Join the Tsotsorkov family’s journey over the decades, from its entrepreneurial roots going back 250 years to its modern-day enterprise. Gen 2 family leader, Dimitar Tsotsorkov, shares the story of, and learnings from, the family’s recent efforts to capture and codify the unique values that have shaped the enterprise family and its ecosystem throug...
We have the answers
Search Results
Family advisors often have a strong technical or financial background, but the importance of cultivating communication style, emotional intelligence, coaching skills, trust-building, and similar qualitative skills to serve clients cannot be overstated. Join a panel of peers who will share how they meaningfully engage with family clients and discuss...
Once the family enterprise is clear on which values it aims to preserve, the next step is to integrate and execute those values in an intentional way. Enter: The B Corps. Certified B Corporations are leaders in the global movement for an inclusive, equitable, and regenerative economy. Join this session to learn how one family office achieved B Corp...
Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Many wealth advisors and specialists have a strong technical or financial background, but the importance of cultivating interpersonal and relational skills to serve families cannot be overstated. Join a panel of exceptional peers who discuss the invaluable impact of continuous development in the everchanging environment many advisors and specialist...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
As families grow their investment function, the Chief Investment Officer (CIO) must provide insight and flexibility to serve varied and changing investment platforms. While much of the CIO’s role is focused on investments and the investment decision-making process, many CIO responsibilities aren’t investment-centric and will impact the long-term su...
Cyberattacks are impossible to completely prevent and the consequences of a data breach can be devastating. In addition to information and finances lost, breaches can result in downtime and reputational damage that can set your company far behind competitors. If your organization has experienced a cyberattack, there are three things that can b...
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Bu...
In moving past the “shirtsleeves to shirtsleeves in three generations” adage, advisors in the family wealth space are emphasizing the importance of the family’s qualitative capitals that go beyond serving only the financial capital goals. This shift has elevated the family client experience and expectations. It’s part of the Wealth 3.0 movement tha...
The growth of ChatGPT and other artificial intelligence (AI) tools is not slowing down. From small startups to multinational corporations, employees across the spectrum are leveraging ChatGPT to enhance their productivity and streamline their workflows. Given the potential risks—including confidentiality and personal data and privacy violations—ass...
Focusing on how companies are implementing enhanced security as the attacker-defender struggle continues, this Report dives into the 9 key takeaways along with other cutting-edge topics related to the data life cycle. While ransomware attacks decreased dramatically during 2022, they were again on the rise at the end of 2022 into 2023. Business emai...
At its core, a mission statement serves as a compass, continually steering an organization or business toward their goals. For the families who undertake the process of creating a mission statement, it provides a similar and essential navigational tool. To be successful, however, the mission statement must resonate and mean something to everyone in...
Cyber threats and fraud schemes are designed to infiltrate and compromise your business. By using this cybersecurity resource guide and taking proactive actions to prevent cyber threats, you can strengthen your defensive strategy. This guide includes: Cyber Fraud Overview Recommendations and Resources Quick Reference Guide f...