Unique Approach to Mitigate External Threats

By Curt Overpeck, CIO, Citizens

Curt Overpeck, CIO, Citizens

Using Technology to Mitigate Risk Management Costs

With respect to IT risk management, technology can cost-effectively eliminate or mitigate external threats originating from email or web-based sources. Examples would be identification and elimination of malware intended to destroy or steal data assets or to extort (ransomware). We use software to scan incoming email and validate web addresses (URLs) as “safe.”

Technology can also be used to identify vulnerabilities in our network infrastructure, thus supporting elimination/mitigation efforts. Examples are scanning all physical network computing hardware asset to report known vulnerabilities.

Artificial Intelligence—The Key to Cost Reduction

Artificial intelligence (algorithms) are leading to cost reduction and improved accuracy/consistency in underwriting, claims management and fraud detection. I’m also excited about the development and innovations relating to the “Internet of Things.” I’m referring to smart devices of various types that monitor, respond, or report on situations or conditions. Some examples I’m seeing are water-leak detection in homes and auto reporting to insurance companies.

Emergence of Connectedness through Mobile Devices

Mobile devices have provided us with immediate access to information anywhere. Whether that is for business needs, personal needs, or entertainment, smart, mobile devices provide immediate access regardless of where we happen to be at any given moment. Such access has led to a ‘connectedness’ through social networking as mobile devices allow real-time access to friends and family regardless of where you are.

"Technology can also be used to identify vulnerabilities in our network Infrastructure, thus supporting elimination/ mitigation efforts"

Another aspect of technology in daily life is that information resources are immediately accessible. Want to find a restaurant or gas station close to where you happen to be? That information is instantly available. There is an incredible and expanding wealth of readily available information for training/ development and inquiry.

Unique Skills for Effective Technology Leadership

Communication, collaboration and people management skills will always be the foundation of effective technology leadership. Another critical component is the ability to deeply understand the business needs of the organization and evaluate opportunities afforded by technology.

Evolution of Operating Model

I would say the operating model now calls for a more team-based approach and more collaboration, both within IT and across business units. A perfect example of this is the increased use of agile methodologies over more traditional sequential development. There is also an increased emphasis on effective staff recruiting and retention. We are focusing more and more on employee engagement and individual development plans.

Overcoming Enterprises Challenges

Genuine collaboration across business units and across the enterprise as a whole is a challenge.

Another is maintaining enterprise focus and alignment on critical goals and objectives. Another challenge is to maintain the ability to evaluate enterprise-beneficial opportunities in an incredibly fast-changing technology environment.

A high performance organization must also have the right personnel to meet its goals. Hiring, developing, and retaining persons with skills, aptitudes, and personal orientation that support a high performance organization is critical.

Deliverables with Time-bound Agile Sprints

We do; we set deliverables with time-bound Agile sprints. We are implementing agile delivery methodologies at the product level. We use scrum and Kanban. Within IT, DevOps initiatives are being used for faster build-deployment of systems. We are just starting to use enterprise-level agile methodologies across all teams.

Check out: Top Wealth Management Solution Companies

Weekly Brief

Top 10 Security Systems Tech Companies - 2017

Read Also

It's all about Scalability, Adaptability, and Flexibility

It's all about Scalability, Adaptability, and Flexibility

Kevin Guenthner, CIO & Chief Strategy Officer, First Interstate Bank
The Ostrich Effect with Standardized Authentication

The Ostrich Effect with Standardized Authentication

Nimesh Mehta, SVP and CIO, National Life Group
Radical Candor: The Key Going Forward for Insurtech

Radical Candor: The Key Going Forward for Insurtech

Sam White, Founder and CEO, Freedom Brokers, Action 365 and Pukka Insure
Higginbotham- Staying Ahead of the Race

Higginbotham- Staying Ahead of the Race

BJ Meyer, CIO, Higginbotham
Transforming Insurance in the AI landscape

Transforming Insurance in the AI landscape

Vineet Bansal, CIO/CISO, iptiQ SwissRe