Important information regarding the sale of Integro USA.View
Integro Holdings Inc., which held substantially all of the U.S. operations of Integro Insurance Brokers, has been sold to EPIC Insurance Brokers & Consultants. The addition of Integro USA significantly expands EPICs already substantial resources and service offerings.Click hereto read more about the acquisition.
Integros UK business segments including Entertainment & Sport, Corporate and Private Clients, and Wholesale are not part of the sale to EPIC. Please click the following links for information on those segments:Entertainment & Sport,Corporate & Private Client, orWholesale(trading under the Tysers brand).
Find out more about how we can protect you and your organization
We discover options that empower professionals to drive business growth.
Explore our options for freight forwarders, customs brokers and more.
Discretion. Professionalism. Protection for what matters most to you.
Our brokers specialize in providing innovative, personal solutions to a wide variety of commercial and private clients with large, complex or delicate risks and specialized insurance needs. Our clients span a variety of industries and include large companies, small and midsize businesses and individuals. Get to know Integro and discover a refreshingly personal, intensely analytical and consistently thorough approach to managing risk.
EPIC Insurance Brokers & Consultants will mark its first appearance at the upcoming RIMS conference in Boston, the industrys largest event for risk managers.
Integro today introduced an innovative Cyber Risk practice with a cutting-edge focus: the protection of knowledge assets, those exposures that go beyond the commonly accepted definition of data. The risks associated with knowledge assets are highlighted in the cyber study recently issued by the Ponemon Institute and Kilpatrick Townsend.
Beyond Breaches: Growing Issues in Information Security
Some of the biggest threats to information security involve controlling, damaging and interrupting systems while denying access to critical data and destroying data rather than breaches. Organizations need to make certain that their security protocols take into consideration the protection of the knowledge assets that differentiate them from their competitors.