As an expert in information secrets, cyber attacks and corporate espionage, Dr Cédric Jeannot utilizes his experience in the field of cryptography, authentication, key management and forensics in various high-profile security projects. An author and frequent international speaker on the topic of information security and privacy, he is currently inv...
We have the answers
Search Results
While the concept of discussing the values and expectations surrounding philanthropy aren’t new and advisors are tasked with satisfying the gifting expectations of the families they serve, as indicated in the 2013 U.S. Trust and The Philanthropic Initiative research on philanthropy—there is a significant disconnect between advisor...
Future Owners of Impact: Empowering the Younger GenerationDanielle Oristian York, Director, 21/64 The next generation can bring unique skills and perspectives to the philanthropic community. However, the prospect of engaging the next generation can be daunting. Next-generation family members have grown up with access to broader opportunities f...
With wealth comes responsibility—a challenge that daunts some families, but inspires others. Two families, from the myriad of FOX families who engage their wealth in high impact activities, shared their personal stories of what they did more, better and differently to initiate a Butterfly Effect within their family and community. Below ...
Families often complain about the challenge of getting siblings and cousins more engaged in business and family activities. There is a great divide between the “make it happen” people and the “watch it happen” people in the family, and a risk of burnout for the family members who are providing the leadership. Hea...
Families often complain about the challenge of getting siblings and cousins more engaged in business and family activities. There is a great divide between the “make it happen” people and the “watch it happen” people in the family, and a risk of burnout for the family members who are providing the leadership. Hea...
Researchers examine 50 years of historical S&P 500 Index data and compare the actual tail risk frequency and magnitude to the expectations of a typical investor operating under modern portfolio theory. The difference between the two is surprising, and it suggests that investors have significantly underestimated tail risk frequency and severity.
A well designed absolute return portfolio should not encounter the frequency or magnitude of declines associated with volatile growth portfolios. The absence of large losses is the hidden strength of the approach, acting as a strong suppressant to investors' inherent fear biases, which, in turn, allows for a more consistent compounding of wealth ov...
Donors are reassessing their giving to maximize impact and to ensure their money is being utilized effectively and efficiently by the non-profit organizations they support. Meantime watchdog organizations are grading the non-profit community and posting their ratings online.
Mission investing offers the opportunity to potentially shape and scale desired social outcomes as a complement to effective grant making and other philanthropic activities. Success requires planning, blending program and financial teams, rigorous investment processes, and building applicable social metrics.
This paper highlights a number of approaches that may guide philanthropists in choosing their investments and in encouraging entrepreneurship. Alongside these examples, the paper features a series of case studies showing how philanthropists worldwide invest their wealth, their experience, and their skills to unlock entrepreneurial potential.
Clarifying donor intent at the outset of any conversation regarding charitable giving, and properly documenting that intent, will help both parties feel good about giving and receiving. To avoid confusion after a gift is made and to prevent costly proceedings when the intent of a gift is insufficiently documented, here are a few practical tips to g...
Philanthropically minded families are vulnerable to the misuse of the personal financial information contained in mandatory filings that become public. However, these families are not defenseless; by following the best practices in this paper, they can greatly reduce the likelihood of being victimized.
Businesses worldwide are increasingly using social media networks to advertise and communicate with potential customers and constituents. Regardless of whether a business is using social media, its employees certainly are. Here are four reasons to establish rules for how employees use social media sites.
Planning ahead is the most important thing you can do to protect yourself and your family. Besides protecting your home from a possible burglary, it is important to think about your personal security. This article offers 28 tips for preventing a break-in and another 13 for keeping family members safe.