In the last few years, hackers and cyber criminals have become much more sophisticated in how they steal private information, which has led to massive data breaches. These data breaches not only cost an organization hundreds of thousands of dollars in fixes and possible fines, they can ruin a long-established reputation in a matter of hours. Putting in place a robust IT security program will help protect the personal information you maintain from being stolen and misused.
Resource Search
So, you need to hire someone to work at your home—a housekeeper, a chef, or a personal assistant. You have decided not to contract these services to a local company, and your family office does not hire staff for you. It is up to you to fill this position. Before letting a stranger into your home, it is important to understand the domestic employment process from hiring through terminating, so you don’t open your family to exposure financially, legally, and socially.
When it comes to placing a value on your fine art collection, it is important to understand and debunk the appraisal myths. It begins with correcting the myth that an appraisal is not needed when in fact it is crucial to establish and protect your valuable collection. Know the facts and guard yourself against the myths that could place your fine art in a vulnerable position and make you susceptible to losses.
More than ever before, families and individuals are creating trusts and limited liability companies and transferring legal ownership of one or more of their properties to these entities. Very often these arrangements are an important component of a family’s overall financial and wealth management strategy. But without an insurance program that properly reflects the structure of these arrangements, they can create unintended risk exposures.
Anyone who has participated in the acquisition or sale of a company will recognize the typical path of a deal: from flirting to tough questions to hard bargaining to—finally—handshake. Inevitably, however, the road detours from the exhilaration of accord to the anxiety of suspicion. The buyer wants assurance that all the seller's promises are true and that there are not going to be any surprises once the acquisition is consummated.
On September 7, Equifax, one of the three major credit agencies, announced that it had suffered a major data breach.
When families and family offices become involved in direct investments, whether as lead or coinvestors, they take significant additional risks that need to be appropriately managed. Such risks include regulatory exposure and potential lawsuits from coinvestors, employees and other stakeholders in the investee companies, and sellers and potential buyers of investee companies. Effective strategies for managing and insuring against such risks will be discussed in detail.
This session will focus on public (liquid) and private (illiquid) approaches to infrastructure investing. It will highlight risk factors as well as investment considerations and review deployment opportunities including fund-of-funds, direct private equity infrastructure funds and syndicated coinvestments in the infrastructure sector.
One of the best ways to help ensure the safety of your family and friends while aboard your boat is to identify common maintenance items before they become a problem. And if your boat is hauled out for winter storage, there are important recommendations to follow to help ensure that your boat will be ready for safe and reliable cruising again next year. It is also essential to consider a marine survey. Having a periodic inspection by a qualified, independent marine surveyor is a critical part of all boat ownership, and is particularly crucial for aging, gasoline-powered boats.
The internet and connected devices are transforming the world, mostly for the better. But for all the advantages cyberspace brings, there are also growing risks for businesses and families, all of which are relevant for family offices. We’re all vulnerable, but wealthy families are particularly attractive targets in the eyes of cybercriminals. Learn how it's possible to manage cyber risks, while taking full advantage of digital technology.