Join experts from Asset Consulting Group as they share why a small and nimble asset base allows managers to maintain their investment discipline and fully allocate to their highest conviction ideas. This session will help attendees understand how a focus on asset gathering can adversely impact a manager’s ability to add value over time, while capac...
We have the answers
Search Results
Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
The term “passion investments” has gained currency within the wealth management arena to describe high-end collectibles and other luxury possessions that hold emotional as well as financial value for their owners. When considering that this new asset class has generated noticeable returns, it’s no surprise that owners want to protect their high-val...
Flying privately has become increasingly popular for a variety of reasons, including convenience, security, and lifestyle, but there are several considerations in determining what usage and ownership structure is right for you. Like making a real estate investment, owning or leasing a plane poses many financial, tax, and regulatory issues, as well ...
When you’ve made the decision to protect a collection through insurance, you want to be sure that coverage amounts measure up to the value of your items. Determining proper values can be tricky, as so many variables impact a piece’s worth. Given the ever-changing market, values are in constant flux. That’s why professional appraisals are critical, ...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
When selecting an insurance advisor, make sure the person is part of the best-in-class group. Use this checklist to help pick the right one for you and your family.
Ultimately, how well your wealth transfer plan fulfills your legacy and meets the needs of the next—and future—generations depends on whom you name as your trustee(s). This makes your trustee selection one of the most critical aspects of an already complex wealth planning process. To help navigate this selection process, work with a framework built...
Aircraft ownership comes with an enormous cost and responsibility that may not support the investment, and more cost-effective alternatives could accomplish the same goals with fewer headaches. Before purchasing or leasing an aircraft, it is best to understand what options are available and how these options can be tailored to fit specific nee...
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Third-party vendors can range from custodial companies, to IT services, to professional service firms. Whatever their contracted function, they have access to your physical premises and/or your network data. So how can you make sure that when you’re signing a contract with an outside vendor, you’re not exposing yourself and your clients to excessiv...