Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
We have the answers
Search Results
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
If you are a newer family foundation with one or two generations on the board, five generations may seem like a long time away. Yet in family philanthropy, quite a few foundations have been operating and thriving for 50, 75, even 100 years. What’s the secret of these family philanthropies that make it five generations, and across family branches? H...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
When starting with family philanthropy, a family can choose a donor-advised fund or establish a private foundation. Each option has different requirements and management issues, including start-up costs, privacy matters, control of grants and assets, and flexibility in impact investing. Serving as a general guidance for you and your experienced adv...
One of the many challenges facing wealthy families in today’s fast-paced society is the need to meaningfully involve family members, including the rising generation, in the management of the family wealth enterprise. One way to engage the family is through philanthropic giving where families can derive great benefit from working together to define ...
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Sustainability is increasingly material to investment return, and there are five prominent trends—including climate change and technological revolution—that are likely to have relevant implications for investment portfolios over the long term. Ultimately, investors that evolve more quickly to incorporate these risks and opportunities into...
Professional staff is an essential element of an effective family philanthropy effort; however, it can be a difficult construct to navigate. In this webcast by the National Center for Family Philanthropy, learn how to hire and prepare your staff for success in family philanthropy. Download the transcript and presentation deck for your refer...
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
How can an organization be confident it is agile enough to react to the unknown and the evolving risk landscape? One of the best ways is by establishing a strong risk culture. In this e-book, Baker Tilly practitioners take a closer look at some of the critical risks that organizations are dealing with now, how those risks have evolved in recent yea...
Before a hurricane or storm hits, plan in advance by having an evacuation “Grab and Go” checklist, with special considerations made for children, infants, and pets. Continue to follow all evacuation orders and allow for enough time to pack and inform family and friends if you need to leave your home.