Businesses have arguably never faced such a breadth of challenges as they do today. Drawing on data and insight from Fitch Solutions, a leading source of independent political, macroeconomic, financial, and industry risk analysis, our Political Risk Map 2019 presents a global view of the issues facing multinational organizations and investors. This...
We have the answers
Search Results
Widespread political volatility and rapid technological advances are spurring companies to question not just their resilience, but also their fitness for purpose in the new world order. In this report, we show how firms can move from generalized concerns to analysis, discussions, and actions in response to specific threats that may most disrupt the...
Does your company handle data analytics to target California consumers? If so, it is imperative that you pay close attention to the California Consumer Privacy Act (CCPA) that goes into effect on January 1, 2020. The CPA goes well beyond the General Data Protection Regulation, giving California consumers new privacy rights along with imposing indep...
No matter your industry, your company is a data company and for that reason, we are in a post-data world. Gen Z—your future customers and future employees—are already digital and they control over $100 billion in consumer spending today. In this video series, learn how to adopt a strategy that treats your data as the pre-tangible a...
Privacy and data security are issues that every company needs to pay attention to. But how do companies comply with all the various laws between Europe with the GDPR and in California with the California Consumer Privacy Act? In this video series on data management best practices and privacy strategy, you can:learn about the best practices for...
The California Consumer Privacy Act (CCPA) is one of the most significant regulations overseeing the data-collection practices of companies in the United States. Other states are expected to follow California’s lead. So how can companies keep up with the changes in privacy law and compliance requirements that vary widely across borders and na...
The past couple of years have proven to be banner years for private equity and merger and acquisition activity, with no signs of slow down in 2019. With cash on hand to invest and the increase in Representation and Warranty Insurance policies, forecasters expect these trends to continue. Podcast host Michael Cohen is joined by Luca Salvi to discuss...
The best time to install protective devices or materials in your home is during a renovation, addition, or new construction. Consider the following recommendations early in your planning stages to increase safety, lessen the likelihood of damage, and help minimize installation costs. Some proactive measures may even result in savings on your homeow...
Cyber-attacks are increasing in sophistication and magnitude of impact across all industries globally and can negatively impact a company's reputation and market value. Thus, all companies need to fully understand the value of the information assets they possess, the cybersecurity related risk of a data breach, and then factor the benefits and ...
The reality today is many companies have relied too much on conducting just a cybersecurity compliance checklist assessment and framework. While compliance with government and industry documentation standards is good, it is not sufficient, nor does it ensure real information security. Organizations need to take appropriate action both before and af...
The Internet has bought connection, communication, and efficiency to the business world, including family offices. However, conducting business online without proper security and knowledge of risks can endanger the family and its data. The right level of expertise, planning, and effort is required to safeguard sensitive information. It is an organi...
Asset protection follows the continuum of life’s events, reflecting the changes that individuals, families, careers, businesses and wealth undergo. Within the wealth spectrum, a simple way of thinking about asset protection strategies is from lower risk and simpler tactics to higher risk and more complex and sophisticated tactics. This approa...
Under their tag as Baby Boomers, the Pre-Retirees have always been different. In the insurance sphere, that difference shows itself as a change in perspective that entails new requirements. Whether to downsize and how, what legacy to leave, and similar questions that call for more than advantageous sales. To provide the added-value advice and servi...
If you pre-order from Starbucks, buy a paper on the corner using Apple Pay, or use the free wifi at the gym to pay your bills online, before lunch you’ve shared multiple pieces of information that could potentially be accessed by cyber criminals. Security experts continue to familiarize themselves with the latest cyber-exposures, but so do cr...
As with many of your possessions, the value of jewelry is not simply monetary. Individual pieces often hold significant sentimental value: a tennis bracelet gifted to mark the birth of a child or an heirloom brooch passed down from a grandmother, for example. These are irreplaceable, so taking the proper steps to secure and protect them is critical...