Don't fall behind: Carriers appetites for more datafor better underwriting and risk selectionand desire to drive down costs are fueling a move toward becoming more customer and tech focused.
IBM Executive Security Advisor Diana Kelley talks about the resources and vectors that cyber criminals are using to gain access to sensitive information, and about how those attackers are further developing their capabilities.
It can be hard for insurers to sort the hype from reality when it comes to areas like social media, mobile, analytics, big data, cloud, and digital capabilities.
Enterprise architecture can conflict with project management, according to a recent Novarica report. Set up an effective process that works toward long-term goals.