Role definition and preparation is a common challenge for families looking to integrate rising family members into the enterprise. Solving this challenge leads to higher rising gen participation and increased in-law engagement within the family. Using competency-based assessments, families can predict the success of family members in specific roles...
We have the answers
Search Results
Oftentimes, families struggle with a sense of fear and lack the clarity needed to address complexities of navigating change and growth. In this session, participants will learn an easy-to-implement framework on how to develop a greater sense of positive influence within the family system. Through an experiential learning process, you will gain conf...
Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
Originating in English common law, trusts have been used for centuries to manage holdings of the wealthy. Even though trusts are quite common, many people may find them hard to understand. Having an introduction to the trust basics is a good place to begin and learn how trusts are used in wealth management plans to help provide financial support fo...
A common question that a family often asks prior to building a family office is “What is a family office anyway and does my family actually need one?” The answer depends on the family’s goals, as well as understanding the four different types of family offices that are commonly used: (1) single family office, (2) family business office, (3) family ...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
Dr. Alexander Koeberle-Schmid, family business expert at PwC, has helped more than 100 entrepreneurial families from around the world navigate the complexities of communal investing. In this episode of The Family Business Voice podcast, Koeberle-Schmid speaks to Ramia M. El Agamy about the three fundamental requirements of a family office and the f...
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
Historically, beneficiaries learned of wealth transfer plans only after the death of the grantor. However, this approach often leads to unanswered questions and, potentially, feelings of betrayal when expectations for future gifts are left unmet. There are several planning tools, including a Statement of Wealth Transfer (SOWTI), that can facilitate...
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Bu...