{"id":24257,"date":"2024-05-04T20:38:14","date_gmt":"2024-05-04T20:38:14","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/the-significance-of-effective-incident-response-training-for-insurtech-companies\/"},"modified":"2024-05-04T20:38:14","modified_gmt":"2024-05-04T20:38:14","slug":"the-significance-of-effective-incident-response-training-for-insurtech-companies","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/the-significance-of-effective-incident-response-training-for-insurtech-companies\/","title":{"rendered":"The Significance of Effective Incident Response Training for Insurtech Companies"},"content":{"rendered":"<p>This assignment is my capstone report for my master&#8217;s degree in cybersecurity policy and risk management. The research question is &#8221;<\/p>\n<p><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">How<br \/>\ncan InsurTech companies <a style=\"cursor: auto;\">better develop and implement <\/a><\/span><span style=\"font-size: 11pt; cursor: auto; color: inherit;\">training programs to equip insurance<br \/>\nprofessionals with the necessary skills and knowledge for incident response in<br \/>\nthe face of evolving cyber threats, leveraging industry best practices?&#8221; I have included a few drafts of my report, as well as an outline and short report.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<\/span><span style=\"color: inherit; background-color: var(--color-6); font-variant-ligatures: inherit; font-variant-caps: inherit; font-family: Poppins, -apple-system, BlinkMacSystemFont, &quot;Segoe UI&quot;, Roboto, &quot;Helvetica Neue&quot;, Arial, &quot;Noto Sans&quot;, sans-serif, &quot;Apple Color Emoji&quot;, &quot;Segoe UI Emoji&quot;, &quot;Segoe UI Symbol&quot;, &quot;Noto Color Emoji&quot;;\">References:<\/span><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"1\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Arce et al., 2024)&quot;,&quot;citation&quot;:&quot;Arce, D., Woods, D. W., &amp; B\u00f6hme, R. (2024). Economics of incident response panels in cyber insurance. Computers &amp; Security.&quot;,&quot;link&quot;:&quot;https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404824000439&quot;,&quot;id&quot;:&quot;SR4tabEtIdcJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;HTML&quot;,&quot;linkTitle&quot;:&quot;sciencedirect.com&quot;}\"><span style=\"cursor: auto; color: inherit;\">Arce, D., Woods, D. W., &amp; B\u00f6hme, R. (2024). Economics of incident response panels in cyber insurance. Computers &amp; Security. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">sciencedirect.com<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"2\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Woods et al.2023)&quot;,&quot;citation&quot;:&quot;Woods, D. W., B\u00f6hme, R., Wolff, J., &amp; Schwarcz, D. (2023). Lessons lost: Incident response in the age of cyber insurance and breach attorneys. In 32nd USENIX Security Symposium (USENIX Security 23) (pp. 2259-2273).&quot;,&quot;link&quot;:&quot;https:\/\/www.usenix.org\/system\/files\/usenixsecurity23-woods.pdf&quot;,&quot;id&quot;:&quot;71Q0v3vNpVAJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;PDF&quot;,&quot;linkTitle&quot;:&quot;usenix.org&quot;}\"><span style=\"cursor: auto; color: inherit;\">Woods, D. W., B\u00f6hme, R., Wolff, J., &amp; Schwarcz, D. (2023). Lessons lost: Incident response in the age of cyber insurance and breach attorneys. In 32nd USENIX Security Symposium (USENIX Security 23) (pp. 2259-2273). <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">usenix.org<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"3\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Woods and B\u00f6hme2021)&quot;,&quot;citation&quot;:&quot;Woods, D. W., &amp; B\u00f6hme, R. (2021, June). How cyber insurance shapes incident response: A mixed methods study. In Workshop on the Economics of Information Security.&quot;,&quot;link&quot;:&quot;https:\/\/www.research.ed.ac.uk\/files\/257573307\/How_Cyber_Insurance_WOODS_DOA27052021_VOR.pdf&quot;,&quot;id&quot;:&quot;i18c6eWB7w4J&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;PDF&quot;,&quot;linkTitle&quot;:&quot;ed.ac.uk&quot;}\"><span style=\"cursor: auto; color: inherit;\">Woods, D. W., &amp; B\u00f6hme, R. (2021, June). How cyber insurance shapes incident response: A mixed methods study. In Workshop on the Economics of Information Security. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">ed.ac.uk<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"4\" data-citation=\"{&quot;inTextLink&quot;:&quot;(He et al., 2024)&quot;,&quot;citation&quot;:&quot;He, R., Jin, Z., &amp; Li, J. S. H. (2024). Modeling and management of cyber risk: a cross-disciplinary review. Annals of Actuarial Science.&quot;,&quot;link&quot;:&quot;https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/44CD3618A91A5B3DD710C203C751FC53\/S1748499523000258a.pdf\/modeling_and_management_of_cyber_risk_a_crossdisciplinary_review.pdf&quot;,&quot;id&quot;:&quot;IuRO2EhPDH0J&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;PDF&quot;,&quot;linkTitle&quot;:&quot;cambridge.org&quot;}\"><span style=\"cursor: auto; color: inherit;\">He, R., Jin, Z., &amp; Li, J. S. H. (2024). Modeling and management of cyber risk: a cross-disciplinary review. Annals of Actuarial Science. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">cambridge.org<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"5\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Chatzara, 2020)&quot;,&quot;citation&quot;:&quot;Chatzara, V. (2020). FinTech, InsurTech, and the regulators. InsurTech: a legal and regulatory view.&quot;,&quot;link&quot;:&quot;https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-27386-6_1&quot;,&quot;id&quot;:&quot;eGYMNmj3ZjsJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;HTML&quot;,&quot;linkTitle&quot;:&quot;springer.com&quot;}\"><span style=\"cursor: auto; color: inherit;\">Chatzara, V. (2020). FinTech, InsurTech, and the regulators. InsurTech: a legal and regulatory view. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">springer.com<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"6\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Sosa &amp; Montes, 2022)&quot;,&quot;citation&quot;:&quot;Sosa, I. &amp; Montes, \u00d3 (2022). Understanding the InsurTech dynamics in the transformation of the insurance sector. Risk Management and Insurance Review.&quot;,&quot;link&quot;:&quot;https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1111\/rmir.12203&quot;,&quot;id&quot;:&quot;ERrheao66mkJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;HTML&quot;,&quot;linkTitle&quot;:null}\"><span style=\"cursor: auto; color: inherit;\">Sosa, I. &amp; Montes, \u00d3 (2022). Understanding the InsurTech dynamics in the transformation of the insurance sector. Risk Management and Insurance Review. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">[HTML]<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"7\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Xu &amp; Zweifel, 2020)&quot;,&quot;citation&quot;:&quot;Xu, X. &amp; Zweifel, P. (2020). A framework for the evaluation of InsurTech. Risk Management and Insurance Review.&quot;,&quot;link&quot;:&quot;https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1111\/rmir.12161&quot;,&quot;id&quot;:&quot;NveYJsez3GEJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;HTML&quot;,&quot;linkTitle&quot;:null}\"><span style=\"cursor: auto; color: inherit;\">Xu, X. &amp; Zweifel, P. (2020). A framework for the evaluation of InsurTech. Risk Management and Insurance Review. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">[HTML]<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"8\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Lin &amp; Chen, 2020)&quot;,&quot;citation&quot;:&quot;Lin, L. &amp; Chen, C. (2020). The promise and perils of InsurTech. Singapore Journal of Legal Studies.&quot;,&quot;link&quot;:&quot;https:\/\/ink.library.smu.edu.sg\/cgi\/viewcontent.cgi?article=5123&amp;context=sol_research&quot;,&quot;id&quot;:&quot;DN5PK6Oh6-sJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;PDF&quot;,&quot;linkTitle&quot;:&quot;smu.edu.sg&quot;}\"><span style=\"cursor: auto; color: inherit;\">Lin, L. &amp; Chen, C. (2020). The promise and perils of InsurTech. Singapore Journal of Legal Studies. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">smu.edu.sg<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"9\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Nurse et al.2020)&quot;,&quot;citation&quot;:&quot;Nurse, J. R., Axon, L., Erola, A., Agrafiotis, I., Goldsmith, M., &amp; Creese, S. (2020, June). The data that drives cyber insurance: A study into the underwriting and claims processes. In 2020 International conference on cyber situational awareness, data analytics and assessment (CyberSA) (pp. 1-8). IEEE.&quot;,&quot;link&quot;:&quot;https:\/\/arxiv.org\/pdf\/2008.04713&quot;,&quot;id&quot;:&quot;iPl7b_tZEm4J&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;PDF&quot;,&quot;linkTitle&quot;:&quot;arxiv.org&quot;}\"><span style=\"cursor: auto; color: inherit;\">Nurse, J. R., Axon, L., Erola, A., Agrafiotis, I., Goldsmith, M., &amp; Creese, S. (2020, June). The data that drives cyber insurance: A study into the underwriting and claims processes. In 2020 International conference on cyber situational awareness, data analytics and assessment (CyberSA) (pp. 1-8). IEEE. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">[PDF]<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"10\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Singh &amp; Akhilesh, 2020)&quot;,&quot;citation&quot;:&quot;Singh, A. &amp; Akhilesh, K. B. (2020). The insurance industry\u2014cyber security in the hyper-connected age. Smart Technologies: Scope and Applications.&quot;,&quot;link&quot;:&quot;https:\/\/link.springer.com\/chapter\/10.1007\/978-981-13-7139-4_16&quot;,&quot;id&quot;:&quot;l6QTmXtGCoMJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;HTML&quot;,&quot;linkTitle&quot;:null}\"><span style=\"cursor: auto; color: inherit;\">Singh, A. &amp; Akhilesh, K. B. (2020). The insurance industry\u2014cyber security in the hyper-connected age. Smart Technologies: Scope and Applications. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">[HTML]<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"11\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Thakur, 2024)&quot;,&quot;citation&quot;:&quot;Thakur, M. (2024). Cyber security threats and countermeasures in digital age. Journal of Applied Science and Education (JASE).&quot;,&quot;link&quot;:&quot;https:\/\/jase.a2zjournals.com\/index.php\/ase\/article\/download\/42\/37&quot;,&quot;id&quot;:&quot;RsJq5OCQFtQJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;PDF&quot;,&quot;linkTitle&quot;:&quot;a2zjournals.com&quot;}\"><span style=\"cursor: auto; color: inherit;\">Thakur, M. (2024). Cyber security threats and countermeasures in digital age. Journal of Applied Science and Education (JASE). <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">a2zjournals.com<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"12\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Mohamed and Ali2021)&quot;,&quot;citation&quot;:&quot;Mohamed, H., &amp; Ali, H. (2021). Finding solutions to cybersecurity challenges in the digital economy. In Fostering Innovation and Competitiveness with FinTech, RegTech, and SupTech (pp. 80-96). IGI Global.&quot;,&quot;link&quot;:&quot;https:\/\/www.researchgate.net\/profile\/Hassnian-Ali\/publication\/348122314_Finding_Solutions_to_Cybersecurity_Challenges_in_the_Digital_Economy\/links\/643604fd609c170a130fb5d4\/Finding-Solutions-to-Cybersecurity-Challenges-in-the-Digital-Economy.pdf&quot;,&quot;id&quot;:&quot;KFYuYUyd-bsJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;PDF&quot;,&quot;linkTitle&quot;:&quot;researchgate.net&quot;}\"><span style=\"cursor: auto; color: inherit;\">Mohamed, H., &amp; Ali, H. (2021). Finding solutions to cybersecurity challenges in the digital economy. In Fostering Innovation and Competitiveness with FinTech, RegTech, and SupTech (pp. 80-96). IGI Global. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">researchgate.net<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"13\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Skryl &amp; Hlushko, 2023)&quot;,&quot;citation&quot;:&quot;Skryl, V. &amp; Hlushko, A. (2023). Insurtech: new opportunities for the development of the insurance market. \u041d\u0430\u0443\u043a\u043e\u0432\u0438\u0439 \u0436\u0443\u0440\u043d\u0430\u043b \u00ab\u0415\u043a\u043e\u043d\u043e\u043c\u0456\u043a\u0430 \u0456 \u0440\u0435\u0433\u0456\u043e\u043d\u00bb.&quot;,&quot;link&quot;:&quot;https:\/\/journals.nupp.edu.ua\/eir\/article\/download\/2877\/2283&quot;,&quot;id&quot;:&quot;bC8IAlJMWEYJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;PDF&quot;,&quot;linkTitle&quot;:&quot;nupp.edu.ua&quot;}\"><span style=\"cursor: auto; color: inherit;\">Skryl, V. &amp; Hlushko, A. (2023). Insurtech: new opportunities for the development of the insurance market. \u041d\u0430\u0443\u043a\u043e\u0432\u0438\u0439 \u0436\u0443\u0440\u043d\u0430\u043b \u00ab\u0415\u043a\u043e\u043d\u043e\u043c\u0456\u043a\u0430 \u0456 \u0440\u0435\u0433\u0456\u043e\u043d\u00bb. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">nupp.edu.ua<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"14\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Neale et al., 2020)&quot;,&quot;citation&quot;:&quot;Neale, F. R., Drake, P. P., &amp; Konstantopoulos, T. (2020). InsurTech and the Disruption of the Insurance Industry. Journal of Insurance Issues.&quot;,&quot;link&quot;:&quot;https:\/\/www.jstor.org\/stable\/26931211&quot;,&quot;id&quot;:&quot;I_lilnntlaoJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;HTML&quot;,&quot;linkTitle&quot;:null}\"><span style=\"cursor: auto; color: inherit;\">Neale, F. R., Drake, P. P., &amp; Konstantopoulos, T. (2020). InsurTech and the Disruption of the Insurance Industry. Journal of Insurance Issues. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">[HTML]<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"15\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Lanfranchi and Grassi2022)&quot;,&quot;citation&quot;:&quot;Lanfranchi, D., &amp; Grassi, L. (2022). Examining insurance companies\u2019 use of technology for innovation. The Geneva Papers on Risk and Insurance-Issues and Practice, 47(3), 520-537.&quot;,&quot;link&quot;:&quot;https:\/\/link.springer.com\/article\/10.1057\/s41288-021-00258-y&quot;,&quot;id&quot;:&quot;xpQINrRT3DwJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;HTML&quot;,&quot;linkTitle&quot;:&quot;springer.com&quot;}\"><span style=\"cursor: auto; color: inherit;\">Lanfranchi, D., &amp; Grassi, L. (2022). Examining insurance companies\u2019 use of technology for innovation. The Geneva Papers on Risk and Insurance-Issues and Practice, 47(3), 520-537. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">springer.com<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"16\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Greineder et al., 2020)&quot;,&quot;citation&quot;:&quot;Greineder, M., Riasanow, T., B\u00f6hm, M., &amp; Krcmar, H. (2020). The generic InsurTech ecosystem and its strategic implications for the digital transformation of the insurance industry.&quot;,&quot;link&quot;:&quot;https:\/\/dl.gi.de\/bitstreams\/adc2b0c1-476e-417e-ae8b-8e7c69a09d1d\/download&quot;,&quot;id&quot;:&quot;cn_WCizKVYsJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;PDF&quot;,&quot;linkTitle&quot;:&quot;gi.de&quot;}\"><span style=\"cursor: auto; color: inherit;\">Greineder, M., Riasanow, T., B\u00f6hm, M., &amp; Krcmar, H. (2020). The generic InsurTech ecosystem and its strategic implications for the digital transformation of the insurance industry. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">gi.de<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"17\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Bland et al.2021)&quot;,&quot;citation&quot;:&quot;Bland, M., Leggetter, M., Cestaro, D., &amp; Sebire, J. (2021). Fifteen minutes per day keeps the violence away: A crossover randomised controlled trial on the impact of foot patrols on serious violence in large hot spot areas. Cambridge journal of evidence-based policing, 5(3), 93-118.&quot;,&quot;link&quot;:&quot;https:\/\/link.springer.com\/article\/10.1007\/s41887-021-00066-3&quot;,&quot;id&quot;:&quot;Gb377S0P00gJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;HTML&quot;,&quot;linkTitle&quot;:&quot;springer.com&quot;}\"><span style=\"cursor: auto; color: inherit;\">Bland, M., Leggetter, M., Cestaro, D., &amp; Sebire, J. (2021). Fifteen minutes per day keeps the violence away: A crossover randomised controlled trial on the impact of foot patrols on serious violence in large hot spot areas. Cambridge journal of evidence-based policing, 5(3), 93-118. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">springer.com<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"18\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Martens, 2022)&quot;,&quot;citation&quot;:&quot;Martens, D. (2022). Data science ethics: concepts, techniques, and cautionary tales.&quot;,&quot;link&quot;:&quot;https:\/\/books.google.com\/books?hl=en&amp;lr=&amp;id=vJtjEAAAQBAJ&amp;oi=fnd&amp;pg=PP1&amp;dq=It+takes+about+78+days+to+detect+and+contain+a+data+violation+point+in+major+companies.&amp;ots=38I7KMr5tT&amp;sig=RmKCMMad9jXN9pBA9tHstL-cryU&quot;,&quot;id&quot;:&quot;LbQVd0mQ1XQJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;HTML&quot;,&quot;linkTitle&quot;:null}\"><span style=\"cursor: auto; color: inherit;\">Martens, D. (2022). Data science ethics: concepts, techniques, and cautionary tales. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">[HTML]<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"19\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Taherdoost, 2021)&quot;,&quot;citation&quot;:&quot;Taherdoost, H. (2021). A review on risk management in information systems: Risk policy, control and fraud detection. Electronics.&quot;,&quot;link&quot;:&quot;https:\/\/www.mdpi.com\/2079-9292\/10\/24\/3065&quot;,&quot;id&quot;:&quot;lefV50lOhCAJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;HTML&quot;,&quot;linkTitle&quot;:&quot;mdpi.com&quot;}\"><span style=\"cursor: auto; color: inherit;\">Taherdoost, H. (2021). A review on risk management in information systems: Risk policy, control and fraud detection. Electronics. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">mdpi.com<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"20\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Bentotahewa et al., 2021)&quot;,&quot;citation&quot;:&quot;Bentotahewa, V., Hewage, C., &amp; Williams, J. (2021). Solutions to Big Data privacy and security challenges associated with COVID-19 surveillance systems. Frontiers in big data.&quot;,&quot;link&quot;:&quot;https:\/\/www.frontiersin.org\/articles\/10.3389\/fdata.2021.645204\/full&quot;,&quot;id&quot;:&quot;5XcntLgpBbIJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;HTML&quot;,&quot;linkTitle&quot;:&quot;frontiersin.org&quot;}\"><span style=\"cursor: auto; color: inherit;\">Bentotahewa, V., Hewage, C., &amp; Williams, J. (2021). Solutions to Big Data privacy and security challenges associated with COVID-19 surveillance systems. Frontiers in big data. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">frontiersin.org<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"21\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Tian et al.2020)&quot;,&quot;citation&quot;:&quot;Tian, Z., Luo, C., Lu, H., Su, S., Sun, Y., &amp; Zhang, M. (2020). User and entity behavior analysis under urban big data. ACM Transactions on Data Science, 1(3), 1-19.&quot;,&quot;link&quot;:&quot;https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374749&quot;,&quot;id&quot;:&quot;oAcLGdhleFwJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;PDF&quot;,&quot;linkTitle&quot;:&quot;acm.org&quot;}\"><span style=\"cursor: auto; color: inherit;\">Tian, Z., Luo, C., Lu, H., Su, S., Sun, Y., &amp; Zhang, M. (2020). User and entity behavior analysis under urban big data. ACM Transactions on Data Science, 1(3), 1-19. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">acm.org<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"22\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Sasada et al.2023)&quot;,&quot;citation&quot;:&quot;Sasada, T., Kawai, M., Masuda, Y., Taenaka, Y., &amp; Kadobayashi, Y. (2023). Factor Analysis of Learning Motivation Difference on Cybersecurity Training with Zero Trust Architecture. IEEE Access.&quot;,&quot;link&quot;:&quot;https:\/\/ieeexplore.ieee.org\/iel7\/6287639\/6514899\/10352156.pdf&quot;,&quot;id&quot;:&quot;sPX_CxqlovcJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;PDF&quot;,&quot;linkTitle&quot;:&quot;ieee.org&quot;}\"><span style=\"cursor: auto; color: inherit;\">Sasada, T., Kawai, M., Masuda, Y., Taenaka, Y., &amp; Kadobayashi, Y. (2023). Factor Analysis of Learning Motivation Difference on Cybersecurity Training with Zero Trust Architecture. IEEE Access. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">ieee.org<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"23\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Slayton &amp; Clarke, 2020)&quot;,&quot;citation&quot;:&quot;Slayton, R. &amp; Clarke, B. (2020). Trusting infrastructure: The emergence of computer security incident response, 1989\u20132005. Technology and Culture.&quot;,&quot;link&quot;:&quot;https:\/\/muse.jhu.edu\/pub\/1\/article\/752964\/summary&quot;,&quot;id&quot;:&quot;7ywAdIvLVbEJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;HTML&quot;,&quot;linkTitle&quot;:null}\"><span style=\"cursor: auto; color: inherit;\">Slayton, R. &amp; Clarke, B. (2020). Trusting infrastructure: The emergence of computer security incident response, 1989\u20132005. Technology and Culture. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">[HTML]<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"24\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Chowdhury &amp; Gkioulos, 2021)&quot;,&quot;citation&quot;:&quot;Chowdhury, N. &amp; Gkioulos, V. (2021). Cyber security training for critical infrastructure protection: A literature review. Computer Science Review.&quot;,&quot;link&quot;:&quot;https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1574013721000010&quot;,&quot;id&quot;:&quot;eO9-obiT2VQJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;HTML&quot;,&quot;linkTitle&quot;:&quot;sciencedirect.com&quot;}\"><span style=\"cursor: auto; color: inherit;\">Chowdhury, N. &amp; Gkioulos, V. (2021). Cyber security training for critical infrastructure protection: A literature review. Computer Science Review. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">sciencedirect.com<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"25\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Strand, 2023)&quot;,&quot;citation&quot;:&quot;Strand, S. S. (2023). An investigation into cyber security risk mitigation and the human factor in developing a cyber security culture-A comparative analysis of two maritime companies in \u2026.&quot;,&quot;link&quot;:&quot;https:\/\/openarchive.usn.no\/usn-xmlui\/bitstream\/handle\/11250\/3076275\/no.usn%3Awiseflow%3A6856806%3A54913306.pdf?sequence=1&amp;isAllowed=y&quot;,&quot;id&quot;:&quot;8PJ60VpI_mEJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;PDF&quot;,&quot;linkTitle&quot;:&quot;usn.no&quot;}\"><span style=\"cursor: auto; color: inherit;\">Strand, S. S. (2023). An investigation into cyber security risk mitigation and the human factor in developing a cyber security culture-A comparative analysis of two maritime companies in \u2026. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">usn.no<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"26\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Akkor and Ozyukse2020)&quot;,&quot;citation&quot;:&quot;Akkor, D. G., &amp; Ozyukse, S. (2020). The effects of new technologies on the insurance sector: a proposition for underwriting qualifications for the future. Eurasian Journal of Business and Management, 8(1), 36-50.&quot;,&quot;link&quot;:&quot;https:\/\/www.researchgate.net\/profile\/Suna-Ozyuksel\/publication\/340563124_THE_EFFECTS_OF_NEW_TECHNOLOGIES_ON_THE_INSURANCE_SECTOR_A_PROPOSITION_FOR_UNDERWRITING_QUALIFICATIONS_FOR_THE_FUTURE\/links\/5e943a30a6fdcca78911cc06\/THE-EFFECTS-OF-NEW-TECHNOLOGIES-ON-THE-INSURANCE-SECTOR-A-PROPOSITION-FOR-UNDERWRITING-QUALIFICATIONS-FOR-THE-FUTURE.pdf&quot;,&quot;id&quot;:&quot;jm2x0Y2nBR0J&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;PDF&quot;,&quot;linkTitle&quot;:&quot;researchgate.net&quot;}\"><span style=\"cursor: auto; color: inherit;\">Akkor, D. G., &amp; Ozyukse, S. (2020). The effects of new technologies on the insurance sector: a proposition for underwriting qualifications for the future. Eurasian Journal of Business and Management, 8(1), 36-50. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">researchgate.net<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"27\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Chowdhury et al., 2022)&quot;,&quot;citation&quot;:&quot;Chowdhury, N., Katsikas, S., &amp; Gkioulos, V. (2022). Modeling effective cybersecurity training frameworks: A delphi method-based study. Computers &amp; Security.&quot;,&quot;link&quot;:&quot;https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404821003758&quot;,&quot;id&quot;:&quot;ReIl_AuYGB4J&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;HTML&quot;,&quot;linkTitle&quot;:&quot;sciencedirect.com&quot;}\"><span style=\"cursor: auto; color: inherit;\">Chowdhury, N., Katsikas, S., &amp; Gkioulos, V. (2022). Modeling effective cybersecurity training frameworks: A delphi method-based study. Computers &amp; Security. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">sciencedirect.com<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"28\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Erstad et al.2023)&quot;,&quot;citation&quot;:&quot;Erstad, E., Hopcraft, R., Vineetha Harish, A., &amp; Tam, K. (2023). A human-centred design approach for the development and conducting of maritime cyber resilience training. WMU Journal of Maritime Affairs, 22(2), 241-266.&quot;,&quot;link&quot;:&quot;https:\/\/link.springer.com\/article\/10.1007\/s13437-023-00304-7&quot;,&quot;id&quot;:&quot;NX9RhJl5e1oJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;HTML&quot;,&quot;linkTitle&quot;:&quot;springer.com&quot;}\"><span style=\"cursor: auto; color: inherit;\">Erstad, E., Hopcraft, R., Vineetha Harish, A., &amp; Tam, K. (2023). A human-centred design approach for the development and conducting of maritime cyber resilience training. WMU Journal of Maritime Affairs, 22(2), 241-266. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">springer.com<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"29\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Blum and Blum2020)&quot;,&quot;citation&quot;:&quot;Blum, D., &amp; Blum, D. (2020). Institute resilience through detection, response, and recovery. Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment, 259-295.&quot;,&quot;link&quot;:&quot;https:\/\/link.springer.com\/chapter\/10.1007\/978-1-4842-5952-8_9&quot;,&quot;id&quot;:&quot;jSaXDw3AuIAJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;HTML&quot;,&quot;linkTitle&quot;:&quot;springer.com&quot;}\"><span style=\"cursor: auto; color: inherit;\">Blum, D., &amp; Blum, D. (2020). Institute resilience through detection, response, and recovery. Rational Cybersecurity for Business: The Security Leaders&#8217; Guide to Business Alignment, 259-295. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">springer.com<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"30\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Afenyo &amp; Caesar, 2023)&quot;,&quot;citation&quot;:&quot;Afenyo, M. &amp; Caesar, L. D. (2023). Maritime cybersecurity threats: Gaps and directions for future research. Ocean &amp; Coastal Management.&quot;,&quot;link&quot;:&quot;https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0964569123000182&quot;,&quot;id&quot;:&quot;qYut53i3UEkJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;HTML&quot;,&quot;linkTitle&quot;:null}\"><span style=\"cursor: auto; color: inherit;\">Afenyo, M. &amp; Caesar, L. D. (2023). Maritime cybersecurity threats: Gaps and directions for future research. Ocean &amp; Coastal Management. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">[HTML]<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"31\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Valentinov and Chia2022)&quot;,&quot;citation&quot;:&quot;Valentinov, V., &amp; Chia, R. (2022). Stakeholder theory: A process\u2010ontological perspective. Business Ethics, the Environment &amp; Responsibility, 31(3), 762-776.&quot;,&quot;link&quot;:&quot;https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/beer.12441&quot;,&quot;id&quot;:&quot;CVM02qGkJ4YJ&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;PDF&quot;,&quot;linkTitle&quot;:&quot;wiley.com&quot;}\"><span style=\"cursor: auto; color: inherit;\">Valentinov, V., &amp; Chia, R. (2022). Stakeholder theory: A process\u2010ontological perspective. Business Ethics, the Environment &amp; Responsibility, 31(3), 762-776. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">wiley.com<\/span><\/a><\/p>\n<p style=\"cursor: auto; color: inherit;\" data-citation-node-type=\"container\" data-index=\"32\" data-citation=\"{&quot;inTextLink&quot;:&quot;(Kappo-Abidemi and Ogujiuba2020)&quot;,&quot;citation&quot;:&quot;Kappo-Abidemi, C., &amp; Ogujiuba, K. K. (2020). Higher education institutions and corporate social responsibility: triple bottomline as a conceptual framework for community development. Entrepreneurship and Sustainability Issues.&quot;,&quot;link&quot;:&quot;https:\/\/openscholar.ump.ac.za\/bitstream\/20.500.12714\/321\/1\/Higher-education-institutions-and-corporate-social-responsibility-triple-bottomline-as-a-conceptual-framework-for-community-development.pdf&quot;,&quot;id&quot;:&quot;7sUOxvicsz8J&quot;,&quot;sourceType&quot;:&quot;default&quot;,&quot;linkType&quot;:&quot;PDF&quot;,&quot;linkTitle&quot;:&quot;ump.ac.za&quot;}\"><span style=\"cursor: auto; color: inherit;\">Kappo-Abidemi, C., &amp; Ogujiuba, K. K. (2020). Higher education institutions and corporate social responsibility: triple bottomline as a conceptual framework for community development. Entrepreneurship and Sustainability Issues. <\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">ump.ac.za<\/span><\/a><\/p>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>This assignment is my capstone report for my master&#8217;s degree in cybersecurity policy and risk management. The research question is &#8221; How can InsurTech companies better develop and implement training programs to equip insurance professionals with the necessary skills and knowledge for incident response in the face of evolving cyber threats, leveraging industry best practices?&#8221; [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[62],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/24257"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=24257"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/24257\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=24257"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=24257"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=24257"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=24257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}