Over the last 15 years wealth management firms have taken varied approaches to implementing technology within their organization, each aiming to satisfy a unique set of needs and requirements. With technology evolving and teams requiring more firepower from their applications, firms are left in a quagmire, wondering what the best approach is for adopting technology: if they should build, license (from single or multiple vendors), outsource or some combination.
Resource Search
In this session we will have a case study that addresses the journey that a family office undertook to assess and address the risk associated with its technology—from early third party assessments to strategy formulation to board approval and finally implementation. Along the way we will share how some time-honored strategies were discarded and a partnership with the clients on security was created.
In response to an ever-growing number of malicious and costly cyber-attacks on U.S. companies, both the Cybersecurity Unit of the Computer Crime and Intellectual Property Section of the U.S. Department of Justice and the Division of Investment Management of the Securities and Exchange Commission recently published reports providing guidance on how private sector companies—both large and small—can minimize the risk of a cyber-attack as well as the resulting harm should an attack occur.
You have undoubtedly heard the horror stories: missed deadlines, shoddy work, cut-corners, items gone missing, and contractors walking off the job, just to name a few. Whether you are remodeling your home or building a new one, hiring the right person to head up your construction project is critical to a job well done. If you are planning to hire a contractor for your latest remodeling project, this article provides a number of things to consider.
Many people think of home care as something that applies only to frail elders; however, at least 65% of people who require home care receive this care after being discharged from an inpatient hospital stay. Home care recipients can be people of any age who are suffering from a chronic or an acute disease, as well as people who are injured or who have ha
With an estimated 82,000 variations of viruses and malware released every day by hackers, how can you keep your client data secure? There is no room for complacency when it comes to the security of your client data, yet it is easy to become apathetic when nearly every day another cybersecurity breach is reported. This article provides several helpful guidelines to protect your office network.
Not long ago, we were more protective of our privacy. Following the advent of e-commerce, all that has changed. Today, we don't think twice about buying something online with our credit card or entering our personal information without giving a thought to who has access to this personal and financial information.
One issue aircraft operators face, which is arcane on the surface but has enormous safety and cost ramifications, is the authorization required from the Federal Aviation Administration (FAA) to fly in what is known as Reduced Vertical Separation Minimum (RVSM) airspace – the airspace between 28,000 feet and 41,000 feet. This authorization is important because these are typically the altitudes where jet aircraft are the most fuel efficient.
While it’s tempting to focus only on federal tax issues when buying a personal or business-use aircraft, state taxes need to be considered as well, because many states impose various types of sales, use and property taxes that can be significant. And many states are becoming much more aggressive in tracking down these aircraft in order to assert those taxes against the owners.