Companies have been employing digital technology for years, but they are only now committing themselves to pursuing durable digital transformations. The shift signals a changed outlook from recent years, when digitization efforts tended to be more tactical than strategic. Companies invested in technological upgrades, remaking individual functions s...
We have the answers
Search Results
As Artificial Intelligence (AI) gets more sophisticated and weaves further into the fabric of human existence, what are the implications for work and society? How will AI, its evolution, and some of its potential future mind-bending possibilities impact investors? While the answers are beyond the reach of a single article, having a better understan...
Families of wealth and business-owning families face security risks in their everyday lives, where personal and business risks are often blended and are typically managed by different people and processes. This creates a gap in identifying risks and solutions that can be addressed through a holistic and collaborative risk management approach. With ...
In today’s hyperconnected world, news headlines are filled with stories about identity exposure, data breaches and other major threats to your personal information and financial assets. This guide provides best practices, resources, and actionable advice to help you protect yourself or recover from a cyberattack.
How can risk executives embrace innovation while preparing for unknown risks such as a self-driving car commandeered by hackers, data analytics software that unintentionally reflects biases, or autonomous weapons that cause accidental casualties? This challenge was explored in the Risk in Review Study of more than 1,500 senior risk executives globa...
The revolution of the “information age” has created tremendous advantages and helped accelerate innovation, but it has also brought with it new risks—namely cyber attacks. While the corporate attacks get most of the media attention, do not forget that individuals—especially the high net worth—need to be vigilant about cyber security. The good news ...
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
As the benefits and capabilities of the Internet of Things (IoT) accrue, so does the amount of data that must be collected, managed, and integrated with connected devices—and by enterprises everywhere. It’s a challenge that demands a new kind of digital trust and data sharing tradeoffs. For more insights from this IoT se...
The Internet of Things (IoT) has inspired unprecedented cooperation and coordination for the businesses and industries interested in ensuring a sustainable future for themselves. From the lens of eleven case studies, see how the IoT revolution is transforming the world in which we live in. For more insights from this IoT series, see:Part ...
The rise of the connected objects known as the Internet of Things (IoT) will rival past technological marvels, such as the printing press, the steam engine, and electricity. As IoT solves problems that have plagued businesses for decades, it will also create entirely new dilemmas across all sectors and for all industries. Concerns over privacy, cyb...
The Internet of Things (IoT) connects machines and devices to one another. Today’s devices have between 6 to 9 sensors capturing and transmitting data to help all industries become more efficient, productive and safer. The 2020 annual global economic potential across all sectors is estimated up to $14.4 trillion—that is the current GDP ...
The cloud is one of the largest drivers of emerging technology solutions, and for many organizations, it has become one of their most valuable information technology (IT) tools. It enhances data storage capabilities, security and agility to both scale up as well as scale down, while also reducing costs, in part due to its inherent flexibility and t...
Although malware is predominantly delivered via email, the types of entry points continue to evolve, and many will not be caught by a family office firewall. So, it is crucial to build a first line of defense, and it starts with employee security awareness training, testing, and auditing. Mitigate the cybersecurity risks in the family office by dep...
In the tech industry, the calculus for risk versus innovation is starting to shift. Stakeholders don’t just expect new and exciting products and services, they want responsibility and governance. The good news is that the tech industry CFOs appear confident and ready to ride this new wave of social responsibility and market volatility.
Open dialogue between parents and children and, specifically, the creation of a family contract can promote responsible use of digital devices. With the help of a discussion guide and a sample contract, families can learn to prepare a contract that works for them. The process of working together builds trust, incorporates multiple perspectives...