Family office executives are always looking for ways to improve their financial reporting packages and their client relationships. In response to member requests, FOX organized a Best Practice Reporting Workshop in April 2010. Twenty members of FOX’s Financial Executives Network gathered in Chicago to learn about how one’s learning style impa...
We have the answers
Search Results
A growing number of families use social networking sites to stay connected and share personal and business information. For ultra-wealthy families, however, the risks involved with public websites can be significant. In this 2010 FOX Financial Executives Forum session, Mr. Thijssen reviews how advancements in technology make the creation of a famil...
You don’t want to miss this 2009 FOX Fall Forum session to learn how a private trust company structure can significantly increase the odds of a family implementing its transitional strategic plan through effective governance. The session will deliver valuable information on U.S. private trust company structures and cross-border private trust s...
Affluent individuals and families are increasingly becoming targets of criminal activity, such as stalking, kidnapping, theft, harm and vandalism. Does your family use any wireless communication devices? Do you regularly check for spyware on your computers? How do you dispose of sensitive information? These are just some of the potential vulnerabil...
The key to any successfully operated wealth management organization depends on having the right talent in the right role. This 2010 FOX Fall Forum session includes a discussion of findings from recent FOX research that focuses on critical talent issues, such as recruiting, compensation and team structure. In addition, a family office executive will...
Compensation and benefits often represent more than 50% of expenses for multifamily offices and wealth advisor firms. In this presentation from the 2009 FOX Wealth Advisor Forum, you will learn the best ways that firms can source talent and structure short and long-term compensation to ensure staff continuity and firm profitability.
Find out what new products are available to family office executives to better respond to the needs of increasingly complex offices. in this 2009 Financial Executives Forum presentation, discover ways to more effectively utilize existing technology to improve business processes needed to fulfill the functions of a family office.
Avoid the pitfalls presented by employing domestic staff with practical advice from Teresa Leigh, founder of Teresa Leigh Household and Property Management in this 2009 FOX Financial Executives Forum session.
In this 2009 FOX Fall Forum presentation, Ellen Perry outlines four ways in which families of significant wealth can enhance their human capital, developing the skills and talents of the younger generation, strengthening family ties and enabling individual members and families as a whole to flourish for multiple generations.
So, you need to hire someone to work at your home—a housekeeper, a chef, or a personal assistant. You have decided not to contract these services to a local company, and your family office does not hire staff for you. It is up to you to fill this position. Before letting a stranger into your home, it is important to understand the domestic em...
In the last few years, hackers and cyber criminals have become much more sophisticated in how they steal private information, which has led to massive data breaches. These data breaches not only cost an organization hundreds of thousands of dollars in fixes and possible fines, they can ruin a long-established reputation in a matter of hours. Puttin...
Bring Your Own Device (BYOD) policies are becoming more and more popular, and with good reason. As the capabilities of tablets and smartphones continue to rapidly expand, the mobility revolution has been a boon for businesses and employees alike, enabling greater productivity and more flexibility. BYOD amplifies those efficiency gains, reducing adm...
Vulnerability assessments and penetration testing may uncover areas where hackers can break in, but what if they are already there? Cyber Hunting is a proactive strategy to identify if anyone is already on your network versus waiting for an actual breach to occur. Most breaches occur weeks or even months after the attacker gets a foothold on the ne...
For American companies who do business in Europe or who process the personal data of EU residents, the world of data privacy and security is about to get much more complicated. While U.S. privacy law is unsettled, with rapidly proliferating state and federal laws and regulations and uncertainty as to how strictly they will be enforced, the rules in...
Financial reports and other real-time operational data are often lagging indicators of performance. These metrics, although perhaps lacking precision, may have been sufficiently effective in the past; however, they are less so now because they lag the current cadence of information dissemination and business volatility today. The challenge for many...