Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
We have the answers
Search Results
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
The term “passion investments” has gained currency within the wealth management arena to describe high-end collectibles and other luxury possessions that hold emotional as well as financial value for their owners. When considering that this new asset class has generated noticeable returns, it’s no surprise that owners want to protect their high-val...
Flying privately has become increasingly popular for a variety of reasons, including convenience, security, and lifestyle, but there are several considerations in determining what usage and ownership structure is right for you. Like making a real estate investment, owning or leasing a plane poses many financial, tax, and regulatory issues, as well ...
Families of wealth and business-owning families face security risks in their everyday lives, where personal and business risks are often blended and are typically managed by different people and processes. This creates a gap in identifying risks and solutions that can be addressed through a holistic and collaborative risk management approach. With ...
The revolution of the “information age” has created tremendous advantages and helped accelerate innovation, but it has also brought with it new risks—namely cyber attacks. While the corporate attacks get most of the media attention, do not forget that individuals—especially the high net worth—need to be vigilant about cyber security. The good news ...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
Aircraft ownership comes with an enormous cost and responsibility that may not support the investment, and more cost-effective alternatives could accomplish the same goals with fewer headaches. Before purchasing or leasing an aircraft, it is best to understand what options are available and how these options can be tailored to fit specific nee...
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
Adding dual factor authentication to your social media helps make sure that you, and only you, can access your account. Instead of only entering a password to log in, an extra security key will be required to access your account. Step by step, learn how easy it is to configure for your Facebook, Instagram, LinkedIn, SnapChat, WhatsApp, and Twitter ...
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
With safety at the top of the priority list when flying on an aircraft, there are 10 questions to ask and things to understand to ensure the safest private aviation solution for you and your family. Armed with this knowledge, you’ll be able to make an informed decision and enjoy total peace of mind, knowing you and your loved ones are in the safest...