05:13 PM
Connect Directly

Where Do Insurers Find Innovative Ideas?

Insurer ACORD LOMA attendees agree on the best place to find dynamic, innovative ideas within the insurance organization.

Innovation is a watchword in insurance, as the industry seeks to shake off a stodgy image and be viewed as more dynamic from a technology standpoint. At ACORD LOMA, Chubb Group chief innovation officer Jon Bidwell said in a presentation that years of working to facilitate innovation has revealed a particularly important truth:

"There were people who were very close to the customer, producer, transaction, product -- tip of the spear type of people -- who figured out what needed to be done and what needed to be new," Bidwell says.

Chubb uses an enterprise social platform from Jive to help organize and give feedback on innovative ideas. The analytics applied to ideas submitted reveal that some people are "idea machines," Bidwell says -- but it's the "long tail" of "onesy-twosies" that represent the most successful and effective innovations.

"If you don't construct the systems to connect the dots, it's hard to build an organization that's continuously innovating," Bidwell says. "The development of social tools for innovation has come to some maturity in the past three to four years."

[Chubb's 4 'P's of innovation]

Progressive agent experience manager Jim DeVito is leading the charge for password standardization and single sign-on for independent agents -- but that's not the only place he sees value in that technology. Innovative insurers can find lots of value in streamlining log-ons, he says.

"Before I got involved in ID Federation, I did some internal research to find out where [Progressive's] IT standard levels would be and I was pleased to find out that other parts of the enterprise were looking at federated ID," he says. "We're working on adopting similar technology internally [at Progressive] and will test it in a low-risk application soon."

Progressive also uses social tools, including Microsoft Sharepoint, to disseminate innovative ideas in what it calls "Edison projects," DeVito says. He agrees with Bidwell that it's the people who are closest to the customer -- for example, the company's 35,000-strong stable of independent agents -- who often come up with the best ideas.

"The people closest to the work see solutions, but sometimes they don't know whether they're empowered to propose it -- so you have to not just the environment, but also the framework for strategic change," DeVito says. "There's technological ways of doing it, then there's just going out and visiting folks and talking to them."

Nathan Golia is senior editor of Insurance & Technology. He joined the publication in 2010 as associate editor and covers all aspects of the nexus between insurance and information technology, including mobility, distribution, core systems, customer interaction, and risk ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.