No one is immune from cybersecurity threats. And responsibility for protecting your data doesn’t rest with one person or provider. So it’s essential every organization follows at least some basic cybersecurity best practices. A great step toward ensuring your data is safe is to maintain good cyber hygiene. We recommend hiring a third party to co...
We have the answers
Search Results
Cyber threats are seen as the third most impactful risk to businesses over the next three years, after the cost of capital and economic downturns, respectively. Threat actors are not only deploying new tactics using generative artificial intelligence (AI) to conduct more targeted and sophisticated attacks, but they are also advancing familiar threa...
FOX has recently taken a closer look at the various types of capital available to families and the offices that serve them. One category not yet discussed at our forums is TIME CAPITAL. Given the limited nature of time, it is essential to allocate, invest, spend, and cherish the time we have. Time, as we experience it, is not linear, yet why do ...
How can emerging AI programs and workplace tools create opportunities for progress and growth without creating a culture of fear and avoidance within your organization? We’ll begin the session with a moderated interview featuring industry expert Alex Wissner-Gross to lay the groundwork for understanding AI’s influence on family enterprises. This se...
In the thriving family, learning and growing must be both individual and across the family system. In this breakout participants will learn how the 10x10 Learning Roadmap can be used to develop group learning programs for all family members and/or for specific cohorts. This session is complementary to the day two session that focuses on the i...
Family offices of every size and type can serve as unknowing gateways to sensitive data and personal information due to their extensive financial dealings and relatively low maturity in cyber preparedness. These vulnerabilities make family offices attractive targets to threat actors who may not even need sophisticated hacking skills to compromise a...
Get ready to comply with the five new data privacy laws that will come into effect in January 2025 in Delaware, Nebraska, Iowa, New Hampshire, and New Jersey. With the active enforcement by several states’ Attorneys General and a trend toward broader applicability, data privacy compliance is becoming increasingly important and complex. Companies sh...
In this session, participants will explore a comprehensive framework designed to address the essential question: how might we build a strong and connected family of wealth? The discussion will center on the ten core competencies crucial at each life stage for navigating the unique challenges and opportunities that wealth brings. Attendees will be e...
What is your superpower? If you don’t know, well, you don’t get to put on the cape. Based on his book, Design for Strengths: Applying Design Thinking to Individual and Team Strengths and Weaknesses, John will share the “Design Thinking” mindset and process out of Stanford University, ubiquitously used at Apple, Google, Amazon, a...
This annual cybersecurity update covers the leading threats you need to be aware of to keep your clients and your firm protected. 2021 cybersecurity trends and best practices will be shared.
Through a collaboration with a family office and outside partners, hear one family’s approach to encouraging the rising generation to find their voice in the family enterprise. Learn from a Family Office COO how to design and steward a rising generation program with family input and the support of external consultants. Together, the group discusses...
Capturing the insights from over 900 experts worldwide, this executive summary of the 2025 Global Risks Report highlights the key findings to support decision-makers in balancing present crises and longer-term priorities. The report also considers the survey findings and the range of implications, plus it provides six in-depth analysis of...
The Global Risks Report is a comprehensive analysis of the most significant risks facing the world today. Designed to help understand the top risks for 2025 and over the next decade, this report provides insight into challenges and opportunities for risk leaders across industries. Developed by the World Economic Forum with support from strategic pa...
Cyber threats and fraud schemes are designed to infiltrate and compromise your business. By using this cybersecurity resource guide and taking proactive actions to prevent cyber threats, you can strengthen your defensive strategy. This guide includes: Cyber Fraud Overview Recommendations and Resources Quick Reference Guide f...
With cyberattacks increasing every year, it’s critical to be cyber ready. While implementing individual security tools is one element of building a ‘cyber dam,’ it is not enough to stop sophisticated attackers from breaking through it. Much like a dam, a single crack in your security plan can have devastating consequences. In this webinar, learn ho...