The Corporate Transparency Act Final Rule took effect on January 1, 2024. Hear the latest in terms of implementation of CTA and what other family offices are doing in order to gear up to comply with their initial BOI report obligations. Also, you will have the opportunity to get your questions answered and more during the presentation. The discu...
We have the answers
Search Results
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
This study by Crystal & Co is based on a survey of family enterprises and focused on how families think about certain areas of risk. One finding of the study reveals a significant disconnect between the strategic risk management planning conducted by family enterprise executives and the inclusion of the family itself. Overall, th...
There are few issues in family business that create more conflict and tension than the employment of family members. The complexities involved and the breakdowns in communication and trust can contribute significantly to the alarmingly high rate of failed intergenerational transitions in family business. The good news is that there is a way for fam...
Families of wealth and business-owning families face security risks in their everyday lives, where personal and business risks are often blended and are typically managed by different people and processes. This creates a gap in identifying risks and solutions that can be addressed through a holistic and collaborative risk management approach. With ...
Black swan events—like the 2008 financial crisis and the COVID pandemic—often come with high velocity and are slow to recover. While these events are difficult to predict, the best way to get ready for the next crisis is with extreme preparation. Looking ahead with intentional risk management, here are 8 ways to prepare your business, family enterp...
Cybercriminals have migrated their attacks from larger businesses and hardened targets to private wealth clients and family offices, where the defenses are low or non-existent. In this webcast, hear from Dr. Chris Pierson, CEO of BLACKCLOAK, a Concierge Cybersecurity & Privacy Protection Platform that represents private wealth and family office...
Each family’s legacy is as unique as the family itself. It can be a bloodline, a name, heirlooms, a legal entity or family stories, myths, and artifacts. In this fourth and final report in the series on family business succession, key insights are shared on the important role that legacies play in uniting the core purpose of the business with the f...
Cyberattacks are impossible to completely prevent and the consequences of a data breach can be devastating. In addition to information and finances lost, breaches can result in downtime and reputational damage that can set your company far behind competitors. If your organization has experienced a cyberattack, there are three things that can b...
As family offices expand their technology footprint, cyberattacks are rising. Hackers continue to refine their approaches, but security controls and proactive planning can strengthen your family office cybersecurity defenses. Initially, focus on the key action items to validate your existing security setup and inform your plans to address any short...
Wealthy families have always faced complex risk management issues, but it is particularly challenging when facing soaring inflation, regulatory uncertainty, rising cybercrime rates, and increasingly severe natural disasters. These market stressors impact all sectors of the insurance market, making it more expensive and challenging for affluent fami...
Consistently revisiting potential liquidity risk is important work for family investors, as many of these risks can lay silent for prolonged periods and become easy to overlook. In fact, unexpected liquidity demands can undo a lot of hard work and, in a worst-case scenario, force a fire sale of assets. By carrying out regular liquidity risk analyse...
Many employers have begun using artificial intelligence (AI) tools supplied by third-party vendors. On May 18, 2023, the Equal Employment Opportunity Commission (EEOC) provided guidance indicating that, in its view, employers are generally liable for the outcomes of using selection tools to make employment decisions. Learn more about what tool...
The growing use of video and automated technology, including artificial intelligence (AI), in employment practices—and the concern that the technology may foster discrimination and bias—has triggered a wide array of regulatory efforts. At least 11 statutes have been introduced targeting the use of AI-related technology to assist with employment dec...
For leaders of founder-owned companies, simply making the decision to sell or bring in an outside investor can be anxiety inducing. The transaction process itself is often filled with apprehensive moments—arguably none more so than the potential of sensitive information leaking. This primer helps business owners understand how to avoid leaks, how t...