Over the last 15 years wealth management firms have taken varied approaches to implementing technology within their organization, each aiming to satisfy a unique set of needs and requirements. With technology evolving and teams requiring more firepower from their applications, firms are left in a quagmire, wondering what the best approach is for adopting technology: if they should build, license (from single or multiple vendors), outsource or some combination.
Resource Search
In this session we will have a case study that addresses the journey that a family office undertook to assess and address the risk associated with its technology—from early third party assessments to strategy formulation to board approval and finally implementation. Along the way we will share how some time-honored strategies were discarded and a partnership with the clients on security was created.
What are the latest political and legislative developments and what do families need to be aware of? This always popular analysis of the politics and passage of tax and estate planning legislative changes on Capitol Hill will give family office executives the information they need to know to be prepared for 2015 and beyond.
In addition to delivering superior returns, family offices also meet more stringent investor reporting and financial demands. Having the ability to transform data into timely, useful information is one of today’s greatest challenges in the family office market. In this session, we will discuss how optimizing data management can lead to increased levels of operating efficiency, improved reporting, competitive advantage and growth.
In response to an ever-growing number of malicious and costly cyber-attacks on U.S. companies, both the Cybersecurity Unit of the Computer Crime and Intellectual Property Section of the U.S. Department of Justice and the Division of Investment Management of the Securities and Exchange Commission recently published reports providing guidance on how private sector companies—both large and small—can minimize the risk of a cyber-attack as well as the resulting harm should an attack occur.
You have undoubtedly heard the horror stories: missed deadlines, shoddy work, cut-corners, items gone missing, and contractors walking off the job, just to name a few. Whether you are remodeling your home or building a new one, hiring the right person to head up your construction project is critical to a job well done. If you are planning to hire a contractor for your latest remodeling project, this article provides a number of things to consider.
Many people think of home care as something that applies only to frail elders; however, at least 65% of people who require home care receive this care after being discharged from an inpatient hospital stay. Home care recipients can be people of any age who are suffering from a chronic or an acute disease, as well as people who are injured or who have ha
With an estimated 82,000 variations of viruses and malware released every day by hackers, how can you keep your client data secure? There is no room for complacency when it comes to the security of your client data, yet it is easy to become apathetic when nearly every day another cybersecurity breach is reported. This article provides several helpful guidelines to protect your office network.