News & Commentary

05:25 PM
Kathy Burger
Kathy Burger
Connect Directly

The Risks and Rewards of Being an Insurance CIO

The role of CIO is a complex, demanding and often thankless job that can be simultaneously high profile and unappreciated.

Assessing and responding to new and changed regulation. Developing and attracting talent to the organization. Redefining customer service. Ensuring agent/distributor satisfaction. Until recently, these priorities were strictly the province of the CEO, marketing head or compliance chief. Today, however, these activities are among the most important responsibilities held by insurance industry chief information officers.

But unlike the CEO, the CMO or the other bigwigs in the C suite, the insurance CIO also has to lead core systems transformation efforts, enable thorough and reliable data security, assemble a flexible and cost-effective IT infrastructure, and efficiently manage a huge portfolio of applications, systems, vendors and partners, to name just a few items in the typical CIO job description. It's a complex, demanding and often thankless job that can be simultaneously high profile and unappreciated.

The executives represented on the roster of Insurance & Technology's 2011 Elite 8 honorees, however, embrace the role. Without playing down the challenges of performing in such a high-stakes environment, they are energized and motivated by these challenges. While recognizing that the role of the insurance IT organization (not to mention the CIO) is being redefined by changing sourcing models, technology consumerization, globalization of the workforce and new approaches to infrastructure, they also understand that technology has never been more important to the performance and success of insurance companies.

This year's Elite 8 executives will be honored at I&T's 13th Annual Executive Summit, taking place Nov. 6-9 at The Boulders Resort & Spa in Carefree, Ariz. The theme of the event, "The Leadership Challenge: Driving Growth and Optimizing Resources," is a concise description of the dilemma -- or opportunity -- that today's insurance technology executives must resolve if they (and their organizations) are to succeed.

To paraphrase the well-known advertising slogan, these are not your father's CIOs. As Harvey R. Koeppel, executive director of the Center for CIO Leadership, notes in his commentary on the changing role of the CIO, "The opportunities for CIOs to advance their role and increase their contributions by leveraging IT to create sustainable business value are bigger than ever before." The 2011 Elite 8 executives are capitalizing on these opportunities, creating business value for their companies at the same time they are reshaping the concept of technology leadership.

Katherine Burger is Editorial Director of Bank Systems & Technology and Insurance & Technology, members of UBM TechWeb's InformationWeek Financial Services. She assumed leadership of Bank Systems & Technology in 2003 and of Insurance & Technology in 1991. In addition to ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.