Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
We have the answers
Search Results
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
We invest a lot of time and energy figuring out the best way to pass wealth from one generation to the next. But how can anyone truly prepare for the practical realities of settling a family member’s estate while grieving and managing the impact of this loss on the family? This session will outline some of the things you can be thinking about now t...
Research indicates that multigenerational involvement is the single most important factor in sustaining family wealth into the third generation and beyond. Furthermore, the families that most successfully integrate younger members into their family operations seem to share the same philosophies and core values. It’s a family enterprise mindset that...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
As technological advances are disrupting and transforming companies in every sector, the traditional investing landscape is also being disrupted. Venture capital is at the core of the transformation and has become a critical component of a long-term investment strategy. With the potential for attractive returns and significant impact to society, ve...
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
Losing a loved one can be very difficult. Yet, as an executor, spouse, or family member, you need to take steps to ensure that your loved one's financial affairs are properly settled as part of the family’s end-of-life planning. To help with the process, this step-by-step guide outlines the key tasks, including selecting an executor, considering th...
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Bu...
Cyberattacks are impossible to completely prevent and the consequences of a data breach can be devastating. In addition to information and finances lost, breaches can result in downtime and reputational damage that can set your company far behind competitors. If your organization has experienced a cyberattack, there are three things that can b...
Many families are not aware of important legal issues that affect their 18 – 21-year-old children. Parents are often so focused on the fact that the drinking age is 21 that they do not realize that their 18-year-olds are, for most other purposes, adults in the eyes of the law. Parents no longer have the same access to information or control over th...