Innovations in Infrastructure
Workforce for the Future
Retail / Consumer Products
Transformative Technologies Perspectives
网络security best practices every business should follow
网络attacks are becoming more frequent and dangerous, as such cybersecurity needs to be front of mind for company executives.
2023 Marsh McLennan Semi-annual 网络 Hanbook: 1st Installment
The Marsh McLennan 网络 Handbook features perspectives from business leaders across Marsh McLennan who represent some of our best thinking about cyber risk.
Captive Insurers Provide Alternative for 网络 Risk Financing
The ongoing changes in technology and digitization combined with the ability of cyber bad actors to keep pace means that cyber risk can be expected to be volatile for the foreseeable future. Using a captive insurer or cell as part of your cyber risk finance strategy can help set a steady course no matter the commercial market conditions.
3 Risk Priorities for Tech Companies
Today’s economic landscape is forcing many tech companies to reset their priorities. 当他们这样做的时候, they should focus on embedding strong risk management actions that help them remain competitive and allow them to focus on growth.
网络security is an Organization-wide Responsibility
While technical IT teams have a crucial role in the development and design of robust and secure corporate networks, responsibility for cybersecurity must expand to include senior executives across the entire organisation. That means embedding security protocols into every function — from procurement to finance to sales — to ensure there is a company-wide “playbook” for responding to breaches.
Addressing Catastrophic 网络 Risk
在讨论中, Marsh set out to offer transparency into the drivers behind carrier strategies over catastrophic cyber risk. The webcast explores how these carriers currently view catastrophic cyber risk, 他们正在采取的行动, and how their strategies may impact your organization. Watch the replay for a better understanding of how and why markets are responding to catastrophic cyber risk – and what that means to you.
Preparing for the New 数字 Operational Resilience Rules
While DORA is still an evolving standard, the direction of travel from the regulator is clear and requires a fundamental mindset shift across institutions.
Increase confidence in cyber mitigations by managing digitization risks
While 76% of respondents feel their organization is addressing cybersecurity risk, only 44% report having effective policies, controls and support systems
Risk in Context 播客: Managing Evolving 网络security Risks
Experts discuss findings and best practices from The State of 网络 Resilience report — a collaboration between Marsh and Microsoft.
Beyond play: As the metaverse evolves, beware of new risks
The current lack of regulatory clarity leads to significant questions about liabilities in the metaverse.
Guy Carpenter's Erica Davis Discusses Changes in 网络 Landscape
Erica Davis describes significant progress in cybersecurity protocols while emphasizing how businesses still need to remain vigilant and resilient
Using data to prioritize cybersecurity investments
Evaluate the effectiveness of cybersecurity controls and prioritize cyber investments with analytic research.
Section 230 and How the Supreme Court Could Upend the Internet
are not liable for the material that’s provided by their users
Shifting gears: How talent demand is transforming the automotive industry
The automotive industry is experiencing a profound shift. Talent is in the driver’s seat, and automotive manufacturers and suppliers need new skills for future success.
The Chief People Officer’s Quick Guide to Generative Artificial Intelligence (AI)
This article explore show HR leaders can deploy AI and AI tools in the short, mid and long term.
Regulation and the insurability of digital assets
As the digital asset ecosystem develops, it is imperative it is able to transfer risk efficiently to allow for further innovation and growth.