News & Commentary

12:05 PM
Nathan Golia
Nathan Golia
Connect Directly

7 Opinions on Big Data: Defining It, Using It, Storing It and More

At the recent insurance industry trade shows, "big data" was the talk of the floor. Here are some thoughts from the community on challenges and applications of it.

As Insurance & Technology collected preview quotes from insurance industry players before the recent ACORD/LOMA and IASA trade shows, much of the anticipation was around "big data." The broad, vague term means different things to different people, though, and like many buzzwords suffers a bit from overexposure. But most people see the potential of advanced data and analytics to make insurance operations more efficient and effective. So here are some of the insights I've heard over the past few weeks, at trade shows, in other interviews, or in webcasts and published reports — from all types of industry players, on some of the big topics in big data.

By adding video and pictures, it makes what used to be big data into gigantic data. How do you make it structured enough to find that needle in the haystack?

Peter Marotta, enterprise data administrator, Verisk Analytics

It's estimated that there's a 66% probability that at least one of the cars involved in an accident with a lawsuit involved has an event data recorder. We have the ability to import the data from that into a claim file. It would turn every adjuster into a sort of CSI investigator.

Greg Horn, VP of Industry Relations for Mitchell International

The property space is troubled primarily due to weather, but there are a lot of things underlying the weather issue that make it difficult to write. Is it underinsured — a lot of times homeowners do upgrades on their home, extensions or models or second stories, and they don't always call their insurance carrier. Are there signs of neglect? We take a tremendous amount of data to build a predictive model of what is happening at the home.

Dax Craig, CEO, Valen Technologies

There's something here in this new economy of taking data and monetizing it. There's a convergence between our physical locations and context — like people going somewhere and checking in, or scanning products in a stores. It offers an opportunity to talk to them right there while it's relevant. How do we use this rich data and go thru this hierarchy of customers buying?

Mike Slattery, VP, Telematics at AAA

Relatively few insurers capture, persist, and analyze Big Data within their computing environment today, but those that do typically leverage traditional computing, storage, database and analytics. Very few insurers have invested in specialized Big Data infrastructure, but a significant minority (15-30%) is planning to do so within the next 12 months.

Novarica, Analytics and Big Data at Insurers: Current State and Expectations report

Sometimes it's not 'is it more data,' it's 'is it the right data.' When you develop a model, you're going to find 15 to 20 things, capture what you need to get and not be so data intensive after that.

Gary Ciardiello, principal, Ernst & Young

Big data has a central role to play in developing brand resilience at a time when social media has emerged as a major brand battleground. Insurers can harness big data to sense negative disruptions in social networks and respond accordingly..

Deloitte, Insurance Tech Trends 2012: Elevate IT for digital business report

Nathan Golia is senior editor of Insurance & Technology. He joined the publication in 2010 as associate editor and covers all aspects of the nexus between insurance and information technology, including mobility, distribution, core systems, customer interaction, and risk ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Janice, I think I've got a message from the code father!
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.