FOX Technology Resource Partners act as both core and peripheral services and solutions for the community and membership including families, family offices, operating companies, and advisor organizations. FOX hosts a monthly meeting comprised of different thought leader specialists whose focus is in the areas of technology including software, data ...
We have the answers
Search Results
Wealth advisors continue to experience rapid growth, which on its face is positive – but firms can get into trouble if growth is not properly managed. Join a panel of experienced wealth advisors explaining the ins and outs of effectively managing growth. Topics discussed include identifying the right clients for your business, creating efficiencies...
Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Burdened by manual, routine, and inefficient processes, your high-value employees are left doing low-value work. Not because they are poor performers; ironically, quite the opposite is true— they are extremely efficient at executing inefficient processes. But, what would their output be if you were to streamline and automate these processes? Imagin...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
While there are many items family offices should look for in technology solutions, one vital component is reporting capabilities. For family offices considering a move to Sage Intacct, there are five reporting advantages you can count on to help deliver the data and transparency that are important to the family members.
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Third-party vendors can range from custodial companies, to IT services, to professional service firms. Whatever their contracted function, they have access to your physical premises and/or your network data. So how can you make sure that when you’re signing a contract with an outside vendor, you’re not exposing yourself and your clients to excessiv...
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
From Australia to United States and many places in between, this Global Employer Guide reflects an easy-to-read summary of employment law that changed in each country over the past year, including pandemic-related changes where applicable. Visa processes, employee rights, contract requirements, transfer of business considerations, privacy standards...
Families hire family office staff with the expectation that the office keeps their information, assets, and reputation protected. To safeguard the families’ interests, it’s critical for family offices to ensure that internal controls take the pragmatic approach, starting with four main areas: segregation of duties, transaction volume, managing comp...