Gartner Data and Analytics Conference

Collibra

This conference brought together data and analytics leaders from top industries such as government, banking, financial services, insurance, and manufacturing. Data Governance adaptive data governance Gartner

Episode 204: Josh Corman of CISA on securing the Vaccine Supply Chain

The Security Ledger

Joshua Corman, the Chief Strategist for Healthcare and COVID on CISA’s COVID Task Force, joins us to talk about the myriad of cyber threats facing healthcare and the vaccine distribution system and how the federal government is working to counter them.

Think you’re not susceptible to phishing? Think again

IT Governance

of respondents, and a message saying the recipient was eligible for medical insurance was clicked by 39.2% The manufactured sense of urgency and our fear and curiosity often override our better judgement, and even if it’s for a moment, the damage has been done. Think again appeared first on IT Governance Blog. A version of this blog was originally published on 8 January 2018. On average, one in ten emails is a phishing scam.

IT 58

Join Our Webinar on November 16th: IGI & Preservica Address the Governance of Long-Term Digital Information

IGI

Please join the IGI and Preservica on November 16th at 11am ET for a webinar addressing The Governance & Preservation of Long-Term Digital Information. Barclay Blair, Founder and Executive Director, Information Governance Initiative (IGI). Business and government leaders are making major investments and betting their organization’s success to customize and deliver products and services on their ability to manage dynamic and complex digital information systems and flows.

California Consumer Privacy Act: The Challenge Ahead – Four Key Considerations for Health and Life Sciences Companies

HL Chronicle of Data Protection

Managing the interaction of these new requirements with existing obligations under the Health Insurance Portability and Accountability Act of 1996 (HIPAA), California’s Confidentiality of Medical Information Act (CMIA), and other health privacy laws will continue to be an area of focus in the health privacy community for years to come. Instead, the CCPA expressly exempts PHI collected by a Covered Entity or Business Associate that is governed by HIPAA.

Security Blueprints of Many Companies Leaked in Hack of Swedish Firm Gunnebo

Krebs on Security

The Gunnebo Group is a Swedish multinational company that provides physical security to a variety of customers globally, including banks, government agencies, airports, casinos, jewelry stores, tax agencies and even nuclear power plants.

The hidden threats facing your intellectual property

IT Governance

For life sciences and pharmaceutical companies, this includes data on the development and testing of new therapies and details of how therapies are manufactured. Last year, private healthcare giant BUPA suffered a breach affecting 108,000 health insurance policies when a rogue employee copied and removed information from the organisation. The information affected is said to have included names, date of birth, nationalities and insurance membership numbers.

IT 51

California Consumer Privacy Act: The Challenge Ahead – Four Key Considerations for Health and Life Sciences Companies

HL Chronicle of Data Protection

Managing the interaction of these new requirements with existing obligations under the Health Insurance Portability and Accountability Act of 1996 (HIPAA), California’s Confidentiality of Medical Information Act (CMIA), and other health privacy laws will continue to be an area of focus in the health privacy community for years to come. Instead, the CCPA expressly exempts PHI collected by a Covered Entity or Business Associate that is governed by HIPAA.

California Consumer Privacy Act: The Challenge Ahead – Four Key Considerations for Health and Life Sciences Companies

HL Chronicle of Data Protection

Managing the interaction of these new requirements with existing obligations under the Health Insurance Portability and Accountability Act of 1996 (HIPAA), California’s Confidentiality of Medical Information Act (CMIA), and other health privacy laws will continue to be an area of focus in the health privacy community for years to come. Instead, the CCPA expressly exempts PHI collected by a Covered Entity or Business Associate that is governed by HIPAA.

62% of organisations unaware of the GDPR

IT Governance

There is an alarming lack of awareness across all industries about the EU General Data Protection Regulation (GDPR) , according to a government survey. The finance and insurance (79%), information or communications (67%) and education (52%) sectors have the highest awareness of the GDPR. The finance and insurance sector is also the most likely to have put in place measures to comply with the GDPR, with 54% having done so.

Belden discloses data breach as a result of a cyber attack

Security Affairs

Belden, the manufacturer of networking and cable products, disclosed a data breach, threat actors have stolen employee and business information.

Phishing emails and malicious attachments responsible for 34% of cyber attacks

IT Governance

The gaming and public-sector industries were mostly affected by targeted attacks, whereas the insurance and telecom industries mostly suffered opportunistic attacks. Financial and manufacturing organisations were equally affected by both. A recent F-Secure report has found that phishing emails (16%) and malicious attachments (18%) together accounted for 34% of cyber attacks.

IT 42

Top GRC Tools & Software for 2021

eSecurity Planet

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Third-party governance. IT governance and security. Privacy governance and management.

Best Fraud Management Systems & Detection Tools in 2022

eSecurity Planet

Finally, it also is useful for companies looking for a governance, risk, compliance ( GRC ) solution. In its 2021 Threat Force Intelligence Index , IBM reported that manufacturing and financial services were the two industries most at risk for attack, making up 23.2%

NEW TECH: DataLocker introduces encrypted flash drive — with key pad

The Last Watchdog

DataLocker honed its patented approach to manufacturing encrypted portable drives and landed some key military and government clients early on; the company has continued branching out ever since. This could be in high security areas, relating to the government or military, or you might be in different countries, where secure Internet connections are not available.

California Governor Signs into Law Bills Updating the CPRA and Bills Addressing the Privacy and Security of Genetic and Medical Data, Among Others

Hunton Privacy

Additional bills, amending the California Confidentiality of Medical Information Act (“CMIA”) and the California Insurance Code, also were also signed into law. AB-825 : This bill amends California’s (1) data breach notification law (for both government agencies (Cal.

Regulatory Update: NAIC Summer 2018 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2018 National Meeting in Boston, Massachusetts, from August 4 to 7, 2018. NAIC Continues its Evaluation of Insurers’ Use of Big Data . The NAIC is continuing its review of property and casualty insurers’ use of predictive modeling in rate filings and is developing related guidance materials for states to use in reviewing predictive models. Big Data Enforcement Insurance Policy

Iran-linked APT group Pioneer Kitten sells access to hacked networks

Security Affairs

According to the experts, the threat actors are merely trying to monetize their efforts selling information that have no intelligence value for the Iranian Government.

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

According to the 2021 IBM Threat Force Intelligence Index , Manufacturing was the industry most likely to be attacked last year, comprising 23.2% Finance and insurance finished a close second at 22.4%. Cybercrime is a growth industry like no other.