The Corporate Transparency Act Final Rule took effect on January 1, 2024. Hear the latest in terms of implementation of CTA and what other family offices are doing in order to gear up to comply with their initial BOI report obligations. Also, you will have the opportunity to get your questions answered and more during the presentation. The discu...
We have the answers
Search Results
Successful family offices combine financial, philanthropic, legal, and administrative operations and help ensure that family objectives are achieved from generation to generation. These responsibilities create a range of liability risks for the family office entity and its executive and professional staff. With these risks, it is important for fami...
If you are a newer family foundation with one or two generations on the board, five generations may seem like a long time away. Yet in family philanthropy, quite a few foundations have been operating and thriving for 50, 75, even 100 years. What’s the secret of these family philanthropies that make it five generations, and across family branches? H...
When starting with family philanthropy, a family can choose a donor-advised fund or establish a private foundation. Each option has different requirements and management issues, including start-up costs, privacy matters, control of grants and assets, and flexibility in impact investing. Serving as a general guidance for you and your experienced adv...
One of the many challenges facing wealthy families in today’s fast-paced society is the need to meaningfully involve family members, including the rising generation, in the management of the family wealth enterprise. One way to engage the family is through philanthropic giving where families can derive great benefit from working together to define ...
Although malware is predominantly delivered via email, the types of entry points continue to evolve, and many will not be caught by a family office firewall. So, it is crucial to build a first line of defense, and it starts with employee security awareness training, testing, and auditing. Mitigate the cybersecurity risks in the family office by dep...
As family offices grow increasingly complex and manage larger and more varied assets, they are becoming prime targets for a variety of security threats. From this report, learn what family offices can do to protect against the risks, including cybersecurity breaches, theft schemes, and fraud perpetuated by unvetted 'insiders' of the firm.
2020 was a year of diverse risks marked by a global pandemic, a record number of storms, catastrophic wildfires, and ongoing threats to people and property from other perils, including cyber risks. When “unprecedented” is the new norm, there is a need for thoughtful risk management and insurance protection strategies as families and family offices ...
The key to success of any risk management plan is the development of an “all risk” approach that takes the entire family enterprise into account. Through a survey of more than 200 family office executives at single and multi-family offices, an uncovering of some worrying approaches has surfaced around the risks that family offices face, particularl...
Professional staff is an essential element of an effective family philanthropy effort; however, it can be a difficult construct to navigate. In this webcast by the National Center for Family Philanthropy, learn how to hire and prepare your staff for success in family philanthropy. Download the transcript and presentation deck for your refer...
Families hire family office staff with the expectation that the office keeps their information, assets, and reputation protected. To safeguard the families’ interests, it’s critical for family offices to ensure that internal controls take the pragmatic approach, starting with four main areas: segregation of duties, transaction volume, managing comp...
Imagine trying to protect a multi-generational family with 15 households and 25 properties in multiple states—not to mention all their vehicles, collections and personal property. Then there’s liability exposure for dozens of individuals, each with their own unique set of risks. Providing insurance protection for this level of exposure is challengi...
Identity theft occurs when personal information about an individual is stolen and used typically for financial gain. Criminals can obtain personal information electronically through hacking or illegally purchasing information from the Deep Web/Dark Web. They can also obtain information through paper records that are not properly disposed of or secu...
The complex, convergent nature of risks facing high-net-worth families requires family offices to adopt both a holistic and strategic approach to risk management than many have in the past. The ones who can make the change will be best positioned to successfully navigate the challenges that range from overarching trends of growing families to incre...
As family offices expand their technology footprint, cyberattacks are rising. Hackers continue to refine their approaches, but security controls and proactive planning can strengthen your family office cybersecurity defenses. Initially, focus on the key action items to validate your existing security setup and inform your plans to address any short...