This session with the Salgar Family will provide background on the transitions underway in their family and how they used the Family Charter / Constitution to reaffirm the family values, align their goals, and organize their governance process. As part of the move from the first generation to the leadership of Gen 2-3, the family outlined the key c...
We have the answers
Search Results
Family offices may take on a variety of roles in service to the family, so it is essential that there is a strategy that helps frame the office’s purpose and an overarching plan to help align and execute against diverse interests. The panel will cover three key areas during this session: 1) Share critical questions to ask and answer when designing ...
Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
Cyberattacks are impossible to completely prevent and the consequences of a data breach can be devastating. In addition to information and finances lost, breaches can result in downtime and reputational damage that can set your company far behind competitors. If your organization has experienced a cyberattack, there are three things that can b...
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Bu...
Creating a family office and sustaining its success starts with a thorough assessment of your family’s priorities, objectives, and capabilities. Whether your family is considering forming a family office or evaluating one that already exists, there are ten questions that should be addressed to help put your family in the best position to be success...
Join host Damien Martin in his ongoing quest for insights and best practices for affluent families and their advisors as he sits down with guest Jeff Davidson to unpack the often mystifying and sometimes daunting world of the family office. Here’s what’s covered: Who is Jeff Davidson? @02:35 Developing a national family business succession pl...
Many successful families have put their shared values and goals in writing, often called a family constitution. A constitution can help build family unity and harmony, and the creation process itself provides benefits to the family. Learn the value that families can derive from creating a constitution, the work involved in creating one, and the top...
The growth of ChatGPT and other artificial intelligence (AI) tools is not slowing down. From small startups to multinational corporations, employees across the spectrum are leveraging ChatGPT to enhance their productivity and streamline their workflows. Given the potential risks—including confidentiality and personal data and privacy violations—ass...
Focusing on how companies are implementing enhanced security as the attacker-defender struggle continues, this Report dives into the 9 key takeaways along with other cutting-edge topics related to the data life cycle. While ransomware attacks decreased dramatically during 2022, they were again on the rise at the end of 2022 into 2023. Business emai...
Cyber threats and fraud schemes are designed to infiltrate and compromise your business. By using this cybersecurity resource guide and taking proactive actions to prevent cyber threats, you can strengthen your defensive strategy. This guide includes: Cyber Fraud Overview Recommendations and Resources Quick Reference Guide f...
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
After a turbulent 2022, the technology industry is facing another busy year ahead amid a shifting M&A environment, widespread layoffs, and an increased focus on corporate governance. We analyze the trends that shaped the past year and look at the top seven bold predictions that will impact the technology industry. Be prepared for new prior...