Category Archives: Risk Culture

Insights from the Willis Re Flood Club: the weaknesses and strengths of flood modelling

cars in flooded parking lot

When industry experts gathered to consider the state of flood modelling, they discovered a disconnect between theory and reality that can leave insurers under some expensive water. So what’s next for modelling approaches? Insurers are worried about their flood exposure. … Continue reading →

Should banks require commercial lending customers to have cyberinsurance?

man sitting at a desk in an office looking at a laptop

In light of increasingly prevalent and highly publicized data breaches, the Federal Financial Institutions Examination Council (FFIEC) recommends that banks require commercial lending customers have cyberinsurance to supplement existing risk management programs. The FFIEC’s statement isn’t a regulatory expectation, but … Continue reading →

8 reasons why energy companies should have an Enterprise Risk Management framework

Worker in a yellow vest walking between solar panels lined in a field

Establishing a resilient Enterprise Risk Management (ERM) framework can be a challenging process that requires a clear action plan with specific improvement points and defined timelines. And it’s for those reasons, along with lack of resources and determination that some … Continue reading →

5 questions hospital board members should ask about enterprise risk management

Female doctor sitting with a man in a suit holding a laptop and a man in a suit and tie

Risk management in health care can vary greatly across different organizations. Yet the focus on managing risk should be an integral part of all boards of directors’ ongoing discussions. So what should the directors and their senior executives be thinking … Continue reading →

Recent nation state cyberattacks: What they mean, and how to respond

man talking on a phone and looking at a tablet

On April 17, 2018, the U.K. and U.S. governments issued an unprecedented statement calling out Russia as the originator of cyberattacks on businesses and public sector organizations during 2017. According to the statement, routers — the devices that direct traffic … Continue reading →

The risks and challenges of silent cyberinsurance

close up of a man looking at a computer screen

You hear a lot about cyberinsurance these days and the need for it, and judging by how busy my cyber colleagues are, there’s no sign of an end to demand any time soon. Less is heard though about the so-called … Continue reading →

Unbundling insurance components under IFRS 17: when is a contract not a contract?

close up of a person signing a set of documents

With the countdown to the implementation of the new global insurance accounting standard – IFRS 17 – well and truly on, insurers are (or should be) trying to understand what changes they’ll need to make to comply. In getting into … Continue reading →

An insurer’s ‘duty to speak’

a man and a woman in suits talking at a table with papers in front of them

Does an insurer have a duty to tell you that unless you take certain steps, you will lose rights under a policy of insurance? Depending on the facts, the answer may be yes. In the first Ted Baker Plc. and … Continue reading →

The insurance industry’s InsurTech autoimmune disorder

man sitting in front of a laptop with a pensive look

The warning signs and five steps to avoid the condition In my experience, large, highly successful companies tend to do three basic things extremely well: They protect the core business, manage risk and avoid big mistakes. Over time, these capabilities … Continue reading →

Cyber risk mitigation: Best practices for Mutual Fund Directors

man with a dress shirt and tie talking on his cell phone looking at a tablet outside

Cybersecurity continues to be one of the top risk management issues facing mutual fund boards today, with continued scrutiny coming from regulators and investors alike. Potentially facing financial loss and reputational harm from growing threats, stakeholders are taking an even … Continue reading →