
A Better Way to Diagnose Back Pain
Tools commonly used in workers' comp, including MRIs, can be overly sensitive and lead to overtreatment.

Tools commonly used in workers' comp, including MRIs, can be overly sensitive and lead to overtreatment.

Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
Dr. MaryRose Reaston is the co-founder and CEO of Segen-Health.
She is an expert in diagnostic techniques for the evaluation and management of soft tissue injuries.
Frank J. Tomecek, MD, is a clinical associate professor of the Department of Neurosurgery for the University of Oklahoma College of Medicine-Tulsa. Dr. Tomecek is a graduate of DePauw University in chemistry and received his medical degree from Indiana University. His surgical internship and neurological spine residency were completed at Henry Ford Hospital.
The EEOC filed a suit that could end workplace programs and expose brokers and vendors to similar lawsuits.
Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
Al Lewis, widely credited with having invented disease management, is co-founder and CEO of Quizzify, the leading employee health literacy vendor. He was founding president of the Care Continuum Alliance and is president of the Disease Management Purchasing Consortium.
To plan, it is helpful to examine how other industries have either successfully navigated large changes and prospered, or have disappeared.

Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
John Paul Nettles is a consultant at GeauxPoint, a Baton Rouge, La.-based management consulting firm. John helps clients improve business performance. Typically, John’s clients experience 20% increases in efficiency, as well as other benefits. John’s professional background also includes journalism, technical writing and content marketing.
For one, DON’T use the terms “identity theft” and “data breach” interchangeably. Why? Because they aren’t interchangeable.
Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
Eva Velasquez is the President and CEO of The Identity Theft Resource Center. Velasquez has more than 500 hours of specialized training in the investigation of economic crimes and has been a presenter at numerous conferences across the state, including the PACT (Professionals Achieving Consumer Trust) Summit, the California District Attorney’s Association Consumer Protection Conference and the California Consumer Affairs Association annual conference.
Still, despite the recent ruling, the challenge to courts is to not sit in judgment over what is fundamentally a legislative decision.
Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
The surge will continue, creating advantages for well-capitalized players and raising challenges for smaller competitors.
Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
Stephen Applebaum, managing partner, Insurance Solutions Group, is a subject matter expert and thought leader providing consulting, advisory, research and strategic M&A services to participants across the entire North American property/casualty insurance ecosystem.
Families insure homes against fire, cars against collision, personal property against theft. Why not insure the equity in their homes?
Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
Leighton Hunley is a financial consultant in the Milwaukee office of Milliman. He joined the firm in 2002 and has held the position of consultant within Milliman’s credit risk practice since 2007. Leighton’s areas of expertise include mortgage guaranty insurance, student loans, home equity insurance and debt service analyses.
Much of the discussion on the Oklahoma Option is accurate but not complete. It is easy to absorb a part of the story.
Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
"Keyless" data integrity standards let insurers identify the cause of a breach and mitigate the risk of escalation -- in real time.
In the real world, it would be considered reasonable and appropriate to require an independent audit of digital assets to be insured. In cyberspace, this is more challenging. Insurers have to rely on the insured to tell the truth about what assets have been affected by a breach. Integrity standards for data enable insurance companies to conduct an independent audit of what digital assets exist (e.g., client data, intellectual property) prior to a breach, thus preventing fraudulent claims. One aspect of a data integrity standard is keyless signature infrastructure, known as KSI. KSI is a disruptive new technology standard that can effectively address some of the issues insurers face in the rapidly emerging cyber liability domain. It can enable mutual auditability of information systems to allow stakeholders to know the cause of a breach, mitigate the risk of breach escalation in real time and provide indemnification against subrogation and other legal claims. The concept of a digital signature for electronic data is very straightforward: a cryptographic algorithm is run on the data, generating a "fingerprint of the data"; a tag or keyless signature for the data that can then be used at a later date to make certain assertions, such as signing time, signing entity (identity) and data integrity. KSI offers the first Internet-scale digital signature system for electronic data using only hash-function-based cryptography. The main innovations are:
Other features include:
A “managed security service” resulting from the implementation of KSI marks a new era for insurers. As they seek organizational intelligence of digital assets to make real-time policy adjustments, they are also making concrete conclusions about the insured asset risks, threat, exposure and cyber landscapes affecting clients. Claims processing and disputes become simpler as the technology preserves the forensic traceability and historical provenance of the digital asset, enabling rapid determination of when and how a breach or manipulation occurred and who or what was involved. Hackers and malicious insiders cannot cover their tracks. Moreover, proving negligence is now possible. Negligent acts may be quickly detected and proven in the event the service provider does not comply with the contracts maintained in force with the enterprise. Most breaches today go unnoticed until long after they occur and the damage has been done. Active integrity involves continuous verification of the integrity of data in storage using keyless signatures. It is equivalent to having an alarm on your physical property and a motion detector on every asset that cannot be disabled by insiders. Because of the volatile nature of electronic data, any hacker knows how to delete or manipulate logs to cover his tracks and attribute his activity to an innocent party, which is why attribution of crimes on the internet is so difficult. Integrity is the gaping security hole. A loss of integrity is what leads to data breaches, introduced by malware, viruses or malicious insiders. Public key infrastructure (PKI) will never be the solution to integrity or usable for large-scale authentication of data at rest. The forensic evidence of keyless signatures makes legal indemnification issues easy to resolve, highlighting who, what, where and when a digital asset was touched, modified, created or transmitted. This places the onus on the “use” of data and not collection, providing auditability across service providers and the internet. Privacy is maintained, but there is also transparency and accountability for how data is used. Every action can be traced back to the original source that is legally responsible. This simplifies service-level agreements, pinpoints liability in the event of accidental or malicious compromise, and indemnifies independent data providers from legal claims. This article is an excerpt from an EY report titled "Cyber Insurance, Security and Data Integrity; Part 1: Insights into cyber security and risk -- 2014." For the full report, click here.
Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
Shaun Crawford leads Ernst & Young's $1.4 billion global insurance business. He has been in the financial services industry for 27 years, having worked both in consulting or line management with the majority of European life assurers and U.K. retail banks at some point.
Beware of "Free Wi-Fi." Cyber thugs set up sites known as "evil twins" that can steal your signal and leave you vulnerable.
Get Involved
Our authors are what set Insurance Thought Leadership apart.
|
Partner with us
We’d love to talk to you about how we can improve your marketing ROI.
|
Robert Siciliano is CEO of IDTheftSecurity.com. He is fiercely committed to informing, educating and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. Media outlets, executives in the C-Suite of leading corporations, meeting planners and community leaders turn to him to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace.