Transformative Technologies Perspectives
-
Video 网络security best practices every business should follow 网络attacks are becoming more frequent and dangerous, as such cybersecurity needs to be front of mind for company executives. -
杂志 2023 Marsh McLennan Semi-annual 网络 Hanbook: 1st Installment The Marsh McLennan 网络 Handbook features perspectives from business leaders across Marsh McLennan who represent some of our best thinking about cyber risk. -
Article Captive Insurers Provide Alternative for 网络 Risk Financing The ongoing changes in technology and digitization combined with the ability of cyber bad actors to keep pace means that cyber risk can be expected to be volatile for the foreseeable future. Using a captive insurer or cell as part of your cyber risk finance strategy can help set a steady course no matter the commercial market conditions. -
Article 3 Risk Priorities for Tech Companies Today’s economic landscape is forcing many tech companies to reset their priorities. 当他们这样做的时候, they should focus on embedding strong risk management actions that help them remain competitive and allow them to focus on growth. -
Article 网络security is an Organization-wide Responsibility While technical IT teams have a crucial role in the development and design of robust and secure corporate networks, responsibility for cybersecurity must expand to include senior executives across the entire organisation. That means embedding security protocols into every function — from procurement to finance to sales — to ensure there is a company-wide “playbook” for responding to breaches. -
网络直播 Addressing Catastrophic 网络 Risk 在讨论中, Marsh set out to offer transparency into the drivers behind carrier strategies over catastrophic cyber risk. The webcast explores how these carriers currently view catastrophic cyber risk, 他们正在采取的行动, and how their strategies may impact your organization. Watch the replay for a better understanding of how and why markets are responding to catastrophic cyber risk – and what that means to you. -
报告 Preparing for the New 数字 Operational Resilience Rules While DORA is still an evolving standard, the direction of travel from the regulator is clear and requires a fundamental mindset shift across institutions. -
Article Increase confidence in cyber mitigations by managing digitization risks While 76% of respondents feel their organization is addressing cybersecurity risk, only 44% report having effective policies, controls and support systems -
播客 Risk in Context 播客: Managing Evolving 网络security Risks Experts discuss findings and best practices from The State of 网络 Resilience report — a collaboration between Marsh and Microsoft. -
Article Beyond play: As the metaverse evolves, beware of new risks The current lack of regulatory clarity leads to significant questions about liabilities in the metaverse. -
Video Guy Carpenter's Erica Davis Discusses Changes in 网络 Landscape Erica Davis describes significant progress in cybersecurity protocols while emphasizing how businesses still need to remain vigilant and resilient -
报告 Using data to prioritize cybersecurity investments Evaluate the effectiveness of cybersecurity controls and prioritize cyber investments with analytic research. -
Article Section 230 and How the Supreme Court Could Upend the Internet are not liable for the material that’s provided by their users -
报告 Shifting gears: How talent demand is transforming the automotive industry The automotive industry is experiencing a profound shift. Talent is in the driver’s seat, and automotive manufacturers and suppliers need new skills for future success. -
Article The Chief People Officer’s Quick Guide to Generative Artificial Intelligence (AI) This article explore show HR leaders can deploy AI and AI tools in the short, mid and long term. -
Article Regulation and the insurability of digital assets As the digital asset ecosystem develops, it is imperative it is able to transfer risk efficiently to allow for further innovation and growth.