Presented at the 2018 FOX Family Security WorkshopJuly 18-19, 2018Organizations value and view security, risk and control differently. Some of these differences are related to risk and threat profiles impacting an organization based on factors such as industry, location, product/services, etc.Some differences are related to management's view of com...
We have the answers
Search Results
Family office activities are complex, and families can unintentionally put themselves at risk if they don’t proactively identify and address the potential impact of external factors. One solution: conduct a full diagnostic risk assessment and review of your internal controls to ensure that potential problems have been identified and proper mitigati...
As family offices expand their technology footprint, cyberattacks are rising. Hackers continue to refine their approaches, but security controls and proactive planning can strengthen your family office cybersecurity defenses. Initially, focus on the key action items to validate your existing security setup and inform your plans to address any short...
Employers who sponsor high deductible health plans (HDHPs) that are compatible with health savings accounts (HSAs) should take the opportunity to explain how they work during open enrollment. Through this bulletin and overview on HSAs, employers can see the HSA benefits they should highlight to their employees and what they need to know regarding H...
Given how significant accounting processes and applications are prime targets for top business risks, it’s important to take control and start your risk management analysis. Take an important step toward that end by using this fillable and interactive segregation of duties form. After answering the questions, you’ll have a high-level view of functi...
When it comes to protecting digital assets, the users can end up being the biggest flaw in your cybersecurity armor. Mistakes like creating easy-to-guess passwords, not encrypting important data, or sending passwords over email can make a hacker’s job easy. To help strengthen your cybersecurity armor and stay ahead of the hackers, here are so...
It's a pivotal time for Single Family Offices, with more and more reviewing their structure and operations to minimize risks. In this roundtable discussion, experts share how Single Family Offices are evolving and addressing new risks and risk mitigation strategies.
Due diligence often focuses heavily on financial and operational issues. Often the new or combined organization’s cybersecurity does not receive the attention it deserves. As a result it places the company at risk from a cyber incident, which can detrimentally impact the organization’s reputation and financial security. The risk is high...
Cybersecurity is a risk for children and adults alike. If you’re online, you’re visible around the world—and with more than 10 billion internet-connected devices, opportunities for hackers abound. Learn how to protect your family from identity theft and cyberattacks at home and while traveling. By knowing what to look for, you can...
Regardless of industry or structure, all organizations must be proactive to stay ahead of potential risks and unforeseen threats like a pandemic or economic downturn. Implementing an Enterprise Risk Management (ERM) program will help organizations better anticipate, navigate, and minimize the negative effects of the next threat and improve resilien...
This guidebook takes a critical look at significant challenges and opportunities in family office operations and offers comprehensive guidance with a future-focused lens. Gain expert insight, strategies, and best practices on the top-of-mind issues that include strengthening your cybersecurity, leveraging your technology, the role of the chief inve...