Members Only Content
Eight Steps to Creating a Loyalist Team
Teams work or they fail to work. And often, the people on them can't give specific reasons for either outcome. When teams fail, they often dissolve into cliques riddled with blame or confusion. You ...
Benefits of Home Tech for Carriers and Customers
Customers' preferences and expectations for interacting with their home insurance provider are shaped by other interactions in their daily lives. Companies like Uber, Netflix and Amazon have changed ...
CEO Viewpoint: How Biz Insurers Can Jump on the E-Commerce Bandwagon
It seems like InsurTech has become the term du jour over the last nine months. It is often used to imply destruction, disintermediation, disruption and disaster (the four Ds) for the insurance ...
Snapsheet Execs: Virtual Claims Tech Need Not Take Away Field Staff Jobs
The application of technology in the insurance industry is accelerating at a rapid pace, yet the constraints of legacy infrastructure make it difficult to leverage and integrate new tools to enhance ...
CEO Viewpoint: How Drones Are Changing the Face of the Insurance Business
Sometimes it takes a tragedy—maybe even two tragedies—to change a paradigm. But just as Houston and parts of the west coast of Florida will never be the same after the double disasters of ...
Survivors and Game-Changers: Lemonade’s Schreiber Explains What Disruption Looks Like
During an insurance conference in late March this year, a chief executive officer shared the following separate ideas with an audience of InsurTech leaders and analysts: "If you set out to compete ...
Reinsurers Concerned About Cyber Risks Despite Growth Opportunities
Cyber risks continue to morph and grow rapidly around the world, spurring ever-increasing demand for insurance that addresses the risks at hand. Some broker experts who follow the sector see ...
Rating the Cybersecurity Rating Firms: How Accurate Are They?
In just a few years, a growing crop of cybersecurity ratings firms has sprouted to assess the vulnerability of businesses to withstand cyber attacks, scoring them on a scale from good to bad. Key ...

