Podcasts

Episode #7: Will AI replace the underwriter?

Bryce Goodman, Chief Strategist of AI/ML for the US Department of Defense, and Chris Finan, CRO of Symmetry Systems Inc., talk about using AI for cyber attacks and how it affects defensive roles in security.

by Nikhil Chawla

Listen to the episode
2:49
3:37

Episode #7: Will AI replace the underwriter?

Underwriting is both art and science. It’s also qualitative and quantitative. Indeed, it’s objective and subjective. Underwriters are not unlike the baseball scouts in Moneyball. They consider run of the mill statistics like runs batted in, on base average and myriads of other data. They also consider countless subjective factors. They were awful. Billy Bean (the A’s GM) brought in a statistician. What happened? The Oakland A’s achieved the longest consecutive game winning streak in history. It holds strong to this day. Unfortunately, the A’s haven’t retained their edge. All teams have their quants now. And scouts have persisted. So, what will be the fate of the underwriter? Will they persist like the scouts, or are they headed for a ChatGPT enabled demise?

On the go? Listen to our podcast on your favorite platiforms.

You might also like

What the Collins Aerospace outage reveals about vendor risk

What the Collins Aerospace outage reveals about vendor risk

On September 19, 2025, chaos erupted at airports across Europe—but not because of weather, strikes, or mechanical failures. Collins Aerospace’s MUSE platform, the digital backbone handling passenger check-in and baggage processing from Heathrow to Dublin, went dark after a ransomware attack. Within hours, major airports including Brussels, Berlin, and Dublin were forced to revert to […]

Does Resilience use your company data to train AI?

Does Resilience use your company data to train AI?

In an era where “AI training” has become synonymous with data collection, we get this question a lot: “Does Resilience use our company data to train AI models like ChatGPT?” The short answer? No. But the full answer reveals something more interesting about how we approach cyber risk modeling and why we chose a different […]

Cyber resiliency starts here.

Request Demo