The Corporate Transparency Act Final Rule took effect on January 1, 2024. Hear the latest in terms of implementation of CTA and what other family offices are doing in order to gear up to comply with their initial BOI report obligations. Also, you will have the opportunity to get your questions answered and more during the presentation. The discu...
We have the answers
Search Results
Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
Families of wealth and business-owning families face security risks in their everyday lives, where personal and business risks are often blended and are typically managed by different people and processes. This creates a gap in identifying risks and solutions that can be addressed through a holistic and collaborative risk management approach. With ...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
Black swan events—like the 2008 financial crisis and the COVID pandemic—often come with high velocity and are slow to recover. While these events are difficult to predict, the best way to get ready for the next crisis is with extreme preparation. Looking ahead with intentional risk management, here are 8 ways to prepare your business, family enterp...
Cybercriminals have migrated their attacks from larger businesses and hardened targets to private wealth clients and family offices, where the defenses are low or non-existent. In this webcast, hear from Dr. Chris Pierson, CEO of BLACKCLOAK, a Concierge Cybersecurity & Privacy Protection Platform that represents private wealth and family office...
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
A private family trust company (PTC) often serves as an excellent governance framework and corporate structure for a virtual family office (VFO) by providing integrated, holistic oversight of fiduciary, investment, tax, philanthropic, governance, and other activity. Learn more about how and why families choose to form a VFO around their PTC, the co...
With the shift toward a remote work structure, it’s good to experiment with what works best for you in your new workspace and create a regular routine around it to help you adjust to the new environment. In this podcast, Rehmann's Director of Talent Acquisition, Val Martinez, shares more tips on how to be productive when working from home. She also...
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Bu...