Risk Management at FOX is focused on all aspects of risk for its membership including families, family offices, operating companies, and advisor organizations. FOX hosts a quarterly meeting comprised of different vendors and thought leader specialists whose focus is in the areas of Cybersecurity, Physical Security, Personal Security, Insurance, Gov...
We have the answers
Search Results
Join experts from Asset Consulting Group as they share why a small and nimble asset base allows managers to maintain their investment discipline and fully allocate to their highest conviction ideas. This session will help attendees understand how a focus on asset gathering can adversely impact a manager’s ability to add value over time, while capac...
Statistics show that teenagers are more likely than any other age group to be in an automobile accident. In several tragic incidents, the use of a cell phone was involved. Some accidents, however, simply reflected the teenagers’ lack of driving experience. As a parent, you can help your teenager become a safe and skilled driver by setting a good ex...
Families of wealth and business-owning families face security risks in their everyday lives, where personal and business risks are often blended and are typically managed by different people and processes. This creates a gap in identifying risks and solutions that can be addressed through a holistic and collaborative risk management approach. With ...
When you’ve made the decision to protect a collection through insurance, you want to be sure that coverage amounts measure up to the value of your items. Determining proper values can be tricky, as so many variables impact a piece’s worth. Given the ever-changing market, values are in constant flux. That’s why professional appraisals are critical, ...
Vulnerability and personal security risks can be greatly reduced by following five basic principles of security at all times—awareness, low profile, unpredictable routine, communication, and layers of security. Based on those principles, these guidelines are designed to give practical advice on safety and security to anybody who is living in or tra...
Lawsuit awards can be incredibly high, and individuals known to have substantial assets are particularly vulnerable. In some cases, the high-stake lawsuits can cause devastating reputational damage. Given the risks and exposure, the need for holistic liability protection is an important issue. Learn the different types of liability i...
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
When selecting an insurance advisor, make sure the person is part of the best-in-class group. Use this checklist to help pick the right one for you and your family.
Ultimately, how well your wealth transfer plan fulfills your legacy and meets the needs of the next—and future—generations depends on whom you name as your trustee(s). This makes your trustee selection one of the most critical aspects of an already complex wealth planning process. To help navigate this selection process, work with a framework built...
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
Third-party vendors can range from custodial companies, to IT services, to professional service firms. Whatever their contracted function, they have access to your physical premises and/or your network data. So how can you make sure that when you’re signing a contract with an outside vendor, you’re not exposing yourself and your clients to excessiv...
Going on the internet can put your devices and personal details at risk from unexpected online threats like malware and ransomware. Learn about the threats and see some internet safety tips to help keep your devices and data safe when you browse online.
Potential drains on business efficiency include groups of remote workers unable to communicate well with one another, tools that make it hard to adapt to changes or new needs, and the high cost of equipment and IT personnel. Integrating cloud-based solutions address these areas, including better workflow and collaboration and document management. I...
When evaluating and trying to find the right insurance advisor or company, it helps to have a map outlining the RFP process and a checklist of best practices. Learn where to start in your search and avoid getting the wrong results.