"Alice asked the Cheshire Cat, who was sitting in a tree, “What road do I take?” The cat asked, “Where do you want to go?” “I don't know,” Alice answered. “Then,” said the cat, “it really doesn't matter, does it?" Alice's Adventures in Wonderland, Lewis Carroll November 1865 The insurance industry is being quickly surrounded… Continue reading Total Insurable Space of Profitable Underwriting Shrinking??? (Thought Piece)
Category: Cyber Age
Potential Categories of a Cyber Attack Space Topography
The concept of topography, specifically related to cyber attack spaces, has been rattling in my head for the past few months. What are the shapes of current cyber attack spaces? What are the shapes of future cyber attack spaces? What might a person include as categories (and elements of the categories) of cyber attack spaces… Continue reading Potential Categories of a Cyber Attack Space Topography
The Cyber Age: a Few Thoughts
One thought : when did the Cyber Age start? It's not just a nice-to-know question. Regardless of when it began, the Cyber Age is enabled by a foundation of five technologies (digitization, mobility, cloud, web, and AI) and their concomitant applications that dramatically changed how society interacts within itself, including conducting (or consuming, if you… Continue reading The Cyber Age: a Few Thoughts
Past Experience Insuring Risks Won’t Help Insure Risks Of Our Emerging Cyber-Forming World
My wife is from Kansas City, Missouri. Some of you (most of you?) might know that Missouri is the "Show Me" State (they have to see something to believe it). Throughout almost the entirety of my insurance career after I left working for marketing departments in a few insurers (across all major lines of business… Continue reading Past Experience Insuring Risks Won’t Help Insure Risks Of Our Emerging Cyber-Forming World
A Proposed Enterprise Cyber Risk Profile Framework [First Cut]
Does your enterprise have a cyber risk profile? Is it continually updated? Is is 'a real-time profile?" (Does your enterprise know what a cyber risk profile is or why it might be necessary?) If yes to any of those questions, do you believe your enterprise cyber risk profile encompasses every, or at least most, of… Continue reading A Proposed Enterprise Cyber Risk Profile Framework [First Cut]
Cyber Predictions: You Don’t Know…
I believe that there are many unknowns in the Cyber Age. You can flash back to the 2X2 of "known-knowns", "known-unknowns", "unknown-knowns" and "unknown-unknowns" but I want to keep it somewhat straightforward. That's why I show the illustrative visualization below. It's my attempt of showing a relatively straight-forward visualization, a 2-dimensional visualization at that, of… Continue reading Cyber Predictions: You Don’t Know…
Cyber Attack Space Elements (Selective)
This blog post is just a "thinking out loud and writing it down" blog post about cyber attack space(s). Here are some of the elements of the cyber attack space: Enterprise IT-created / enabled business / system processes (or certain activities of those processes) are connected to the web; Mobile devices become "smart" and, as… Continue reading Cyber Attack Space Elements (Selective)
Risk Landscapes: Traditional & Cyber-Focused
During my insurance industry years (industry itself, management consulting, insurance industry analyst), there were illustrations of the risk landscape of risk events to consumers and/or enterprises at that point-in-time. Often, the risk landscape included attempts at frequency and severity of each risk. "Traditional" Risk Landscape For me, the 'traditional' risk landscapes encompasses risks, some of… Continue reading Risk Landscapes: Traditional & Cyber-Focused
The Luxury of Being Cyber Secure Does Not Exist (Now or Ever) in the Digital World of Commerce
Someone on LinkedIn said that enterprises can become more cyber secure if they identify, choose, and ensure the firms they choose to conduct commerce have “value” and are cyber secure. (That statement triggered this blog post.) However, even systems we believe have value will themselves connect to other systems (which we may or may not… Continue reading The Luxury of Being Cyber Secure Does Not Exist (Now or Ever) in the Digital World of Commerce
The Skeptical Analyst: Let’s Talk Cyber !
I published the February edition of my Podcast "The Skeptical Analyst: Let's Talk Cyber !" yesterday. It's available on Apple Podcasts, Spotify podcasts, Amazon Music, Overcast, Castro, Castbox, Podfriend, Goodpods, and other podcast platforms. I discuss four cyber issues in this 17 minute podcast: Our Cyber-Forming World Traditional Risks vs Cyber Risks Cyber Attack Spaces Cyber… Continue reading The Skeptical Analyst: Let’s Talk Cyber !



