Features
Cyber Pro Talks Managing Insider Threats, Building a Cybersecurity Career
Boyd Clewis's journey to building a career in cybersecurity began with learning how to persevere and problem solve in the face of setbacks – advice he now shares with companies for managing their ...
Executive Viewpoint: How to Incorporate AI Into Core Insurance Systems
It is easy to get excited about what artificial intelligence (AI) offers the insurance industry. It has been a bright, shiny object on and off for a few decades now. This ...
Talent Management Tips: Ditch Old Job Descriptions
Several features of Carrier Management's October 2023 Spotlight newsletter, "How to Attract Talent: Job Description Basics," provide insurance industry-specific advice about what modern job ...
How a Regional Carrier Protects Against a $60B California Cat Event
While two dozen interested parties spoke at a recent California Department of Insurance workshop on the use of catastrophe modeling in pricing, offering predictable messages supporting carrier, ...
California’s Next Steps: Picking the Right Cat Models and Staffing Up
Is $11 million too much to pay for a public catastrophe model? Does the California Department of Insurance have to hire a new contingent of specialists to understand private models, if those are ...
How to Write Job Advertisements That Attract Top Insurance Talent
What's the best billboard you've ever seen? Why did it stand out? Think of job advertisements like billboards. It's something everyone can see, and the best ones are ...
Viewpoint: Get Ready Now for the Soft Market (Because It’s Coming)
While discussing soft market underwriting may seem ill-timed given current strong results and hard market conditions, there are worrying signs that underwriters are beginning to chase market share in ...
Viewpoint: IT Asset Disposition Is Growing Cybersecurity Threat for All Organizations
Cyber risk headlines are dominated by rising ransomware activity and soaring global data breach costs. The increased ransomware activity, driven largely by threat actor ...

