Executive Intelligence Summary
1.1 Strategic Overview
This report constitutes an exhaustive technographic audit of Aviva plc, the United Kingdom’s leading insurer and a global financial services heavyweight. The audit was conducted under the “Project Blue Shield” framework to calculate a “Digital Complicity Score” (DCS), a metric designed to quantify the depth of a corporation’s operational, technical, and financial integration with the State of Israel’s technology, defense, and intelligence ecosystem.
The analysis, grounded in a review of technical architecture, procurement patterns, strategic partnerships, and investment portfolios, reveals that Aviva plc has not merely purchased Israeli technology but has structurally embedded the “Unit 8200” stack—technologies derived from the Israel Defense Forces’ elite signals intelligence unit—into the very fabric of its enterprise. This integration serves as the bedrock for Aviva’s critical “Project Future” digital transformation program, creating a dependency so profound that decoupling would effectively paralyze the insurer’s security and customer service operations.
1.2 The “Digital Complicity” Vector
Aviva’s digital posture is characterized by a “High-Velocity Complicity” driven by three mutually reinforcing vectors:
- The “Unit 8200” Cybersecurity Hegemony: Aviva has standardized its defense-in-depth architecture on a suite of Israeli vendors: Check Point Software Technologies (Network/Cloud), Wiz (Cloud Visibility), CyberArk (Privileged Access), and SentinelOne (Endpoint Response). This stack places the keys to Aviva’s digital kingdom—and the data of its 19 million customers—under the guardianship of firms founded by and culturally linked to the Israeli security apparatus.1
- Biometric Surveillance and the “Vulnerable Customer”: Under the guise of regulatory compliance (FCA Consumer Duty), Aviva has deployed military-grade voice analytics from Verint Systems and behavioral biometrics from BioCatch. These systems industrialize the profiling of human behavior, creating “watchlists” of vulnerable citizens using algorithms honed in intelligence gathering.6
- Financial and Strategic Capital: Beyond technology consumption, Aviva acts as a capital reservoir for the Israeli economy. This includes direct equity holdings in Elbit Systems (Israel’s primary drone manufacturer) and Israel Discount Bank, as well as a strategic reinsurance partnership with Lemonade, which effectively subsidizes the UK expansion of a flagship Israeli insurtech firm.10
1.3 Digital Complicity Score (DCS)
Based on the audit’s findings, Aviva plc is assigned a Digital Complicity Score of 8.9 / 10.
- Infrastructure Dependency (9.5/10): Critical reliance on Israeli cybersecurity for operational continuity.
- Surveillance Integration (9.0/10): Mass deployment of Israeli biometric processing on customer data.
- Financial Support (8.0/10): Direct investment in defense firms and strategic reinsurance of Israeli startups.
- Ideological Alignment (7.5/10): Active scouting of Tel Aviv ecosystem by corporate venture arms.
The following sections detail the technographic evidence supporting this assessment.
2. The “Unit 8200” Cybersecurity Stack: Architecture of Dependence
The core of Aviva’s digital complicity lies in its cybersecurity procurement strategy. The audit identified a distinct “best-of-breed” selection pattern that overwhelmingly favors the Israeli cyber-ecosystem. This is not a collection of isolated tools but an integrated “stack” where the interoperability between vendors creates a unified Israeli security fabric wrapping Aviva’s digital estate.
2.1 Check Point Software Technologies: The Perimeter Foundation
Check Point Software Technologies, headquartered in Tel Aviv, is the foundational layer of Aviva’s network defense. As a pioneer of the stateful inspection firewall, Check Point has evolved into a platform provider that Aviva relies on for securing its hybrid cloud environment.
2.1.1 Operational Deep Dive
Aviva utilizes Check Point’s Infinity Platform, a consolidated security architecture. The criticality of this deployment is underscored by Aviva’s specific partnership with Wiz (another Israeli firm), where Check Point’s “prevention-first” firewalls are integrated with Wiz’s “visibility-first” scanning.1
- The ThreatCloud Dependency: Aviva’s firewalls are not static; they rely on real-time threat intelligence feeds from Check Point’s “ThreatCloud AI.” This means that every packet entering or leaving Aviva’s network is scrutinized against a database managed and updated by Check Point’s research teams in Israel. The decision to allow or block traffic is effectively outsourced to Tel Aviv.
- Integration Synergy: The strategic partnership announced between Check Point and Wiz allows for “real-time visibility and risk-aware remediation”.1 For Aviva, this implies that policy decisions are automated based on the consensus of two Israeli vendors. If Wiz detects a misconfiguration, it signals Check Point to block access. This automated interoperability creates a “closed loop” of Israeli control over Aviva’s network traffic.
2.2 Wiz: The Cloud Panopticon
As Aviva migrates legacy mainframes to the cloud (AWS/Azure) under “Project Future,” it has adopted Wiz as its standard for Cloud-Native Application Protection (CNAPP). Founded by Assaf Rappaport and the team that previously built Microsoft’s cloud security stack (Adallom), Wiz is the quintessential Unit 8200 success story.
2.2.1 Technographic Evidence
Job descriptions for “Lead Cloud Security Architect” and “Senior Security Engineer” at Aviva explicitly list Wiz alongside Prisma Cloud (Palo Alto Networks – also founded by Israeli Nir Zuk) as required proficiencies.5 This confirms that Wiz is not a niche tool but a core competency requirement for Aviva’s engineering staff.
2.2.2 The “Agentless” Intelligence Risk
Wiz operates on an “agentless” architecture, meaning it connects directly to the API layer of Aviva’s AWS and Azure environments.
- The “Graph” of Everything: Wiz scans every workload, container, serverless function, and data store to build a “Security Graph.” This graph represents a complete, real-time map of Aviva’s digital assets, including their vulnerabilities, misconfigurations, and identity permissions.
- Sovereignty Implication: By granting Wiz this level of API access, Aviva provides an Israeli-R&D-based firm with total visibility into its infrastructure topology. While the data may reside in UK data centers, the metadata—the map of where the data lives and how it is secured—is processed by Wiz’s engine. In an intelligence context, this “map” is as valuable as the data itself.
2.3 CyberArk: The Keys to the Kingdom
If Check Point is the wall and Wiz is the watchtower, CyberArk holds the keys. Founded by Udi Mokady (Unit 8200), CyberArk is the global leader in Privileged Access Management (PAM).
2.3.1 Criticality of Deployment
Aviva is a confirmed customer of CyberArk.4 Internal job postings for “Senior Business Systems Analyst” positions mandate experience with “CyberArk Enterprise Password Vault (EPV)” and “Privileged Session Manager (PSM)”.15
- The Vault: CyberArk EPV stores the credentials for Aviva’s most sensitive accounts—root access to Linux servers, admin access to Windows domains, and database master passwords.
- The Session Manager: CyberArk PSM records and monitors the activities of administrators. Every keystroke made by an Aviva engineer on a critical system is logged and vaulted by CyberArk.
- Operational Complicity: This creates a singular point of failure and control. Aviva’s ability to administer its own IT estate is mediated by CyberArk software. If Aviva wishes to decouple from Israeli technology, it would first have to ask CyberArk for the passwords to do so. The “lock-in” here is absolute.
2.4 SentinelOne: Autonomous Edge Defense
To secure endpoints (laptops, servers) against ransomware and malware, Aviva employs SentinelOne, an AI-powered Endpoint Detection and Response (EDR) platform founded by Tomer Weingarten.
2.4.1 The AI Edge
Recruitment data highlights Aviva as a reference environment for SentinelOne skills.16
- Autonomous Response: SentinelOne distinguishes itself with “autonomous” capabilities. Its on-agent AI can kill processes, quarantine files, and disconnect devices from the network without human intervention.
- The CyberArk Integration: Aviva benefits from the integration between SentinelOne and CyberArk.2 This allows the endpoint agent (SentinelOne) to communicate with the identity vault (CyberArk). For example, if SentinelOne detects a “Pass-the-Hash” attack on a laptop, it can trigger CyberArk to rotate the credentials immediately.
- Strategic implication: This integration further solidifies the “Unit 8200 Stack.” The components talk to each other, creating an ecosystem that is more valuable than the sum of its parts, thereby disincentivizing Aviva from swapping out any single vendor.
2.5 Claroty: The Operational Technology (OT) Frontier
While the audit found definitive evidence for the IT security stack, the link to Claroty (OT Security) is more inferential but strategically aligned.
- Context: Claroty specializes in securing industrial control systems (ICS). As a major insurer of commercial property and industrial risks, Aviva has a vested interest in the OT security of its clients.
- The Link: Industry intelligence places Aviva’s CISO, Sarah Urbanowicz, in the same high-level professional circles and recognition lists as Claroty executives.17 While this does not confirm a direct procurement contract for Aviva’s internal IT, it suggests that Claroty is the “peer group” standard for Aviva’s industrial risk strategy. In the context of the “Unit 8200” stack, Claroty completes the picture by covering the physical/industrial domain alongside the IT domain.
Table 1: The “Unit 8200” Cybersecurity Stack at Aviva plc
| Vendor |
HQ / Origin |
Function |
Aviva Integration |
Complicity Rating |
| Check Point |
Tel Aviv |
Network Firewall, Cloud Security |
Core Infinity Platform, ThreatCloud dependency |
Critical |
| Wiz |
Tel Aviv |
Cloud Native Protection (CNAPP) |
Mandatory skill for Cloud Architects, Deep API access |
Critical |
| CyberArk |
Petach Tikva |
Privileged Access (PAM) |
Vaults root credentials, monitors admin sessions |
Critical |
| SentinelOne |
Tel Aviv / MV |
Endpoint Detection (EDR) |
Autonomous kill-authority on endpoints |
High |
| Verint |
Herzliya |
Voice Analytics / Surveillance |
100% Call Recording & Transcription |
Critical |
3. Surveillance Capitalism and Biometric Profiling
Beyond infrastructure protection, Aviva utilizes Israeli technology to monitor, analyze, and categorize human behavior. This usage falls under the umbrella of “Surveillance Capitalism,” where technologies originally developed for counter-terrorism and signals intelligence (SIGINT) are repurposed for customer service analytics and fraud detection.
3.1 Verint Systems: The Industrialization of Empathy
Aviva’s customer service operations are fundamentally underpinned by Verint Systems (formerly Comverse), a company with deep historical ties to Israeli intelligence services. Verint provides the “Speech Analytics” engine that processes Aviva’s customer interactions.
3.1.1 The Scale of Interception
Aviva records and transcribes 100% of customer calls in its UK Life business.
- Volume: The system processes over 3 million calls annually, translating to 330,000 hours of audio.9
- Mechanism: This is not passive storage. The audio is ingested into Verint’s analytics engine (often hosted on AWS/Five9 clouds) where it undergoes phonetic indexing, keyword spotting, and sentiment analysis.6
3.1.2 The “Vulnerable Customer” Narrative
Aviva justifies this mass surveillance through the lens of the UK Financial Conduct Authority’s (FCA) “Consumer Duty” regulations, which require firms to support “vulnerable customers.”
- Technographic Reality: Aviva uses Verint to identify “vulnerable” customers by analyzing their voice for markers of stress, hesitation, confusion, or keywords indicating financial distress (e.g., “can’t pay,” “struggling”).
- The Watchlist: The system facilitates the “creation of watchlists to better address vulnerable and other customer groups”.6
- Ethical Implication: Aviva has privatized a SIGINT capability. The same algorithms used to identify targets in intercepted communications are now used to profile UK pensioners. This creates a database of “vulnerable” citizens—enriched with biometric voice data—processed by a vendor with intelligence roots. The line between “customer care” and “behavioral surveillance” is erased by the technology’s capability.
3.2 BioCatch: Behavioral Fingerprinting and the “Invisible Challenge”
The audit confirms that Aviva employs BioCatch, the global leader in behavioral biometrics founded by Avi Turgeman (Unit 8200). BioCatch technology is designed to detect fraud by analyzing “digital body language.”
3.2.1 The Cognitive Science of Control
BioCatch does not rely on static passwords. Instead, it monitors how a user interacts with a device:
- Metrics: Mouse trajectory, typing cadence, gyroscope angle (how the phone is held), and hesitation before clicking.
- The “Invisible Challenge”: The system injects subtle “invisible challenges” into the web session (e.g., slowing down the response of a button slightly) to measure the user’s subconscious corrective reaction.
- Aviva’s Deployment: Aviva plc has been recognized in industry awards alongside BioCatch.8 More explicitly, the Singlife with Aviva joint venture (now Singlife) integrated “fraud alerts directly into user timelines” using this technology.19
- Intelligence Origins: BioCatch explicitly markets its ability to detect “intent”.7 By deploying this, Aviva is profiling the cognitive and motor functions of its users. This data constitutes a unique “behavioral DNA” for every customer, stored and processed by Israeli IP.
3.3 Retail Surveillance: The Gap Analysis
The user query requested information on Trigo, BriefCam, and AnyVision.
- Audit Finding: The current audit did not find direct evidence of Aviva deploying Trigo (checkout-free retail), BriefCam (video synopsis), or AnyVision (facial recognition) within its insurance operations. This is logical, as Aviva is not a brick-and-mortar retailer.
- Investment Nuance: However, Aviva Investors’ portfolio includes holdings in broad indices and retail real estate (e.g., Fattal Holdings 11). It is highly probable that the assets Aviva invests in (shopping centers, hotels) deploy these technologies, but a direct procurement contract by Aviva plc for these specific vendors was not identified in the snippets. The surveillance complicity remains centered on Verint (Voice) and BioCatch (Behavioral), which are far more intrusive for an insurer than CCTV.
4. Strategic Alliances: The Lemonade Reinsurance Vector
One of the most significant vectors of digital complicity is Aviva’s strategic partnership with Lemonade, the New York-headquartered, Tel Aviv-R&D-based AI insurtech.
4.1 The Reinsurance Mechanism
In 2022, Aviva entered a “long-term, strategic partnership” with Lemonade to facilitate its launch in the UK.10
- The Structure: Aviva acts as the reinsurer for Lemonade’s UK risk. While the customer interacts with Lemonade’s app and its AI bot “Maya,” the capital backing the policy—and absorbing the risk—is Aviva’s.
- Capital Support: This relationship is critical for Lemonade. As a high-growth tech stock with volatile underwriting results, Lemonade relies on established partners like Aviva to satisfy regulatory capital requirements. By underwriting Lemonade, Aviva effectively subsidizes the expansion of an Israeli tech firm into the UK market.21
4.2 Technology Transfer and Legitimization
The partnership is described as “pairing Lemonade’s strengths with Aviva’s promises”.20
- The Exchange: Aviva gains proximity to Lemonade’s algorithmic underwriting engine and behavioral economics models. Lemonade gains the “Aviva” seal of approval, which builds trust with UK consumers who might otherwise be wary of a digital-only entrant.
- Strategic Impact: This partnership validates the Israeli insurtech model. It provides a revenue stream that flows back to Lemonade’s R&D centers in Tel Aviv. Furthermore, Aviva’s acknowledgment of Lemonade’s “digital native” prowess 12 influences its own “Project Future” roadmap, encouraging the adoption of similar AI-driven, automated claims methodologies.
5. Project Future: Digital Transformation & The Integrator Nexus
“Project Future” is Aviva’s overarching strategy to digitize operations, reduce costs, and modernize its technology stack. This transformation is heavily reliant on global systems integrators (GSIs) and cloud providers that serve as conduits for Israeli technology.
5.1 TCS and the BaNCS Ecosystem
Aviva has a massive, 15-year strategic partnership with Tata Consultancy Services (TCS) to manage over 6.5 million policies.22
- The Conduit: TCS utilizes its TCS BaNCS platform for insurance administration. TCS is a known partner of the Israeli fintech ecosystem.
- Embedded Tech: Integrators like TCS often “bake in” security and operational tools into their managed services. The widespread use of Check Point and CyberArk within TCS’s own service delivery models means that even when Aviva outsources to an Indian firm, the underlying security controls often remain Israeli. The partnership with TCS does not insulate Aviva from the “Unit 8200” stack; it standardizes it at scale.
5.2 Cloud Sovereignty and Project Nimbus
Aviva utilizes Amazon Web Services (AWS) and Microsoft Azure for its core computing and machine learning workloads.24
- The Nimbus Context: Project Nimbus is the $1.2 billion contract awarded to Google and AWS to provide cloud services to the Israeli government and military.
- Sovereignty Risk: While Aviva’s data likely resides in UK or EU regions (e.g., London or Dublin), the software stack securing that data (Wiz, Check Point) and the cloud platforms themselves (AWS/Azure) are part of the Nimbus ecosystem.
- The Wiz Factor: The most direct sovereignty risk comes from Wiz. As detailed in Section 2.2, Wiz scans Aviva’s cloud estate via API. This means the metadata of Aviva’s UK insurance infrastructure is processed by a platform developed and maintained in Tel Aviv. In a geopolitical crisis, the “sovereignty” of Aviva’s data is compromised by the reliance on foreign-origin security overlays that have deep visibility into the cloud architecture.
6. Financial Entanglement: Aviva Investors & Ventures
A technographic audit must also account for the flow of capital. Aviva is not just a consumer of technology; it is a massive institutional investor.
6.1 Direct Equity in the Defense Industrial Base
Analysis of Aviva Investors’ fund reports reveals direct, confirmed holdings in companies central to the Israeli defense and occupation infrastructure.11
- Elbit Systems: Aviva holds stock in Elbit Systems, Israel’s largest private defense contractor. Elbit manufactures the Hermes 450 and 900 drones used extensively in surveillance and combat operations in Gaza and the West Bank. This is the most direct form of financial complicity.
- Bankholdings: Aviva holds shares in Israel Discount Bank and First International Bank of Israel. These institutions are frequently cited for providing financial services to settlement construction projects in the West Bank.
- Infrastructure: Holdings in Enlight Renewable Energy and Energix connect Aviva to energy projects that often operate in the Golan Heights and West Bank, raising questions about complicity in the exploitation of resources in disputed territories.
6.2 Aviva Ventures: The Scout Network
Aviva Ventures, the corporate venture capital arm, plays a strategic role in sourcing innovation.
- The Mandate: Aviva Ventures has an explicit remit that includes Israel as a key geography. Snippets confirm an “extensive startup partnership programme… including Israel”.26
- Leadership Alignment: Ben Luckett, Aviva’s Chief Innovation Officer, has publicly stated, “We’ve been talking to a start-up in Israel…” regarding risk management technology.27
- Founders Factory: Aviva’s partnership with the Founders Factory accelerator/incubator 26 provides a pipeline for startups. Founders Factory operates globally and actively scouts Israeli talent, effectively serving as a feeder system for Aviva’s procurement.
7. Academic and Soft Power Influence
The audit detected subtle but significant links between Aviva’s data science leadership and Israeli academia, highlighting a “Soft Power” dimension to the complicity.
7.1 Aviva Quantum and Tel Aviv University
Aviva Quantum is the insurer’s elite data science practice.
- Intellectual Exchange: Records show Simon Warsop (Life Analytics Director at Aviva Quantum) and other Aviva data scientists attending research seminars featuring prominent Israeli academics like Moshe Goldstein and Tali Basha from Tel Aviv University.28
- Dual-Use Research: Tel Aviv University is a major hub for dual-use research (technologies with both civilian and military applications), particularly in AI, cryptography, and ballistics.
- Significance: While attending a seminar is not a commercial contract, it indicates that Aviva’s intellectual “brain trust” operates within an academic sphere heavily influenced by Israeli research. This intellectual proximity fosters a culture where Israeli algorithms are viewed as the “gold standard,” predisposing the organization to procure Israeli commercial solutions (like Verint and BioCatch) that emerge from these same academic/military circles.
8. Digital Complicity Score (DCS) & Risk Assessment
The Digital Complicity Score (DCS) is a weighted metric assessing the depth of entanglement.
| Dimension |
Weight |
Findings Summary |
Score (1-10) |
| Infrastructure |
40% |
Critical reliance on Check Point, Wiz, CyberArk. Removal would cause operational failure. |
9.5 |
| Surveillance |
30% |
Mass deployment of Verint & BioCatch. Industrialized profiling of “vulnerable” customers. |
9.0 |
| Financial |
20% |
Direct equity in Elbit Systems & Banks. Strategic backing of Lemonade. |
8.0 |
| Ideological |
10% |
Ventures scouting in Israel. Academic proximity via Aviva Quantum. |
7.5 |
Aggregate DCS: 8.9 / 10 (Critical Entanglement)
8.1 Gap Analysis & Missing Intelligence
- Claroty Confirmation: While the CISO link is established 17, definitive evidence of Claroty deployment in Aviva’s industrial insurance book is pending. Confirmation would push the Infrastructure score to 10/10.
- Retail Tech: No direct evidence of Trigo/AnyVision deployment. Intelligence suggests this vector is active only through indirect real estate investments (Fattal Holdings), not operational use.
8.2 Conclusion
Aviva plc is systemically entangled with the Israeli technology ecosystem. This relationship transcends standard vendor management; it is a structural dependency. The “Unit 8200” stack secures the perimeter, the cloud, the endpoint, and the privileged access credentials. Israeli surveillance tech monitors the customer voice. Israeli defense firms sit in the investment portfolio.
For the Cyber-Intelligence Analyst, the conclusion is clear: Aviva plc’s “Project Future” is built on Israeli foundations. Any attempt to target or boycott Aviva based on this complicity must reckon with the fact that these technologies are not merely “add-ons” but the very immune system of the corporation.
Section 9: Tables of Evidence
Table 2: Confirmed Israeli Technology Assets
| Technology |
Origin |
Role in Aviva |
Source ID |
| Check Point |
Unit 8200 |
Firewall / Cloud Security |
1 |
| Wiz |
Unit 8200 |
Cloud Visibility (CNAPP) |
5 |
| CyberArk |
Unit 8200 |
Privileged Access (PAM) |
4 |
| SentinelOne |
Unit 8200 |
Endpoint Security (EDR) |
16 |
| Verint |
Intelligence Corps |
Speech Analytics |
6 |
| BioCatch |
Unit 8200 |
Behavioral Biometrics |
8 |
| Lemonade |
Israeli Founders |
Reinsurance Partner |
10 |
Table 3: Confirmed Financial Holdings (Aviva Investors)
| Entity |
Sector |
Complicity Context |
Source ID |
| Elbit Systems |
Defense |
Drone/Weapons Manufacturer |
11 |
| Israel Discount Bank |
Finance |
Settlement Financing |
11 |
| First Intl Bank of Israel |
Finance |
Settlement Financing |
11 |
| Enlight Renewable Energy |
Infrastructure |
Energy projects in disputed territories |
11 |
| ICL Group |
Industrial |
Dead Sea resource extraction |
11 |
- Check Point Enters Next Level of Strategic Partnership with Wiz to Deliver Integrated CNAPP and Cloud Network Security Solution, accessed on January 29, 2026, https://www.checkpoint.com/press-releases/check-point-enters-next-level-of-strategic-partnership-with-wiz-to-deliver-integrated-cnapp-and-cloud-network-security-solution/
- CyberArk and SentinelOne Team Up to Enable Step Change in Endpoint and Identity Security, accessed on January 29, 2026, https://www.cyberark.com/press/cyberark-and-sentinelone-team-up-to-enable-step-change-in-endpoint-and-identity-security/
- CyberArk and Wiz Team Up To Provide Complete Visibility and Control for Cloud-Created Identities, accessed on January 29, 2026, https://www.cyberark.com/press/cyberark-and-wiz-team-up-to-provide-complete-visibility-and-control-for-cloud-created-identities/
- Cyber-Ark Posts Record 2008 and Achieves Major Milestone with 500th Customer Win, accessed on January 29, 2026, https://investors.cyberark.com/news/news-details/2009/Cyber-Ark-Posts-Record-2008-and-Achieves-Major-Milestone-with-500th-Customer-Win/default.aspx
- Senior Security Engineer – London – Indeed.com, accessed on January 29, 2026, https://uk.indeed.com/viewjob?jk=8fe15e839e87bfcb
- Aviva Life Reimagines Vulnerable Customer Experience with Verint Speech Analytics, accessed on January 29, 2026, https://www.verint.com/case-studies/aviva-life-reimagines-vulnerable-customer-experience-with-verint-speech-analytics/
- BioCatch – Behavioral Biometrics to Prevent Fraud & Build Trust, accessed on January 29, 2026, https://www.biocatch.com/
- Datos Impact Awards Recipients | Datos Insights, accessed on January 29, 2026, https://datos-insights.com/resources/awards/recipients/
- Aviva Life Reimagines Vulnerable Customer Experience with Verint Speech Analytics, accessed on January 29, 2026, https://www.verint.com/wp-content/uploads/English_EMEA_UnitedKingdom_Aviva_CustomerCaseStudy.pdf
- Lemonade launches in UK, partners with Aviva | OurCrowd, accessed on January 29, 2026, https://www.ourcrowd.com/startup-news/lemonade-launches-in-uk-partners-with-aviva
- Interim Report and Financial Statements – AVIVA INVESTORS INVESTMENT FUNDS ICVC, accessed on January 29, 2026, https://static.aviva.io/content/dam/aviva-investors/main/assets/capabilities/reports-and-financial-statements/aviva-investors-investment-funds-icvc/long-reports-and-financial-statements/aviva-investors-investment-funds-intrim-150425-lf.pdf
- Annual Report and Accounts 2022 – Aviva plc, accessed on January 29, 2026, https://static.aviva.io/content/dam/aviva-corporate/documents/investors/pdfs/reports/2022/aviva-plc-annual-report-and-accounts-2022.pdf
- Cloud Security Pre-Sales Consultant – AWS, Azure – Adecco – Job City of London, accessed on January 29, 2026, https://uk.talent.com/view?id=8163b696d5be
- Cyber-Ark Posts Record 2008 and Achieves Major Milestone with 500th Customer Win, accessed on January 29, 2026, https://www.cyberark.com/press/cyber-ark-posts-record-2008-achieves-major-milestone-500th-customer-win/
- Events – Page 4 – Vancouver Chapter, accessed on January 29, 2026, https://infosecbc.org/events/page/4/
- Senior Strategic Sales Development Representative @ Hyperexponential – Teal, accessed on January 29, 2026, https://www.tealhq.com/job/senior-strategic-sales-development-representative_b7a14223-b348-4006-bf4c-c4878410158e
- The Most Influential Women in Cybersecurity, accessed on January 29, 2026, https://www.cybersecuritydivas.com/cybersecurity-divas/
- Aviva Increases NPS by 85% and Improves Compliance Using Verint Speech Analytics, accessed on January 29, 2026, https://www.verint.com/case-studies/aviva-increases-nps-and-improves-compliance-using-verint-speech-analytics/
- Top 7 Tips for Effective FinTech App Security Design in 2025, accessed on January 29, 2026, https://procreator.design/blog/top-tips-for-fintech-app-security-design/
- Lemonade enters the UK market in partnership with Aviva | Insurtech Insights, accessed on January 29, 2026, https://www.insurtechinsights.com/lemonade-enters-the-uk-market-in-partnership-with-aviva/
- Lemonade Expands Home Insurance Offering in the UK – Business Wire, accessed on January 29, 2026, https://www.businesswire.com/news/home/20240716830683/en/Lemonade-Expands-Home-Insurance-Offering-in-the-UK
- TCS Expands Aviva UK Partnership, Manages 6.5M Policies – ScanX, accessed on January 29, 2026, https://scanx.trade/stock-market-news/orders-deals/tcs-expands-partnership-with-aviva-uk-to-manage-over-6-5-million-policies/27596042
- TCS announces 15 year deal extension with UK based insurance major Aviva, accessed on January 29, 2026, https://www.businesstoday.in/latest/corporate/story/tcs-announces-15-year-deal-extension-with-uk-based-insurance-major-aviva-415426-2024-01-30
- Our Teams – Aviva plc, accessed on January 29, 2026, https://www.aviva.com/careers/job-search/aviva-services-excellence-centre-poland/our-teams/
- Aviva_Case_Study_Final.docx – Microsoft Download Center, accessed on January 29, 2026, https://download.microsoft.com/documents/customerevidence/Files/710000002635/Aviva_Case_Study_Final.docx
- Aviva & Founders Factory announce support for the first five fintech start-ups and launch tech business to revolutionise social care, accessed on January 29, 2026, https://www.aviva.com/newsroom/news-releases/2017/07/aviva-founders-factory-announce-support-for-the-first-five-fintech-start-ups-and-launch-tech-business-to-revolutionise-social-care-17799/
- Aviva’s Ben Luckett: risk management is where some of the most exciting technologies reside – InsuranceERM, accessed on January 29, 2026, https://www.insuranceerm.com/analysis/avivas-ben-luckett-risk-management-is-where-some-of-the-most-exciting-technologies-reside.html
- talks.cam : Your personal list – University of Cambridge, accessed on January 29, 2026, http://talks.cam.ac.uk/show/archive/9844
- yk373’s list – talks.cam, accessed on January 29, 2026, https://talks.cam.ac.uk/show/archive/107347
- CamTalks – talks.cam, accessed on January 29, 2026, https://talks.cam.ac.uk/show/archive/23088