Networks - Data Security/Technology

Dennis Bagley and Dave Plomin, Plante Moran
Thursday, February 8, 2018

You’ve made the right moves in your operating business—you’ve developed and executed your IT plan and upgraded your ERP, EAM, and CRM systems to improve efficiencies and gain new insights.

PwC Private Company Services
Tuesday, February 6, 2018

The future. It’s the topic on the mind of most business leaders—what’s going to happen in the future? And importantly, how do you ensure you’re prepared for it?

PwC Private Company Services
Tuesday, February 6, 2018

Artificial intelligence (AI) is advancing quickly, and it’s impossible for anyone to give a precise vision of how the next ten—much less five—years will unfold.

Overview

The FOX Financial Executives Forum now has a new name: The FOX Family Office Forum.
 
Anyone who has attended recently knows that the scope of the conference expanded beyond only financial executives long ago. The topics and the peer network now include CEOs, HR managers, technology heads, as well as financial executives. Our new name clarifies that this is a gathering for all family office executives.
 
Raj Patel and Jennifer Fiebelkorn, Plante Moran
Wednesday, January 3, 2018

Due diligence often focuses heavily on financial and operational issues. Often the new or combined organization’s cybersecurity does not receive the attention it deserves.

Eileen Kamerick and Mark Trembacki, Directors & Boards
Wednesday, November 29, 2017

Cyber risk has moved from the IT department to a full-fledged enterprise risk. Unfortunately, a cyberattack can hit a company at any time.

Cory Lunn, CISA, IT Assurance Manager – Wolf & Company, P.C.
Wednesday, November 15, 2017

You’ve taken great efforts to enhance the technology security at your organization.  Unfortunately, security concerns don’t end with a firewall and anti-virus software.  Hackers are employing Social Engineering, where your people – not your systems – are the targets.

Sage Intacct
Wednesday, October 4, 2017

Financial reports and other real-time operational data are often lagging indicators of performance.

Lisa Mays, Sheppard Mullin Richter & Hampton
Tuesday, October 3, 2017

For American companies who do business in Europe or who process the personal data of EU residents, the world of data privacy and security is about to get much more complicated. While U.S.

Nick Jesi, Wolf & Company, P.C.
Thursday, September 28, 2017

Vulnerability assessments and penetration testing may uncover areas where hackers can break in, but what if they are already there? Cyber Hunting is a proactive strategy to identify if anyone is already on your network versus waiting for an actual breach to occur.