Family offices and family-operated companies face a variety of security risks, including: cyber, physical, reputational, and financial. In many cases, their interconnectedness to family residences complicates matters further. David London of The Chertoff Group and FOX senior technology consultant Steven Draper will explain how to improve a family&r...
We have the answers
Search Results
More than 58 million Americans use social networking sites several times per day. Social media has created a new sense of reality—a reality that its benefits have outweighed the risks. Liability risks involved with the use of social media include defamation, invasion of privacy and negligence. This session provides awareness into the risks as...
As an expert in information secrets, cyber attacks and corporate espionage, Dr Cédric Jeannot utilizes his experience in the field of cryptography, authentication, key management and forensics in various high-profile security projects. An author and frequent international speaker on the topic of information security and privacy, he is currently inv...
Researchers examine 50 years of historical S&P 500 Index data and compare the actual tail risk frequency and magnitude to the expectations of a typical investor operating under modern portfolio theory. The difference between the two is surprising, and it suggests that investors have significantly underestimated tail risk frequency and severity.
A well designed absolute return portfolio should not encounter the frequency or magnitude of declines associated with volatile growth portfolios. The absence of large losses is the hidden strength of the approach, acting as a strong suppressant to investors' inherent fear biases, which, in turn, allows for a more consistent compounding of wealth ov...
Philanthropically minded families are vulnerable to the misuse of the personal financial information contained in mandatory filings that become public. However, these families are not defenseless; by following the best practices in this paper, they can greatly reduce the likelihood of being victimized.
Businesses worldwide are increasingly using social media networks to advertise and communicate with potential customers and constituents. Regardless of whether a business is using social media, its employees certainly are. Here are four reasons to establish rules for how employees use social media sites.
Planning ahead is the most important thing you can do to protect yourself and your family. Besides protecting your home from a possible burglary, it is important to think about your personal security. This article offers 28 tips for preventing a break-in and another 13 for keeping family members safe.
It is more important than ever for people with substantial wealth to fully understand their liability risk. In addition to wrongful termination and/or discrimination lawsuits filed by domestic staff, automobile injury claims, and libel and defamation lawsuits resulting from online activity, their overall lifestyle can create unique risk exposures.
Investors and advisors focused on wealth growth and preservation may see environment, social, and governance/socially responsible investing as taxing a portfolio's performance. This paper offers a framework with associated metrics for assessing ESG/SRI integration into the portfolio with the same rigor and discipline used in all other fiduciary dec...
While the outcome of many global issues remains uncertain, we believe the risk/reward equation favors taking well-calculated, above-average risk. Investor psychology can change at any moment. When the market returns its focus on individual company fundamentals, we expect significant alpha will be generated by portfolios that own high-quality compan...
Privately held companies are susceptible to a range of allegations brought by employees, customers, creditors, and government regulatory agencies. However, a comprehensive D&O insurance policy from a qualified insurer can absorb many of the risks to which managers and fiduciaries of private companies are exposed.
A return to a “high” market warrants a full understanding of the nature of ownership (legal title) risks in the art industry and how art investment fund managers can mitigate these risks.
Taking the time to consider security measures before a theft occurs can save a collector a great amount of frustration and expense. Here are seven key measures that can increase the security of fine art and collectibles for little cost.
With incidents of Internet crime surpassing 300,000 annually and continuing to grow, computer users are wise to watch for the warning signs that their computers are being hacked and to be proactive in protecting themselves. This article provides best practices for preventing security breaches as well as a checklist to help maintain your personal se...