The key to success of any risk management plan is the development of an “all risk” approach that takes the entire family enterprise into account. Through a survey of more than 200 family office executives at single and multi-family offices, an uncovering of some worrying approaches has surfaced around the risks that family offices face, particularl...
We have the answers
Search Results
Adding dual factor authentication to your social media helps make sure that you, and only you, can access your account. Instead of only entering a password to log in, an extra security key will be required to access your account. Step by step, learn how easy it is to configure for your Facebook, Instagram, LinkedIn, SnapChat, WhatsApp, and Twitter ...
The wealthy today are more optimistic about their financial opportunities—but they are also more worried about the risks they face, recognizing that their wealth could be lost in an instant in the face of threats like catastrophic weather events, cybercrime, theft, and liability settlements. To further gauge their concerns (and changing aspirations...
After several years of rapid innovation in areas like 5G connectivity, artificial intelligence (AI), health tech, and more, 2025 will be the year when these strides start to bear fruit and new technology goes from potential to proven. To prepare for meeting the tech challenges ahead and claim new opportunities amid the digital disruptions, here are...
Cybercrime has become more advanced over the years, but the level of sophistication could take a quantum leap forward with the explosive growth of generative artificial intelligence (AI) that can easily mimic a real person’s voice or create a scam website that looks exactly like a real one. The threat is keeping security professionals up at night. ...
The Global Risks Report is a comprehensive analysis of the most significant risks facing the world today. Designed to help understand the top risks for 2025 and over the next decade, this report provides insight into challenges and opportunities for risk leaders across industries. Developed by the World Economic Forum with support from strategic pa...
Capturing the insights from over 900 experts worldwide, this executive summary of the 2025 Global Risks Report highlights the key findings to support decision-makers in balancing present crises and longer-term priorities. The report also considers the survey findings and the range of implications, plus it provides six in-depth analysis of...
FOX has recently taken a closer look at the various types of capital available to families and the offices that serve them. One category not yet discussed at our forums is TIME CAPITAL. Given the limited nature of time, it is essential to allocate, invest, spend, and cherish the time we have. Time, as we experience it, is not linear, yet why do ...
In the thriving family, learning and growing must be both individual and across the family system. In this breakout participants will learn how the 10x10 Learning Roadmap can be used to develop group learning programs for all family members and/or for specific cohorts. This session is complementary to the day two session that focuses on the i...
What is your superpower? If you don’t know, well, you don’t get to put on the cape. Based on his book, Design for Strengths: Applying Design Thinking to Individual and Team Strengths and Weaknesses, John will share the “Design Thinking” mindset and process out of Stanford University, ubiquitously used at Apple, Google, Amazon, a...
In this session, participants will explore a comprehensive framework designed to address the essential question: how might we build a strong and connected family of wealth? The discussion will center on the ten core competencies crucial at each life stage for navigating the unique challenges and opportunities that wealth brings. Attendees will be e...
No one is immune from cybersecurity threats. And responsibility for protecting your data doesn’t rest with one person or provider. So it’s essential every organization follows at least some basic cybersecurity best practices. A great step toward ensuring your data is safe is to maintain good cyber hygiene. We recommend hiring a third party to co...
This annual cybersecurity update covers the leading threats you need to be aware of to keep your clients and your firm protected. 2021 cybersecurity trends and best practices will be shared.
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Identity theft occurs when personal information about an individual is stolen and used typically for financial gain. Criminals can obtain personal information electronically through hacking or illegally purchasing information from the Deep Web/Dark Web. They can also obtain information through paper records that are not properly disposed of or secu...