Network - Family Learning

Bob Courtemanche, Risk Strategies Company
Tuesday, July 23, 2019

Posting fabulous vacation moments on Facebook—from a boat in Belize, to the top of a mountain in Chamonix—might be a fun way to share experiences with your friends, but it’s also a great way to let bad actors know your home is empty and ripe for a break-in.

Addressing the Complexities of Communication and Family Learning

Jul 17 2019 -

body[und][0][value]),'600',TRUE,TRUE); ?> Read more »

Ascent Private Capital Management
Thursday, July 11, 2019

Families that have accumulated significant assets want to know how to best prepare the rising generation to help them maximize the benefits available to them, while also minimizing the unique challenges that occur when navigating the world of wealth.

Northern Trust
Wednesday, July 10, 2019

Talking about wealth is every bit as important as creating a technical wealth plan—if not more so.

Northern Trust
Wednesday, July 3, 2019

Wealthy families usually have extensive shared assets that are designed to grow and be passed down through multiple generations. As the family enterprise grows (family business and/or the family’s other shared wealth), so does the need to enhance the family’s ability to work together.

National Center for Family Philanthropy
Wednesday, May 22, 2019

A board chair is perhaps the most important and meaningful job in any family foundation. If you are currently chair—or anticipate that you will be someday—you may find it’s one of the most rewarding roles you will ever have.

National Center for Family Philanthropy
Monday, May 13, 2019

National Center for Family Philanthropy recently spoke with Bill Leighty about how he’s helped keep the Leighty Foundation’s memories alive by recording its history.

Colin Taggart and Raj Patel, Plante Moran
Thursday, May 9, 2019

Cybersecurity is a risk for children and adults alike. Learn how to protect your family from identity theft and cyberattacks at home and while traveling. If you know what to look for, you can dramatically reduce the risk of a cyberattack.