Wealthy families embark on a voyage of important mile markers, as well as inevitable excursions and pleasant surprises. No two journeys are alike, but this insurance road map can inform you of lurking hazards, help you and your family avoid them, and get you to your destination safe and sound.
Resource Search
Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existing threats, so that you can ensure your family office is truly doing enough to protect and secure your private client data. Dave Detweiler, Managing Director of Sales, SEI
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. Hays, Principal Marketing Manager, Financial Services, Sage Kelly Gonyea, Principal Consultant, Financial Services, Sage
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on managing your family office’s risk against a ransomware attack. He will discuss the impacts and trends of ransomware attacks, how ransomware attacks are executed and leading practices to minimize your ransomware risk.
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Build a security-aware culture Assess control and authentication Monitor, detect and respond Implement a ransomware recovery strategy Consider ransomware insurance
As family offices expand their technology footprint, cyberattacks are rising. Hackers continue to refine their approaches, but security controls and proactive planning can strengthen your family office cybersecurity defenses. Initially, focus on the key action items to validate your existing security setup and inform your plans to address any shortcomings you identify within your family office 5.0 model.
When it comes to international travel, high-net-worth individuals and their families can be at a particular risk: They have the danger of kidnapping and extortion, threats to their physical safety, and a hit to finances. The challenges have also multiplied since COVID, presenting not only health risks to travelers but political instability unseen in many years. This new reality in travel points to understanding how to insure a lifestyle.
This conversation centered around all things Digital Assets including, but not limited to, the current and future applications of stablecoins and how they are regulated, crypto credit lending, and what risks to look out for. Patrick Corker, Vice President Finance, Treasury and Corporate Development, Circle Moderated by Nick Rhoads, FOX Advisory Board Member
Michael Saylor, Chairman and CEO of MicroStrategy and the largest public company investor in Bitcoin, shared his experiences and approach to adding Bitcoin to his company’s balance sheet. He also shared his insight on Bitcoin energy usage, safety, and the current regulatory framework. Michael Saylor, Chairman and CEO, MicroStrategy Moderated by Nathan Hamilton, Vice Chair, FOX
In today’s hyperconnected world, news headlines are filled with stories about identity exposure, data breaches and other major threats to your personal information and financial assets. This guide provides best practices, resources, and actionable advice to help you protect yourself or recover from a cyberattack.