hands typing on computer

CLAIMS

Claims Service and Expertise

When you need to make a claim, you want to work with experts who understand your loss and what to do. That’s why at Great American, our claims professionals specialize in the markets they serve. We'll pair you with claims professionals who have deep industry experience and understand your organization’s specific needs.

What do I need to report a claim?

  1. Your Name

  2. Your contact information (address, phone number and email)

  3. Your connection to the claim (For example, are you the policyholder, the agent, an injured party or a witness?)

  4. A Great American policy number (as available)

  5. The type of loss – auto, property, workers comp, general liability

  6. Details of what happened

Report a claim

Other Contacts

Workers' Compensation Claims

Electronic Billing Information

Medical providers can submit bills directly through the Data Dimensions electronic billing system. If you have questions, contact Data Dimensions.

Claims Payments Via Electronic Funds Transfer

To receive Workers' Compensation claims payments electronically, complete this form, and email or mail it to our offices (as noted on the form).

Not sure where to go?

If you're not sure how to proceed, contact our Call Center team.

844 GAIG NOW (844-424-4669)
Option 1: new claims
Option 2: existing claims.

Please call during our regular business hours of 8:00 a.m.-5:00 p.m. Eastern.

Additional Resources

Our claims professionals specialize in the markets they serve.

NIST CSF 2.0: The National Standard for Cybersecurity

Oct 15, 2025, 10:10 AM
The NIST CSF 2.0 is the updated national framework for cybersecurity. With six core functions and a governance-first approach, it helps organizations strengthen resilience, reduce risk and align with evolving threats across industries.
The NIST CSF 2.0 is the updated national framework for cybersecurity. With six core functions and a governance-first approach, it helps organizations strengthen resilience, reduce risk and align with evolving threats across industries.
The NIST CSF 2.0 is the updated national framework for cybersecurity. With six core functions and a governance-first approach, it helps organizations strengthen resilience, reduce risk and align with evolving threats across industries.
Author : Great American Insurance Group
Social media title : NIST CSF 2.0: The National Standard for Cybersecurity - Loss Control - Great American Insurance Group
Open graph title : NIST CSF 2.0: The National Standard for Cybersecurity - Loss Control - Great American Insurance Group
Meta Title : NIST CSF 2.0: The National Standard for Cybersecurity
Published Date : Aug 12, 2025, 15:00 PM

The NIST Cybersecurity Framework (CSF), developed by the U.S. National Institute of Standards and Technology was first released in 2014 to help critical infrastructure organizations manage cybersecurity risk. The CSF marked a turning point in cybersecurity by offering a scalable, adaptable model. It has helped organizations shift from reactive to proactive strategies and is now considered the gold standard in cybersecurity frameworks worldwide. 

Since then, it has become a globally recognized standard across industries. In 2024, NIST released version 2.0 to reflect broader adoption and evolving threats.

What Is the NIST Cybersecurity Framework?

The CSF is a voluntary, flexible guide designed to help organizations of all sizes and sectors manage and reduce cybersecurity risk. It’s not a checklist or a rigid set of rules, it’s a customizable framework that aligns with your organization’s maturity, resources, and risk tolerance.

What’s New in NIST CSF 2.0?

Version 2.0 introduces six core functions that represent the lifecycle of cybersecurity risk management:

1. Identify

Understand your assets, systems, data, and risks.

  • Document hardware, software, data, and personnel assets.
  • Classify data and systems by sensitivity and operational importance.
  • Map core business processes and dependencies.
  • Conduct regular vulnerability scans and penetration tests (best practice: rotate vendors periodically).
  • Run tabletop exercises and post-incident reviews.

2. Protect

Implement safeguards to ensure delivery of critical services.

  • Define access controls based on data classification.
  • Enforce password policies and multifactor authentication.
  • Encrypt sensitive data at rest and in transit.
  • Train staff on security awareness and phishing (at least annually).
  • Apply endpoint protection, firewalls, and web application firewalls (WAFs).

3. Detect

Develop activities to identify cybersecurity events.

  • Establish baselines for normal network behavior.
  • Use SIEM tools to monitor traffic and logs for anomalies.

4. Respond

Take action when a cybersecurity incident occurs.

  • Develop and regularly test an incident response plan (IRP).
  • Coordinate with legal, compliance, and insurance teams during incidents.

5. Recover

Restore capabilities and services after an incident.

  • Validate system integrity and data restoration.
  • Communicate with stakeholders throughout recovery.
  • Update policies and controls based on lessons learned.

6. Govern (New in 2.0)

Establish oversight and monitor your cybersecurity approach.

  • Define roles and responsibilities across the organization.
  • Align practices with legal, regulatory, and industry standards.
  • Monitor the effectiveness of each function and adapt as needed.
  • Ensure policies support both risk reduction and business goals.
  • Include cyber insurance as part of your risk transfer strategy.
  • Oversee supply chain risk and hold third parties accountable.

These functions are designed to work together—not in isolation—to create a holistic cybersecurity posture.

How to Use the Framework

Here’s a simple roadmap to begin aligning your organization with the CSF:

  1. Assess Your Current State
    Start with the Identify function. Document your current cybersecurity practices across all six functions.
  2. Define Your Target State
    Determine what “good” looks like for your organization based on your size, industry, and risk profile.
  3. Identify Gaps and Prioritize
    Compare your current and target states. Prioritize improvements based on impact and feasibility.
  4. Develop an Action Plan
    Create a roadmap with milestones, assign responsibilities and secure leadership support.
  5. Implement and Monitor
    Execute your plan, monitor progress, and adjust as needed. Keep leadership informed to maintain alignment and support.
Categories :
  • Cyber Security
Tags :
Divisions :
  • Cyber Risk
  • Loss Control
Person typing on a laptop with a digital overlay of a padlocked shield, symbolizing cybersecurity and data protection.