5 résultats pour « Risk Management »

Strengthening Cybersecurity Resilience: the Importance of Education, Training, and Risk Management

“The financial impact of cybercrime paints a concerning picture. According to the FBI's Internet Crime Complaint Center (IC3), cybercrime complaints in 2023 reached record highs, with reported losses exceeding $10 billion (IC3, 2023). Furthermore, IBM's 2023 Cost of a Data Breach Report estimates the average global cost of a data breach to be a staggering $4.5 million (IBM, 2023). These statistics highlight the immense financial burden cybercrime places on individuals, organizations, and governments.”

An AI Vision for the Actuarial Profession

"The essay presents a vision of the AI-enhanced actuary, who leverages AI to build more accurate and efficient models, incorporates new data sources, and automates routine tasks while adhering to professional and ethical standards. We also discuss the challenges and speed-bumps along the way, including explainability, bias and discrimination risks, regulatory hurdles, and the need for actuaries to acquire AI knowledge and skills."

Modelling of Large Fire Insurance Claims: An Extreme Value Theory Approach

This research develops a mathematical model using Extreme Value Theory and Risk Measures to estimate and forecast major fire insurance claims, enhancing insurers' understanding of potential risks. Utilizing a three-parameter Generalized Pareto Distribution in the Extreme Value Theory framework, the study effectively models large losses, aiding in risk management and pricing strategies for insurance firms.

Unravelling the Three Lines Model in Cybersecurity: A Systematic Literature Review

The Three Lines of Defence model (based on defence-in-depth approaches) has become one of the primary risk management frameworks. Yet, its application in the cybersecurity space, one of the fastest-growing areas of risk for modern organisations, has been fragmented at best. In this article, we conducted a systematic literature review on the application of this model in cybersecurity.