02:43 PM
Connect Directly

What Insurers Need to Know Before Adopting Agile Development

Adopting the Agile methodology for software development can be a challenge for insurance IT organizations, but the benefits of Agile Development outweigh the risks.
1 of 3

Agile software development – a group of simple, iterative, incremental processes that strongly encourage both collaboration and creativity – allows for more adaptability, increased flexibility and more participation from end users on the business side. By employing agile methods in their software development processes, insurance companies can gain a considerable competitive advantage and reap a variety of benefits. What should insurance companies know if they are looking to adopt agile development? What are the benefits of agile development? What are the success factors, and what are the risks?

To Achieve Agile Development Success, Agree on the Approach and Methodology

By Mike Anselmo, CIO, Narragansett Bay Insurance Company (Pawtucket, R.I.)

Agile development has the potential of delivering a much better end product, and it requires much more interaction with the business. Agile also enables IT to develop multiple iterations of a prototype for long-term projects with more visibility as the project evolves, as well as more ability to introduce changes as you move along. But if an insurer is changing from a waterfall methodology to an Agile methodology, it must have a strong execution plan in place with senior management support or it will be very easy for the insurer to revert back quickly to a waterfall methodology.

A major benefit of Agile Development is that insurers get a better product and better agreement at the end of the project than otherwise would have been the case. A downside of Agile is that projects sometimes can take longer than expected because you could allow scope changes during the project rather than agreeing on requirements at the very beginning, so there’s some risk involved here as well.

The benefits do outweigh the risks. For Agile Development to be successful, everyone involved must comprehend and agree on the approach. Everyone must be on the same page, and they must be sufficiently trained in Agile methodology. If not, employing Agile methods in the software development process can be very challenging.

Peggy Bresnick Kendler has been a writer for 30 years. She has worked as an editor, publicist and school district technology coordinator. During the past decade, Bresnick Kendler has worked for UBM TechWeb on special financialservices technology-centered ... View Full Bio

1 of 3
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.