Once the family enterprise is clear on which values it aims to preserve, the next step is to integrate and execute those values in an intentional way. Enter: The B Corps. Certified B Corporations are leaders in the global movement for an inclusive, equitable, and regenerative economy. Join this session to learn how one family office achieved B Corp...
We have the answers
Search Results
Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
One of the most common concerns families have revolves around how to share wealth with family members without encouraging entitlement. With forethought and care, giving well and wisely can bring families together and strengthen the bonds between generations. The steps to giving wisely—and fostering flourishing over entitlement—include clarifying yo...
The 2018 U.S. Trust Insights on Wealth and Worth® study asked nearly one thousand high-net-worth individuals about their approach to building wealth and the extent to which they are using it to achieve their goals and support the causes they care about most. The study found that while wealth provides the freedom to do more, it also brings increased...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
Managing family wealth over the long-term requires careful thought and a well-structured estate plan. Before making specific decisions about what’s best for your wealth, it’s wise to spend time considering what it is you really want to see happen with it. There are steps you can take—including considering trust options—to help create a legacy plan ...
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
Without the usual financial pressures of family wealth, how do you teach your children about money, work, and personal responsibility? Because the stakes are high at this point in your family journey, this article by NEPC recommends starting with the family fundamentals and a sense of purpose for the wealth. It further outlines a reliable 1-2-3 str...
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
Historically, beneficiaries learned of wealth transfer plans only after the death of the grantor. However, this approach often leads to unanswered questions and, potentially, feelings of betrayal when expectations for future gifts are left unmet. There are several planning tools, including a Statement of Wealth Transfer (SOWTI), that can facilitate...
Over the past decade, matriarchs and patriarchs of successful families have been shifting their focus from their children to a broader group of individuals, such as grandchildren, siblings, and nieces. Often, they choose to create family banks, which are typically trusts that are funded to help individuals pursue entrepreneurial opportunities, vent...