Trump’s proposed FEMA revamp – how will it affect brokers and clients?

“Changes to FEMA (and the NFIP) represent opportunity for the insurance industry,” said Dana Sutton, AVP, personal risk, flood practice at NFP. “It could lead people to move from the NFIP into the private market, which is an overall net good for the industry. More risk moving in the direction of the private market means … Read more

Georgia governor unveils tort reform package to curb rising litigation costs

“APCIA applauds Governor Kemp as well as Lieutenant Governor Burt Jones, Speaker Jon Burns, and Senator John Kennedy for their commitment and ongoing leadership in addressing legal system abuse. We look forward to working with the governor and members of the House and Senate to pass this critical legislation this session,” he said.

California insurers pay out over $4.2 billion for Eaton and Palisades wildfires

“From the onset of the wildfires, insurers have been on the frontlines assisting customers with disaster recovery – proactively reaching out to impacted customers, setting up help centers, and deploying catastrophe teams to help residents get claims started and secure emergency housing, food, clothing and other resources in their time of need,” Ritter said.

Ariel Re completes first fundraising for new capital platform ARCP

ARCP allows investors, including smaller funds, family offices, and ultra-high-net-worth individuals, to participate in Lloyd’s risk with a minimum investment of US$5 million through Ariel Re’s Syndicate 1910. The platform eliminates the need for investors to establish a Lloyd’s Corporate Member, making it more accessible to a wider range of capital providers. 

Bermuda and Cayman reinsurance markets expand with sidecars and new lines – KPMG

KPMG emphasized that reinsurers should seek to limit their handling of PII whenever possible and implement strict security controls to manage sensitive data. Compliance teams play a key role in ensuring adherence to international data protection laws, which may include access restrictions, employee training programs, and response protocols for potential breaches.