{"id":22631,"date":"2018-12-20T17:00:56","date_gmt":"2018-12-20T17:00:56","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=87736"},"modified":"2018-12-20T17:00:56","modified_gmt":"2018-12-20T17:00:56","slug":"the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/","title":{"rendered":"The challenges of adopting a consistent cybersecurity framework in the insurance industry"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/wp-content\/themes\/cloudperspectives\/dist\/images\/MSFT_logo_rgb_C-Gray_1200_x_627.png\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>As hacking events have increased in number and severity, we in the cybersecurity community have united around common strategies that all organizations can implement to reduce their risk. Universal best practices provide organizations with many useful tools to protect their businesses. But what often gets overlooked in these discussions are the unique security challenges that each industry faces, and the tailored solutions required to address those issues. This is an area of interest to me, and lately I\u2019ve been fascinated by the path that the insurance industry is carving out when it comes to cybersecurity. Today, I\u2019ll discuss recent activity by the U.S. insurance industry and the ramifications and impact of these initiatives. In future weeks, I\u2019ll offer my insights into how other industries are confronting rising security and compliance risks.<\/p>\n<p>Before we dive in, let me provide a little context into why I think we should segment out insurance as an area of focus. While in many people\u2019s minds, the insurance industry is considered simply a sub-sector of the financial services sector\u2014nothing could be further from the truth. For those not as familiar with these important nuances, it\u2019s important to point out that the insurance market has its own business needs, technology requirements and adoption cycles, and buyer personas as compared to banking and capital markets. Products (security-related or otherwise) that might resonate with a banker or IT professional in banking may not be relevant to an insurance buyer, just as products that the insurance buyer finds valuable may not appeal to the banking and capital markets. It\u2019s therefore imperative that we take stock of the insurance market\u2019s efforts and endeavors when it comes to protecting insurers, their customers, and their data.<\/p>\n<h2>Aligning behind a cybersecurity framework in a fragmented, state-by-state regulatory environment<\/h2>\n<p>In the last few years, the U.S. insurance industry has taken several steps to work on cyber issues. The most obvious example is the recent moves by the National Association of Insurance Commissioners (NAIC) to promote their <a target=\"_blank\" href=\"https:\/\/www.naic.org\/store\/free\/MDL-668.pdf\" rel=\"noopener\">Insurance Data Security Model Law<\/a>. This model legislation establishes a legal framework to guide state governments as they consider enacting laws to require insurance companies to implement cybersecurity protections. In general, the NAIC has become more <a target=\"_blank\" href=\"https:\/\/www.naic.org\/Releases\/2017_docs\/naic_stanford_cybersecurity_forum.htm\" rel=\"noopener\">outspoken<\/a> on cybersecurity issues (see, for example, their <a target=\"_blank\" href=\"https:\/\/www.naic.org\/Releases\/2015_docs\/naic_advances_consumer_bill_of_rights_during_cybersecurity_awareness_month.htm\" rel=\"noopener\">2015 Cybersecurity Bill of Rights<\/a>) and has been working to ensure a consistent <a target=\"_blank\" href=\"https:\/\/www.insureuonline.org\/insureu_special_cybersecurity.htm\" rel=\"noopener\">approach<\/a> within the U.S. market.<\/p>\n<p>If we look at these various activities, a few key points emerge that I think are valuable and worth keeping track of in the coming months:<\/p>\n<ul>\n<li><strong>Less consumer data to build profiles<\/strong>\u2014Can you remember the last time you engaged with your insurance company or even used their online website? If you are like most consumers, you probably only engage your insurer when a problem arises (think flood, car accident, theft, etc.). As insurers work to improve their overall security stance, it\u2019s worth remembering that most insurance companies don\u2019t typically have as much ongoing engagement with their consumer clients. This lack of ongoing engagement means that insurers struggle to build strong and reliable profiles about consumers\u2019 devices, identities, typical sign-in activity, and usage. Banks and credit unions, on the other hand, have tremendous amounts of data about their consumers and much of that is due to the fact that consumers make ongoing use of their online and\/or mobile banking technologies throughout the month or even the week.<\/li>\n<li><strong>Fraud and security divergence<\/strong>\u2014Like banking, insurance suffers from a blend of fraud and security concerns. However, those fraud concerns are dramatically different than what the banks contend with. Insurers typically worry about things like policies that are opened without someone\u2019s knowledge, policies that are fraudulently cashed in, manipulation of elderly customers, and more. While there is sometimes an overlap with security issues, for the most part these fraud trends are not directly tied to data breaches, etc. Security issues, therefore, oftentimes compete with fraud issues for attention and resources.<\/li>\n<li><strong>Fragmented regulatory environment<\/strong>\u2014Unlike banks and credit unions, insurance companies in the U.S. are not as heavily regulated at the federal level. For the most part, they are regulated by state agencies and therefore engage in a more complicated set of risk-related discussions if they do business in multiple states (as most of them do). This causes insurers to be much more challenged in adopting consistent cyber-prevention strategies as it relates to regulation. While the insurers have CISOs and strong security teams in-house, those teams oftentimes are working to address internal consistency issues having to do with risk management or with overall risk appetite.<\/li>\n<li><strong>CISO broader focus<\/strong>\u2014It\u2019s no surprise that the CISOs of insurance companies continue to adopt an approach that emphasizes taking a broader risk management view of their business, and they typically communicate openly with their CEOs and boards about cyber risk. However, their particular challenge is that insurance company senior leadership uniquely understands the notion of risk and may at times downplay or take for granted cybersecurity-related risk issues. This makes the CISO\u2019s job inherently more difficult as the CISO is effectively \u201ccompeting\u201d for attention and may at times be forced to stack-rank the risk that they are highlighting against the risk that other peers on the senior leadership team may be highlighting (for example: liquidity risk, credit risk, etc.).<\/li>\n<\/ul>\n<h2>Stay current on the rapidly changing insurance sector security landscape<\/h2>\n<p>The state-by-state adoption of laws that are similar to or overlapping with the NAIC Insurance Data Security Model Law will continue at an unpredictable pace. As of this writing, over a half dozen states are debating these rules and determining the best way to apply the NAIC\u2019s law while also weaving in coverage from the 2017 Cybersecurity Regulation from the New York Department of Financial Services (which overlaps significantly with the NAIC law). And <a target=\"_blank\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/protecting-privacy-in-microsoft-azure-gdpr-azure-policy-updates\/\" rel=\"noopener\">as we move<\/a> into <a target=\"_blank\" href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2018\/05\/21\/microsofts-commitment-to-gdpr-privacy-and-putting-customers-in-control-of-their-own-data\/\" rel=\"noopener\">a post-GDPR world<\/a> and consider the California Consumer Privacy Act from this past June, it will be intriguing to see how insurers and banks take their cues from one another and also continue to promulgate laws unique to their own industry needs. If you are interested in staying current on these issues, you can monitor the <a target=\"_blank\" href=\"https:\/\/www.naic.org\/cipr_topics\/topic_cyber_risk.htm\" rel=\"noopener\">NAIC website<\/a>. And look out for future blogs from me where I\u2019ll discuss other industries dealing with cybersecurity and compliance challenges.<\/p>\n<p>READ MORE <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/12\/20\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How the U.S. insurance industry is aligning behind a cybersecurity framework in a fragmented, state-by-state, regulatory environment.<br \/>\nThe post The challenges of adopting a consistent cybersecurity framework in the insurance industry appeared first on Microsoft Secure. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":22632,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347],"class_list":["post-22631","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The challenges of adopting a consistent cybersecurity framework in the insurance industry 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The challenges of adopting a consistent cybersecurity framework in the insurance industry 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-20T17:00:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The challenges of adopting a consistent cybersecurity framework in the insurance industry\",\"datePublished\":\"2018-12-20T17:00:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/\"},\"wordCount\":1072,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry.png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/\",\"name\":\"The challenges of adopting a consistent cybersecurity framework in the insurance industry 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry.png\",\"datePublished\":\"2018-12-20T17:00:56+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry.png\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The challenges of adopting a consistent cybersecurity framework in the insurance industry\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The challenges of adopting a consistent cybersecurity framework in the insurance industry 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/","og_locale":"en_US","og_type":"article","og_title":"The challenges of adopting a consistent cybersecurity framework in the insurance industry 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-12-20T17:00:56+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The challenges of adopting a consistent cybersecurity framework in the insurance industry","datePublished":"2018-12-20T17:00:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/"},"wordCount":1072,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry.png","keywords":["Cybersecurity"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/","url":"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/","name":"The challenges of adopting a consistent cybersecurity framework in the insurance industry 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry.png","datePublished":"2018-12-20T17:00:56+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/12\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry.png","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-challenges-of-adopting-a-consistent-cybersecurity-framework-in-the-insurance-industry\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"The challenges of adopting a consistent cybersecurity framework in the insurance industry"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/22631","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=22631"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/22631\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/22632"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=22631"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=22631"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=22631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}