Risk Management at FOX is focused on all aspects of risk for its membership including families, family offices, operating companies, and advisor organizations. FOX hosts a quarterly meeting comprised of different vendors and thought leader specialists whose focus is in the areas of Cybersecurity, Physical Security, Personal Security, Insurance, Gov...
We have the answers
Search Results
Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
The term “passion investments” has gained currency within the wealth management arena to describe high-end collectibles and other luxury possessions that hold emotional as well as financial value for their owners. When considering that this new asset class has generated noticeable returns, it’s no surprise that owners want to protect their high-val...
Statistics show that teenagers are more likely than any other age group to be in an automobile accident. In several tragic incidents, the use of a cell phone was involved. Some accidents, however, simply reflected the teenagers’ lack of driving experience. As a parent, you can help your teenager become a safe and skilled driver by setting a good ex...
Whether your collection of paintings are decorative pieces or appreciative investments (or both), they can hold a tremendous amount of meaning and value. As to the decision regarding how and where to display your fine works of art, it’s important to identify and consider the many factors that could lead to a loss. All paintings—including oils, acry...
Families of wealth and business-owning families face security risks in their everyday lives, where personal and business risks are often blended and are typically managed by different people and processes. This creates a gap in identifying risks and solutions that can be addressed through a holistic and collaborative risk management approach. With ...
Works of art are at great risk of being damaged during handling and transportation. To reduce the likelihood of loss, it is important to adhere to a stringent set of guidelines for every transit. Arrangements will differ in each situation, but following the recommended steps—including selecting a fine art specialty shipping company and reviewing yo...
When you’ve made the decision to protect a collection through insurance, you want to be sure that coverage amounts measure up to the value of your items. Determining proper values can be tricky, as so many variables impact a piece’s worth. Given the ever-changing market, values are in constant flux. That’s why professional appraisals are critical, ...
Vulnerability and personal security risks can be greatly reduced by following five basic principles of security at all times—awareness, low profile, unpredictable routine, communication, and layers of security. Based on those principles, these guidelines are designed to give practical advice on safety and security to anybody who is living in or tra...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
Lawsuit awards can be incredibly high, and individuals known to have substantial assets are particularly vulnerable. In some cases, the high-stake lawsuits can cause devastating reputational damage. Given the risks and exposure, the need for holistic liability protection is an important issue. Learn the different types of liability i...
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
While it is impossible to predict every catastrophe, thorough pre-event preparation and post-event response planning can help reduce the likelihood of loss and limit the severity of damage that can’t be avoided. This reference guide and sample planning forms based on decades of experience will help you proactively keep art and other valuables ...