This session with the Salgar Family will provide background on the transitions underway in their family and how they used the Family Charter / Constitution to reaffirm the family values, align their goals, and organize their governance process. As part of the move from the first generation to the leadership of Gen 2-3, the family outlined the key c...
We have the answers
Search Results
Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
A family constitution—the rule book that defines the vision and principles of a family’s wealth strategy and acts as an operating model—should be as unique as the family itself. The key to developing an appropriate family constitution is not in the ultimate output, but in the collaborative process of developing it. In working together, families oft...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
In this exclusive chat with Mellody Hobson, the President and co-CEO of Ariel Investments, speaks candidly about the importance and value of diversity in finance—how being color brave can improve business and society at large. Mellody shares personal stories and lessons learned from her investment career, including the disconnect tha...
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Professional staff is an essential element of an effective family philanthropy effort; however, it can be a difficult construct to navigate. In this webcast by the National Center for Family Philanthropy, learn how to hire and prepare your staff for success in family philanthropy. Download the transcript and presentation deck for your refer...
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
Family governance need not be an oxymoron. A conscious family governance system can help create an efficient and rewarding means of ensuring the family enterprise’s viability for generations to come. Therefore, any family enterprise that seeks to maintain and grow its wealth—financial, human, social, and intellectual—should consider creating a...
Many successful families have put their shared values and goals in writing, often called a family constitution. A constitution can help build family unity and harmony, and the creation process itself provides benefits to the family. Learn the value that families can derive from creating a constitution, the work involved in creating one, and the top...
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Bu...