Key Regulatory Issues in 2016 (Part 2)
Large insurers must understand and manage regulatory mandates across more jurisdictions and services than ever before.
Large insurers must understand and manage regulatory mandates across more jurisdictions and services than ever before.
Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
Stacey Guardino is a New York based partner in KPMG’s financial services regulatory practice. She has more than 25 years of experience serving diversified financial institutions focusing on insurance and bank holding companies.
It is time for the insurance industry to wake up -- or it will have further fiduciary regulations and scrutiny thrust upon it.
Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
Tony Steuer connects consumers and insurance agents by providing "Insurance Literacy Answers You Can Trust." Steuer is a recognized authority on life, disability and long-term care insurance literacy and is the founder of the Insurance Literacy Institute and the Insurance Quality Mark and has recently created a best practices standard for insurance agents: the Insurance Consumer Bill of Rights.
When ERM is practiced in a mature and robust fashion, it should boost an organization’s resiliency and add an R to the acronym.
Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
Donna Galer is a consultant, author and lecturer.
She has written three books on ERM: Enterprise Risk Management – Straight To The Point, Enterprise Risk Management – Straight To The Value and Enterprise Risk Management – Straight Talk For Nonprofits, with co-author Al Decker. She is an active contributor to the Insurance Thought Leadership website and other industry publications. In addition, she has given presentations at RIMS, CPCU, PCI (now APCIA) and university events.
Currently, she is an independent consultant on ERM, ESG and strategic planning. She was recently a senior adviser at Hanover Stone Solutions. She served as the chairwoman of the Spencer Educational Foundation from 2006-2010. From 1989 to 2006, she was with Zurich Insurance Group, where she held many positions both in the U.S. and in Switzerland, including: EVP corporate development, global head of investor relations, EVP compliance and governance and regional manager for North America. Her last position at Zurich was executive vice president and chief administrative officer for Zurich’s world-wide general insurance business ($36 Billion GWP), with responsibility for strategic planning and other areas. She began her insurance career at Crum & Forster Insurance.
She has served on numerous industry and academic boards. Among these are: NC State’s Poole School of Business’ Enterprise Risk Management’s Advisory Board, Illinois State University’s Katie School of Insurance, Spencer Educational Foundation. She won “The Editor’s Choice Award” from the Society of Financial Examiners in 2017 for her co-written articles on KRIs/KPIs and related subjects. She was named among the “Top 100 Insurance Women” by Business Insurance in 2000.
To avoid getting left behind, companies need to prepare for how they will communicate using social media when a catastrophe strikes.
Monitor and Test
When not in crisis mode, it is helpful for companies to monitor social media. Viewing the social media environment in the normal course of business can help companies ascertain how their brand, products and services are viewed by the public. Companies can purchase monitoring services or build these capabilities in-house.
While monitoring social media is an important part of regular business, it becomes essential after a catastrophe to identify issues that need immediate attention. This helps to ensure that the traditional and social media messages the company is sending are having the desired impact. If the same questions continue to be asked on social media, it’s a clear sign that the message is not getting across.
As part of their overall catastrophe preparation, companies should test their communication response plan to assess their procedures as well as their staff. Testing can help ensure that everyone understands their roles and responsibilities and is able to react quickly. Drills assist in identifying blockages and help address uncertainties in the process. After the test or following an actual event, the company should conduct a thorough reevaluation and debriefing to identify the areas that worked well and those that need improvement.
Preserve the Corporate Reputation
Today, a story about a disaster can be trending on social media even before the company involved is aware of the loss. Organizations that wait too long to respond can cause lasting damage to their reputation. A company that is perceived as avoiding or failing to address a story may soon realize that its lack of response becomes the subject of that story. Undoing the damage caused by a tardy or ill-conceived response can be very difficult.
Many people realize that companies may make mistakes, but how these companies react and the decisions they make when faced with a disaster can potentially lessen confidence among customers and the wider public. Knowing how and when to respond helps project an image of competence and concern. Social media is the fastest way to reach people, project the company’s message and protect its reputation.
To become better prepared, companies have to identify their most likely risks and develop plans to mitigate those exposures, whether they are health, safety or environmental. Companies need to know how best to respond on social media if a disaster were to affect their business. To do so, companies may want to work with consultants that can provide risk analysis and mitigation services and help to prepare a crisis response. In addition, to help plan how they will respond to a crisis on social and traditional media, companies should also consider insurance that can defray the costs of hiring expert help when a disaster strikes. No one knows when a catastrophe may occur, but being prepared can help lessen the damage. Customers will look to these companies for information– companies that can provide that information are more likely to weather a crisis with their reputation unscathed.
Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
Lori Brassell-Cicchini is vice president for ESIS Catastrophe Services. Based in El Dorado Hills, CA, Brassell-Cicchini is responsible for the development of customized programs for clients that have sustained third party catastrophic losses.
How can technology solutions be used to disarm hackers and prevent cyber losses, avoiding possibly significant claims?
How does a savvy cyber insurance or reinsurance underwriter determine when breach-prevention measures have been taken by a given risk? How can today’s technology solutions be used to disarm the hackers and prevent cyber losses, reducing the potential for a significant claim?
Today, like never before, we face the frequent barrage of spear phishing attacks, new forms of very creative and nasty malware such as remote access Trojans (RATs), ransomware, zero-day malware (that means your antivirus doesn’t yet have a signature for the malware), not to mention the risks of malicious insiders, infected laptops coming and going behind our firewalls. In addition, many small and medium-sized businesses (SMBs) face increased scrutiny by government regulators. Cyber crime is growing at a tremendous rate – it’s become an organized, big business opportunity for criminals, projected to grow to $600 billion this year, larger than any other form of crime, according to the World Bank.
Cyber liability underwriters will want to appreciate what a network security, cyber risk management-focused, underwriting prospect looks like relative to the broader market.
All cyber liability enterprise policyholders are not equal when measuring breach prevention methods and techniques that may be deployed with an eye toward mitigating significant future losses.
You might ask – why would my smaller business be a target – we’re not Bank of America – we’re not Home Depot or TJMAXX or Anthem? Yes, they all are big targets for big hackers, but cyber criminals don’t discriminate. In fact, they find SMBs easier targets because, traditionally, your level of defenses against cyber crime might not be as advanced as those at Bank of America – which has a $400 million annual information security budget. To the cyber criminals in in the dark corners of the Internet, you’re called a "soft" target – they feel you are easier to exploit.
One piece of ransomware and you might be out of business. Some of the latest ransomware exploits will not only encrypt your laptop or desktop, but they also look for file servers and do the same, automatically. Then, you won’t have any access to your own files – or, even worse, customer records – until you pay the ransom. The FBI even recommends you pay the extortion fee. We find this all wrong. It’s completely backward. We cannot let ourselves be victims. It’s time to get more active and be one step ahead of the next attack – you are a target but you don’t have to be a victim.
It all starts with best practices. For example, if you did frequent daily backups and tested these backups, then, when you’ve been victimized by ransomware, instead of paying the extortion fee, why not wipe the infected computer, re-image it then restore the latest backup? When asked, most SMBs say "I don’t do frequent, daily, backups” or “I haven’t figured out how to wipe and re-image all of our systems in the event they get infected.” So, it’s that simple, one best practice – Backup and Restore -- would save you thousands of dollars in extortion fees. You could thumb your nose at the cyber criminals instead of giving them some of your hard-earned revenue.
Cyber liability policy terms and conditions should reflect more favorably on “Breach Prevention”-focused organizations.
Best practices are things you do - steps you take - actions and plans, risk management and claims mitigation techniques. Within those plans, we are certain you will include which security countermeasures to budget for this year.
Seven Best Practices to Reduce Risk
Although we thought about going into details about recent security concepts, such as next-generation endpoint security or network access control, it seems more appropriate to focus on the best practices instead of the best security tools you might consider deploying.
For example, we consider encryption a best practice and not a product or tool. We are sure you'll find many commercial and freely available tools out there. You can always evaluate those tools that you find most suited for your own best-practice model.
So let’s consider the following as MUST-DO best practices in cyber security to defend your SMB against the risk of a breach:
1) Roll out corporate security policies and make sure all your employees understand them.
2) Train employees and retrain employees in key areas – acceptable use, password polices, defenses against social engineering and phishing attacks.
3) Encrypt all records and confidential data so that it’s more secure from prying eyes.
4) Perform frequent backups (continuous backups are even better than daily backups) and have a re-image process on hand at all times.
5) Test your system re-imaging and latest backups by restoring a system to make sure the backup-restore process works.
6) Better screen employees to reduce the risk of a malicious insider.
7) Defend your network behind your firewall using network access control (NAC) – and make sure you can block rogue access (for example, the cleaning company plugging in a laptop at midnight) and manage the bring your own device (BYOD) dilemma.
More Than 95% of Breaches Happen Behind Firewalls – It’s Usually an Employee Mistake
How many times have you heard of a trusted insider falling for a phishing scam or taking a phone call from someone sounding important who needed "inside" information? It's happening too frequently to be ignored. Some employees love browsing Web sites they should not or gambling online or chatting using instant messenger tools. You need to educate them about acceptable usage of corporate resources. They also usually don't know much about password policies or why they shouldn't open the attachment that says "you've won a million - click here and retire now." It's time to start training them.
Invite employees to a quarterly "lunch and learn" training session. Give them bite-sized nuggets of best practice information.
For example, teach them about the do's and don't's of instant messaging. If you are logging e-mail for legal purposes, which in some cases is required by law (SEC requirements for financial trading firms), let them know that you are doing it and why you are doing it. Give them some real-world examples about what they should do in case of an emergency. Teach them why you've implemented a frequent-password change policy and why their password should not be on a sticky note under their keyboard.
Let these sessions get interactive with lots of Q&A. Give an award once per year to the best security compliant employee who has shown initiative with your security policies. If you can keep them interested, they will take some of the knowledge you are imparting into their daily routines. That's the real goal.
Are My Best Practices Working? Time for Self-Assessment Before an Audit
Perform your own security self-assessment against these best practices recommendations I’ve listed above. Find all of the holes in your information security environment so that you can, document them and begin a workflow process and plan to harden your network. Network security is a process, not a product, so to do it right, you need to frequently self-assess against the best guidelines you can find.
Boards of directors, CEOs, CFOs and CIOs are under extreme compliance pressures today. Not only are they charged with increasing employee productivity and protecting their networks against data theft, but they are also being asked to document every aspect of IT compliance.
We recommend, whether or not an outside firm is performing IT compliance audits, that you begin performing measurable compliance self-assessments. You'll need to review those regulations that affect your organization. In the U.S., these range from GLBA for banks to HIPAA for healthcare and insurance providers to PCI for e-tail/retail to CFR-21-FDA-11 for pharma to SOX-404 for public companies.
Some states have their own regulations. In California, for example, if there has been a breach in confidentiality due to a successful hacker attack, companies are required by law to publish this information on their Web sites. The California Security Breach Information Act (SB-1386) requires the company to notify customers if personal information maintained in computerized data files has been compromised by unauthorized access. California consumers must be notified when their name is illegitimately obtained from a server or database with other personal information such as their Social Security number, driver's license number, account number, credit or debit card number, or security code or password for accessing their financial account.
If you are a federal government agency, you need to comply with Executive Order 13231, to ensure protection of information systems for critical infrastructure, including emergency preparedness communications and the physical assets that support such systems. Also, if you are a non-profit organization, you are not exempt from the reporting requirements of regulations in your industry (banking, healthcare, etc.). Please make sure to seek legal counsel if you are not sure of which regulations you'll need to address.
The easiest thing you can do to prove you are in compliance is to document your steps of protecting data.
Document Your Best Practices
Documentation showing that you’ve implemented best practices for risk reduction and against cyber crime will come in handy if you ever have a breach and need to defend yourself to enforce your cyber insurance policy or to keep the government regulators off your back. This kind of documentation is also good in the event someone sues your organization.
You should be able to prove that you have in place all the best policies and practices as well as the right tools and INFOSEC countermeasures for maintaining confidentiality, availability and integrity of corporate data. By frequently assessing your compliance posture, you'll be ready to prove you "didn't leave the keys to the corporate assets in the open." If your network is ever hijacked and data is stolen, you'll have done your very best to protect against this event and it will be less of a catastrophe for your organization.
Do you have a cold, warm or hot backup site in case of a critical emergency? If not, you should start planning one. If you can't afford one, could you create a "virtual" office telecommuting situation where your organization could continue to operate virtually until you've resolved your emergency situation?
Knowing we are under constant attack and risk, now is the best time to begin implementing these seven best practices for network security. Hackers, malicious insiders and cyber-criminals have had their field day this year, and it’s only going to get worse - hijacking our SMB networks and placing most organizations at risk of being out of compliance, tarnishing our brands, reducing our productivity and employee morale -- placing most of us in the passenger seat on a runaway Internet.
By taking a more active approach, setting measurable goals and documenting your progress along the way, you might find yourself in the drivers’ seat of cyber security.
Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
Brian Harrigan, CEO of InsurIQ, a provider of insurance technology solutions, has spent over 40 years in the insurance industry, helping agents and carriers manage the purchasing of insurance and personal protection products.
The court closed what could have turned into a significant expansion of the concept of “sudden and extraordinary employment condition.”
Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
Richard (Jake) M. Jacobsmeyer is a partner in the law firm of Shaw, Jacobsmeyer, Crain and Claffey, a statewide workers' compensation defense firm with seven offices in California. A certified specialist in workers' compensation since 1981, he has more than 18 years' experience representing injured workers, employers and insurance carriers before California's Workers' Compensation Appeals Board.
There are four distribution models to consider: lead generation, agency/brokerage, managing general agency and carrier.
As pictured above, the primary distinctions between participants in each group arise from the amount of insurance risk they bear and their control over certain aspects of the insurance transaction (for example, the authority to bind and underwrite insurance policies).
However, many other tradeoffs await insurance start-ups navigating among these four groups. If you consider the evolution of digital customer acquisition, including new channels like mobile-first agencies and incidental channels, choosing a niche becomes even more complicated.
In this post, I’ll discuss some of the key attributes of each group, touching on topics relevant for start-ups new to the insurance ecosystem. Please note, in the interest of time and readability, this post is an overview. In addition, any thoughts on regulatory issues are focused on the U.S. and are not legal advice.
LEAD GENERATION
Lead generation refers to the marketing process of building and capturing interest in a product to create a sales pipeline. In the insurance context, because of the high-touch sales process, this historically meant passing interested customers to agents or call-center employees. Today, lead-generation operators sell to a variety of third parties, including online agencies and digital sales platforms.
Let’s consider a few key attributes of lead-generation providers:
Revenue model — There are a variety of lead-selling methods, but the most common is “pay per lead,” where the downstream lead buyer (carrier or channel partner) pays a fixed price for each lead received. When pricing leads, quality plays a big role. Things like customer profile, lead content/data, exclusivity, delivery and volume all affect lead quality, which frequently drives the buyer’s price-sensitivity. As a lead-generation provider, you’ll generally make less per customer than others in the distribution chain, but you’ll also assume less responsibility and risk.
Product breadth — With the Internet and enough money, you can generate leads for just about anything. Ask people who buy keywords for class action lawsuits. However, start-ups should consider which insurance products generate leads at acceptable volumes and margins before committing to the lead-generation model. Some products are highly competitive, like auto insurance, and others might be too obscure for the lead model to scale, like alien abduction insurance (which, unbelievably, is a real thing). Start-ups should also consider whether they possess information about customers or have built a trusted relationship with them — the former is often better-suited to lead generation, and the latter can facilitate an easier transition to agency/brokerage.
Required capabilities (partnerships) — Lead-generation providers need companies to buy their data/leads. Their customers are usually the other distribution groups in this post. Sometimes, they sell information to larger data aggregators, like Axciom, that consolidate lead data for larger buyers. Generators need to show lead quality, volume and uniqueness to secure relationships with lead purchasers, but beyond that they don’t typically require any special partnerships or capabilities.
Regulation — While I won’t go into detail here, lead-generation operators are subject to a variety of consumer protection laws.
AGENCIES AND BROKERAGES
Entities in the agency/brokerage group (also called “producers”) come in a variety of forms, including independent agents, brokers, captive agents and wholesale brokers. Of note, most of these forms exist online and offline.
Independent agents represent a number of insurance carriers and can sell a variety of products. Brokerages are very similar to independent agents in their ability to sell a variety of products, but with a legal distinction — they represent the buyer’s interests, whereas agents represent the carriers they work for. Captive agents, as the name suggests, sell products for only one insurer. While this might seem limiting, captive agents can have increased knowledge of products and the minutiae of policies. Finally, some brokers provide services to other agents/brokers that sell directly to customers. These “wholesale brokers” place business brought to them by “retail agents” with carriers, often specializing in unique or difficult placements.
An important difference between the lead-generation group and the agency/brokerage group is the ability to sell and bind policies. Unlike the former, the latter sells insurance directly to the consumer, and in some cases issue binders — temporary coverage that provides protection as the actual policy is finalized and issued.
Some attributes of agencies and brokerages:
Revenue model — Agencies and brokerages generally make money through commissions paid for both new business and on a recurring basis for renewals. The amount you earn in commissions depends on the volume and variety of insurance products you sell. Commission rates vary by product, typically based on the difficulty of making a sale and the value (profitability) of the risk to the insurance carrier. Start-ups should expect to start on the lower end of many commission scales before they can provide evidence of volume and risk quality. Agents and brokers can also be fee-only (paid for service directly and receive no commission), but that’s rare.
Product breadth — Agencies and brokerages sell a variety of products. As a rule, the more complex the product, the more likely the intermediary will include a person (rather than only software). Start-ups should also consider tradeoffs between volume and specialization. For example, personal auto insurance is a large product line, but carriers looking to appoint agents (more detail below) in this category usually have numerous options, including brick and mortar and online/mobile entities. Contrast this with a smaller line like cyber insurance, where carriers may find fewer, specialist distributors who understand unique customer needs and coverages.
Required capabilities (partnerships) — Agencies and brokerages are appointed by carriers. This process is often challenging, particularly for start-ups, which are non-traditional applicants. Expect the appointment process to take a while if the carrier isn’t familiar with your acquisition strategy or business model. Start-ups trying to accelerate the appointment process can start in smaller product markets (e.g. non-standard auto) or seek appointment as a sub-producer. Sub-producers leverage the existing appointments of a independent agency or wholesaler in exchange for sharing commissions. You could also apply for membership in an agency network or cluster — a group of agents/brokers forming a joint venture or association to create collective volume and buying power.
Regulation — Agencies and carriers need a license to sell insurance. Each state has its own licensing requirements, but most involve some coursework, an exam and an application. As we’ve recently seen with Zenefits, most states have a minimum number of study hours required. There are typically separate licenses for property, casualty, life and health insurance. Once you have a license, many states have a streamlined non-resident licensing process, allowing agencies to scale more quickly.
MANAGING GENERAL AGENCIES (MGAs)
A managing general agent (MGA) is a special type of insurance agent/broker. Unlike traditional agents/brokers, MGAs have underwriting authority. This means that MGAs are (to an extent) allowed to select which parties/risks they will insure. They also can perform other functions ordinarily handled by carriers, like appointing producers/sub-producers and settling claims.
Start-ups often consider setting up an MGA when they possess data or analytical expertise that gives them an underwriting advantage vs. traditional carriers. The MGA structure allows the start-up more control over the underwriting process, participation in the upside of selecting good risks and influence over the entire insurance experience, e.g. service and claims.
We’ve recently witnessed MGAs used for two diverging use cases. The first type of MGA exists for a traditional use case — specialty coverages. They are used by carriers that want to insure a specific risk or entity but don’t own the requisite underwriting expertise. For example, if an insurer saw an opportunity in coverage for assisted living facilities but hadn’t written those policies before, it could partner with an MGA that specializes in that category and deeply understands its exposures and risks. These specialist MGAs often partner closely with the carrier to establish underwriting guidelines and roles in the customer experience. Risk and responsibilities for claims, service, etc. are shared between the two parties.
The second type of MGA is a “quasi-carrier,” set up through a fronting program. In this scenario, an insurance carrier (the fronting partner) offers the MGA access to its regulatory licenses and capital reserves to meet the statutory requirements for selling insurance. In exchange, the fronting partner will often take a fee (percentage of premium) and very little (or no) share of the insurance risk. The MGA often has full responsibility for product design and pricing and looks and feels like a carrier. It underwrites, quotes, binds and services policies up to a specific amount of written authority. These MGAs are often set up when a startup wants to control as much of the insurance experience as possible but doesn’t have the time or capital to establish itself as an admitted carrier.
Some important characteristics:
Revenue model: MGAs often get paid commissions, like standard agencies/brokerages, but also participate in the upside or downside of underwriting profit/loss. Participation can come in the form of direct risk sharing (obligation to pay claims) or profit sharing. This risk sharing functions as “skin in the game,” preventing an MGA from relaxing underwriting standards to increase commissions, which are a function of premiums, at the expense of profitability, which is a function of risk quality.
Product breadth: MGAs of either type often provide specialized insurance products, at least at first. The specialization they offer is the reason why customers (and fronting partners) agree to work with them instead of a traditional provider. That said, you might also find an MGA that sells standard products but takes the MGA form because it has a unique channel or customers and wants to share in the resulting profits.
Required capabilities/partnerships: Setting up an MGA generally requires more time and effort than setting up an agency/brokerage. This is because the carrier vests important authority in the MGA, and therefore must work with it to build trust, set guidelines, determine objectives and decide on limits to that authority. Start-ups looking to set up an MGA should be ready to provide evidence they can underwrite uniquely and successfully or have a proprietary channel filled with profitable risks. Fronting often requires a different process, and the setup time required varies based on risk participation or obligations of the program partner. Start-ups should also carefully consider the costs and benefits of being an agency vs. MGA — appointment process difficulty vs. profit sharing, long-term goals for risk assumption, etc.
Regulation: MGAs, like carriers, are regulated by state law. They are often required to be licensed producers. Start-ups should engage experienced legal counsel before attempting to set up an MGA relationship.
CARRIERS
Insurance carriers build, sell and service insurance products. To do this, they often vertically integrate a number of business functions, including some we’ve discussed above — product development, underwriting, sales, marketing, claims, finance/investment, etc.
Carriers come in a variety of forms. For example, they can be admitted or non-admitted. Admitted carriers are licensed in each state of operation; non-admitted carriers are not. Often, non-admitted carriers exist to insure complex risks that conventional insurance marketplaces avoid. Carriers can also be “captives” — essentially a form of self-insurance where the insurer is wholly owned by the insured. Explaining captives could fill a separate post, but if you’re interested in the model you can start your research here.
Attributes to consider:
Revenue Model: Insurance carrier economics can be complicated, but the basic concepts are straightforward. Insurers collect premium payments from insureds, which they generally expect to cover the costs of any claims (referred to as “losses”). In doing so, they profit in two ways. The first is pricing coverage so the total premiums received are greater than the amount of claims paid, though there are regulations and market pressures that dictate profitability. The second is investing premiums. Because insurance carriers collect premiums before they pay claims, they often have a large pool of capital available, called the “float,” which they invest for their own benefit. Warren Buffett’s annual letters to Berkshire shareholders are a great source of knowledge for anyone looking to understand insurance economics. Albert Wenger of USV also recently posted an interesting series that breaks down insurance fundamentals.
Product breadth: Carriers have few limitations on which products they can offer. However, the products you sell affect regulatory requirements, required infrastructure and profitability.
Required capabilities/partnerships: Carriers can market and sell their products using any or all of the intermediaries in this post. While carriers are often the primary risk-bearing entity — they absorb the profits and losses from underwriting — in many cases they partner with reinsurers to hedge against unexpected losses or underperformance. There are a variety of reinsurance structures, but two common ones are excess of loss (reinsurer takes over all payment obligations after the carrier pays a certain amount of losses) and quota share (reinsurer pays a fixed percentage of every loss).
Regulation: I’ll touch on a few concepts, but carrier regulation is another complex topic I won’t cover comprehensively in this post. Carriers must secure the appropriate licenses to operate in each country/state (even non-admitted carriers, which still have some regulatory obligations). They also have to ensure any capital requirements issued by regulators are met. This means keeping enough money on the balance sheet (reserves/surplus) to ensure solvency and liquidity, i.e. maintaining an ability to pay claims. Carriers also generally have to prove their pricing is adequate, not excessive, and not unfairly discriminatory by filing rates (their pricing models) with state commissioners. Rate filings can be “file and use” (pre-approval not required to sell policies), or “prior approval” (rates must be approved before you can sell policies).
CONCLUSION
In this overview, I did not address a number of other interesting topics, including tradeoffs between group choices. For example, you should also consider things like exit/liquidity expectations, barriers to entry and creating unfair advantages before starting an insurance business. Perhaps I’ll address these in a future post. However, I hope this brief summary sparks questions and new considerations for start-ups entering the insurance distribution value chain.
I’m looking forward to watching thoughtful founders create companies in each of the groups above. If you’re one of these founders, please feel free to reach out!
Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
Kyle Nakatsuji is a principal at American Family Ventures, the venture capital arm of American Family Insurance, where he is focused on identifying and supporting early-stage companies affecting the future of the insurance industry. American Family Ventures invests across a variety of sectors, including IoT, Fintech, SaaS and data/analytics.
How do we move beyond the marketing campaigns to understand healthcare suppliers’ performance?
Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
Tom Emerick is president of Emerick Consulting and cofounder of EdisonHealth and Thera Advisors. Emerick’s years with Wal-Mart Stores, Burger King, British Petroleum and American Fidelity Assurance have provided him with an excellent blend of experience and contacts.
Here are there three tech security start-ups that are tackling vulnerabilities and trying to bring rationality to the cyber insurance market.
Craig Hinkley, WhiteHat Security CEO
Casey Corcoran, FourV Systems vice president of strategy
FourV’s goal is to enable a large retailer or bank to monitor the status of its network security day-to-day, or even hour-to-hour, much as a business routinely tracks daily sales, says Casey Corcoran, vice president of strategy at FourV.
“You could tell by noon whether the pattern that you’re seeing in your risk is shaping up properly for that day of the week,” says Corcoran, a former tech executive at Jos A. Bank Clothiers. “If it’s not, you can fix it.”
FourV CEO Derek Gabbard foresees a day in the not-too-distant future when a senior executive will wake up in the morning, glance at her Apple watch and use a FourV app to check the company’s security risk index.
Derek Gabbard, FourV Systems CEO
The idea is to create “risk discussions that are nontechnical, easy-to-understand and jargon-less for the leadership team,” Gabbard says, “so that they have confidence in the work that the chief information security officer and his teams are doing.”
Once FourV gets some traction and amasses large enough data sets, it expects to be able to see — and eventually to be able to predict — risk patterns in vertical industries. Such analysis should be very useful in building actuarial tables, Gabbard told ThirdCertainty. The company already has begun brainstorming how it might go about selling that data directly to the insurance industry, perhaps even by developing a dashboard customized for underwriters.
Rook Security
This tech security vendor supplies managed security services and does forensics investigations of network breaches. Rook investigators respond like a cyber SWAT team to all types of cyber threats, whether that may be a minor data breach that is easily fixed or a deadly cyber attack that requires teams of cyber investigators to jet around the globe.
Listen to a podcast: Drivers behind the rise of cyber insurance
Communication surrounding cyber attacks can be messy and full of mistakes that worsen the damage, according to J.J. Thompson, Rook’s CEO. So Rook’s new War Room app has set up a digital command center for tech and security teams to monitor attacks and to respond swiftly.
Mike Patterson, vice president of strategy, Rook Security
Whether Rook arrives before or after a breach, it quickly gets an inside look at the state of network security. Mike Patterson, Rook’s vice president of strategy, told ThirdCertainty that the readiness of companies varies widely. Some companies boast strong security staffs, resources and planning, while others only have one or two full-time security people — or none at all.
“Not everyone is as prepared as they should be,” Patterson says. “But that’s changing, with much more awareness now on the importance of security and taking care of your data.”
Rook is seeking to be the default option — brought in by the insurer — for post-breach incident response and forensics. It is also looking to provide a service where Rook would be retained by a company to come in and improve security postures so the client qualifies for cyber coverage or gets better pricing.
“It’s a really good opportunity to go shopping for cyber insurance because you’re going to get great rates, and everyone is going to be a little bit slack on the writing terms because they want that business,” Patterson says.
ThirdCertainty’s Edward Iwata contributed to this story.
Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
Byron Acohido is a business journalist who has been writing about cybersecurity and privacy since 2004, and currently blogs at LastWatchdog.com.
"The current industry model has to shift from one that penalizes to one that rewards the customers for positive behaviors."
Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
Shefi Ben Hutta is the founder of InsuranceEntertainment.com, a refreshing blog offering insurance news and media that Millennials can relate to. Originally from Israel, she entered the U.S. insurance space in 2007 and since then has gained experience in online rating models.