How do you know you are selecting the trustee that is best for your individual needs? What responsibilities does the beneficiary have? This 2009 FOX Fall Forum presentation outlines what it means to be an effective trustee and beneficiary, decision criteria for trustee selection, and the process and framework trustees and beneficiaries can emp...
We have the answers
Search Results
On September 7, Equifax, one of the three major credit agencies, announced that it had suffered a major data breach. Unidentified hackers exploited a vulnerability in the company’s website software to gain unauthorized access to company data from May through July, impacting as many as 143 million consumers. The incident is yet anoth...
Affluent individuals and families are increasingly becoming targets of criminal activity, such as stalking, kidnapping, theft, harm and vandalism. Does your family use any wireless communication devices? Do you regularly check for spyware on your computers? How do you dispose of sensitive information? These are just some of the potential vulnerabil...
In this 2009 FOX Wealth Advisor Forum presentation, hear from an accomplished branding and marketing expert who will discuss insights from his quantitative analysis of high-net-worth and ultra-high-net-worth behaviors. Dr. Taylor will address the way that the economic downturn and market volatility are affecting the investment strategies of ultra-w...
Anyone who has participated in the acquisition or sale of a company will recognize the typical path of a deal: from flirting to tough questions to hard bargaining to—finally—handshake. Inevitably, however, the road detours from the exhilaration of accord to the anxiety of suspicion. The buyer wants assurance that all the seller's pr...
Have we felt the impact of the economic crisis on the professional liability market? In this 2009 Financial Executives Forum, hear from Jim Kane, President, HUB Personal Insurance, and Tom Handler, Partner of Handler Thayer, LLP on trends, errors and omissions in professional liability coverage for directors, officers and trustees.
In this 2009 Financial Executives Forum presentation, Paul Viollis, CEO of Risk Control Strategies, leads a discussion of new and old threats to our personal safety. From terrorism to cyber security, Dr. Viollis weaves actual experiences into best practices for keeping you and your family secure.
In reaction to the volatility in the current financial markets and economic recession, FOX is exploring ways in which ultra-wealthy individuals and their advisors are adjusting their financial strategies and re-evaluating known and emerging risks. This 2009 FOX Financial Executives Forum presentation examines how investor thinking has changed and w...
More than ever before, families and individuals are creating trusts and limited liability companies and transferring legal ownership of one or more of their properties to these entities. Very often these arrangements are an important component of a family’s overall financial and wealth management strategy. But without an insurance program tha...
So, you need to hire someone to work at your home—a housekeeper, a chef, or a personal assistant. You have decided not to contract these services to a local company, and your family office does not hire staff for you. It is up to you to fill this position. Before letting a stranger into your home, it is important to understand the domestic em...
When it comes to placing a value on your fine art collection, it is important to understand and debunk the appraisal myths. It begins with correcting the myth that an appraisal is not needed when in fact it is crucial to establish and protect your valuable collection. Know the facts and guard yourself against the myths that could place your fine ar...
Lending or transporting your artwork is one of the most vulnerable times when you are susceptible to losses. When it comes to protecting your artwork against those losses, this checklist will help you understand the benefits of working with vendors that have the right level of experience and reputation to help you make an informed decision.
In the last few years, hackers and cyber criminals have become much more sophisticated in how they steal private information, which has led to massive data breaches. These data breaches not only cost an organization hundreds of thousands of dollars in fixes and possible fines, they can ruin a long-established reputation in a matter of hours. Puttin...
Bring Your Own Device (BYOD) policies are becoming more and more popular, and with good reason. As the capabilities of tablets and smartphones continue to rapidly expand, the mobility revolution has been a boon for businesses and employees alike, enabling greater productivity and more flexibility. BYOD amplifies those efficiency gains, reducing adm...
Vulnerability assessments and penetration testing may uncover areas where hackers can break in, but what if they are already there? Cyber Hunting is a proactive strategy to identify if anyone is already on your network versus waiting for an actual breach to occur. Most breaches occur weeks or even months after the attacker gets a foothold on the ne...