Corporate Insurance Companies Can Leverage their Cybersecurity

Written by Mike Boutwell

September 14, 2022

In this video, we will learn how corporate insurance companies can leverage their cybersecurity tools and big data to dominate their industry.

This case study would be useful for other industries where there are brokers and middlemen. If you’re working in a place with high-risk analysis, this guide is recommended for you as well.

A Specific Market Challenge

Based on the local policies, if you are going to 10 different countries, you need to register with 10 insurance policies. Generally, this is based on local laws.

So, clients might meet up with many brokers to get their tasks accomplished. If you could find a solution to this problem, there you stand high! You can get better insight into this matter based on what the brokers do, how they deal with clients, and how they bid the contracts. Based on this analysis, you can create an opportunity in the market.

Risk Management is Outdated

The current risk management formula is outdated. It has the following four concepts in it:

  • Globalization
  • Complexity
  • Supply chain
  • Economy

Globalization allows connecting with many people around the world. The connection between many people impacts the supply chain of the system. You need to apply complex and effective decision-making to retain in the industry. The complexity theory is about exploring the network connections in-depth. If there are tight connections in globalization, it consists of higher risks. These factors affect the economy positively and negatively as well.

Recent Attack

This is about a recent attack at Cisco. An employee’s credentials were stolen and Yanluowang threat attackers gained access. So, the employee’s credentials were compromised through voice phishing attacks.

This is fishy as the employee’s credentials gave access to the corporate resources.

Do what the hackers do

In the above case, the attackers gained access based on Open Source Intelligence. The attackers figured out the destination the employee works based on social media updates. This creates awareness for websites whether they should expose the place they work on social media or apps like LinkedIn.

Moreover, looking on the positive side, organizations can use these tools to expand their business by analyzing social media trends and tactics. They can also figure out new insights into the market and also protect their business.

Identify, Think, and Execute™

There are three main concepts in Identify, Think, and Execute™ as follows:

  • OSINT(Open Source Intelligence): Use open source intelligence to gain an understanding of the relationships businesses have with each other
  • Data: Leverage existing business data & new OSINT data to gain insights into which brokers and 3rd parties are carrying out deals
  • Action: Use the data to adjust sales, deal closure, or other relevant business development use cases

You can OSINT to gain insight into various data and take actions based on the opportunities and threats. OSINT can mention third-party risks, supply chain risks, or even hackers who are researching your business partner or checking out whether your competitor is maintaining relationships with your clients, and many more!


“There are downsides to everything; there are unintended consequences to everything.”

By Steve Jobs

We can understand that the risks are unknowable. But, we can use OSINT to gain data and give insights. This would help to find out risks more appropriately.

We can use these tools to access our risks and competitors as well. OSINT can map the relationship to your data to assess the insurance activities as well. You can analyze the data feeds and assess the risks with better insights.

Get the full presentation here

You May Also Like…

Profiting from Cyber Security

Profiting from Cyber Security

Profiting from cyber security concepts is a dominating concept in the industry. In this video, we will discuss the way...

Cyber Security and Data Ethics

Cyber Security and Data Ethics

The following are the key examples of Unethical Behaviours in Cyber Security, Abuse of Power Intent Loyalties...