For the past 3 decades, the private wealth industry has been heavily focused on, and dominated by, highly technical disciplines, such as investment management, tax and accounting, and trust and estate planning, with solutions primarily serving the financial capital of enterprise families and the vision of prior generations. The qualitative needs an...
We have the answers
Search Results
Wealth advisors continue to experience rapid growth, which on its face is positive – but firms can get into trouble if growth is not properly managed. Join a panel of experienced wealth advisors explaining the ins and outs of effectively managing growth. Topics discussed include identifying the right clients for your business, creating efficiencies...
With 40-70% of people contemplating leaving their jobs, the challenge of retaining your top talent has never been greater. Yet, with many new hires in your organization and the challenges of a hybrid workplace, you are struggling to re-establish one of the most important levers you have to retain your best and brightest: your culture. In this po...
We are entering a New Era in Family Wealth. The New Era represents a distinct shift in families’ needs and priorities. Family wealth has long been defined mostly in financial terms, which led to growth and protection of the family’s financial capital as the overriding priority. Today, here is an emerging desire by more families to focus on purpose,...
When a strategic plan is developed with the family's values and mission in mind, it can serve as a family-endorsed and impactful roadmap. In this event session, hear about FOX's work with developing a vision and mission statement, and from a seasoned family governance expert who has worked with families and family offices to create proven strategic...
Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
While there are many items family offices should look for in technology solutions, one vital component is reporting capabilities. For family offices considering a move to Sage Intacct, there are five reporting advantages you can count on to help deliver the data and transparency that are important to the family members.
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Third-party vendors can range from custodial companies, to IT services, to professional service firms. Whatever their contracted function, they have access to your physical premises and/or your network data. So how can you make sure that when you’re signing a contract with an outside vendor, you’re not exposing yourself and your clients to excessiv...
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...