FOX Technology Resource Partners act as both core and peripheral services and solutions for the community and membership including families, family offices, operating companies, and advisor organizations. FOX hosts a monthly meeting comprised of different thought leader specialists whose focus is in the areas of technology including software, data ...
We have the answers
Search Results
Meeting client needs has always been core to family offices and financial institutions serving ultra-high-net-worth families. But what if you could augment your operations to better serve your end-clients? Join SEI for an open dialogue that focuses on how leveraging technology, human connection, and scalable processes can help enhance the client ex...
Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Addepar’s Head of Research Ashby Monk and Head of Research Analytics Dan Golosovker are part of a larger team at Addepar dedicated to improving client investment and financial decision-making through data, analytics and technology. In this session, you’ll learn how family offices increasingly rely on our technology and data today to proactively man...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
Forging a close relationship among siblings during childhood is hard enough, but as siblings become adults, the development of disparities in wealth can challenge even the strongest relationships. In business-owning families, the potential ramifications not only affect the personal lives of the immediate family, it can also disrupt the alignment of...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
Potential drains on business efficiency include groups of remote workers unable to communicate well with one another, tools that make it hard to adapt to changes or new needs, and the high cost of equipment and IT personnel. Integrating cloud-based solutions address these areas, including better workflow and collaboration and document management. I...
If you find your family office or growing business suffering from a lack of support in the technology department, then you may benefit from outsourcing IT. While some struggle to find room in the budget to add support staff, there are others continually adding staff only to realize they are unable to keep up with demand. An alternative to those iss...
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Bu...