Application Security from the Inside Out: Part 2

Application Security from the Inside Out: Part 2

In my previous post, I addressed four coding policies that almost guarantee a data breach. This post will cover five solution strategies to shore up your application’s security. The guiding principle to correct these flawed policies (see Part 1) is to change the priorities that direct development and support of software applications.…

Read More
Application Security from the Inside Out: Part 1

Application Security from the Inside Out: Part 1

The recent data breach at Equifax is an unfortunate reminder of a long list of hacked sites (Target Stores, OPM, Sony, and others) that were caused by vulnerabilities in the application code. These companies seemed just as surprised as their customers by the attack and had to wonder, “how did this happen?” They did not need to look further than their own unintentional coding policies.…

Read More
Top 6 Ways to Combat Change Fatigue

Top 6 Ways to Combat Change Fatigue

When I read Bill’s blog “Where’s the Snooze Button on Change?” I was inspired to write my own perspective on managing change. And then I hit my own snooze button a few times in the last few months due to some competing priorities. Change fatigue is real – and something I observe often at clients.…

Read More
More Data, More Problems… Leveraging the Azure Import/Export Tool

More Data, More Problems… Leveraging the Azure Import/Export Tool

In today’s market businesses are likely familiar with the enterprise services provided in Azure and have already started planning a cloud transition.  As Azure expands its core offering and more business transition to a cloud platform, the question becomes, “how does an organization move large amounts of data to the cloud, specifically to Azure?”  Introducing the Microsoft Azure Import/Export...

Read More
Why Can’t I Get People to Think Differently?

Why Can’t I Get People to Think Differently?

We have all heard the old adage from Albert Einstein: “the definition of insanity is doing the same thing over and over again and expecting different results.”  But have you ever thought about how this applies to driving transformational change within your organization?  One perfect example is customer experience transformation, which may involve claims or policy servicing. …

Read More
You want who to do what?

You want who to do what?

From our past experiences, we have witnessed insurance companies tackle tough problems from their “siloed” perspective.  They may have the best intentions, but forget to consider others in the value chain or even within their own company.  In other cases, they have only looked at an issue from one lens – the process perspective or the role perspective. …

Read More
Are we there yet?

Are we there yet?

How many of you have heard this from your kids during a road trip?  We all have, even during short trips across town to the movie theater or to run an errand!   A more serious question is, how many of you have heard this from your project team regarding a major initiative such as a claims transformation or a CRM implementation? …

Read More

Plugging the Premium Leak: Small Adjustments to Create Profit

Claims fraud has been a major focus for insurers seeking to maximize profits. This task requires significant investment in analytics and in review personnel. Another source, often overlooked, lives at the other end of the insurance lifecycle – premium leakage. Carriers may be able to realize similarly large benefits by reducing premium errors through a few simple adjustments designed to...

Read More

Do Your Customers Know You’re a Know-It-All?

Picture yourself in the office on a Wednesday; it’s sunny, 78 degrees outside, and you are talking with your customer, Kaitlyn, whom you haven’t spoken to in roughly six months. Kaitlyn called to request adding her son, Peter, and his new Honda Accord to her auto insurance policy. You are able to retrieve her profile in your policy admin system (PAS) to find just enough information to answer...

Read More

Role of Identity Management – Removing the Friction

With what seems like a daily stream of news related to data breaches these days, why is identity and access management (IAM) still: Not moved to the top of every CIO/CTO roadmap Only talked about as just the management of an identity and not also the governance of that identity Not a standard swim lane with every project that requires any type of authentication to any service (on-premises or...

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons