Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
We have the answers
Search Results
In December of 2017, the U.S. Tax Court decided in the Lender Management, LLC v. Commissioner case that deductions that were part of a taxpayer’s trade or business were deductible under Section 162; however, deductions under Section 212 were suspended through tax year 2025. Following the suspension of the 2-percent miscellaneous itemized deduc...
Cyber threats are seen as the third most impactful risk to businesses over the next three years, after the cost of capital and economic downturns, respectively. Threat actors are not only deploying new tactics using generative artificial intelligence (AI) to conduct more targeted and sophisticated attacks, but they are also advancing familiar threa...
Succession will happen—it’s a matter of when, not if—so families should approach it with strategic forethought, flexibility, and responsiveness to ensure a smooth, successful transition. Through three different scenarios that encompass most transitions, learn how the decision-making process succession varies in significant ways across those scenari...
Robust governance practices form the cornerstone of success for the family wealth enterprise, and ongoing succession planning is one element of a mature governance system. As family considers its future succession, it is vital to understand why a well-conceived plan is so important and what the critical elements of the plan entail. Here, we outline...