Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
We have the answers
Search Results
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
Cyberattacks are impossible to completely prevent and the consequences of a data breach can be devastating. In addition to information and finances lost, breaches can result in downtime and reputational damage that can set your company far behind competitors. If your organization has experienced a cyberattack, there are three things that can b...
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Bu...
Each family’s legacy is as unique as the family itself. It can be a bloodline, a name, heirlooms, a legal entity or family stories, myths, and artifacts. In this fourth and final report in the series on family business succession, key insights are shared on the important role that legacies play in uniting the core purpose of the business with the f...
The growing use of video and automated technology, including artificial intelligence (AI), in employment practices—and the concern that the technology may foster discrimination and bias—has triggered a wide array of regulatory efforts. At least 11 statutes have been introduced targeting the use of AI-related technology to assist with employment dec...
Many employers have begun using artificial intelligence (AI) tools supplied by third-party vendors. On May 18, 2023, the Equal Employment Opportunity Commission (EEOC) provided guidance indicating that, in its view, employers are generally liable for the outcomes of using selection tools to make employment decisions. Learn more about what tool...
In this interview, attorney John Litchfield of Foley & Lardner’s Labor & Employment group discusses the key considerations family offices should keep in mind when it comes to domestic workers in the family office environment. Along with insights on household staff salary and wage treatments in accordance with the Fair Labor Standards Act (F...
The growth of ChatGPT and other artificial intelligence (AI) tools is not slowing down. From small startups to multinational corporations, employees across the spectrum are leveraging ChatGPT to enhance their productivity and streamline their workflows. Given the potential risks—including confidentiality and personal data and privacy violations—ass...
Focusing on how companies are implementing enhanced security as the attacker-defender struggle continues, this Report dives into the 9 key takeaways along with other cutting-edge topics related to the data life cycle. While ransomware attacks decreased dramatically during 2022, they were again on the rise at the end of 2022 into 2023. Business emai...
Cyber threats and fraud schemes are designed to infiltrate and compromise your business. By using this cybersecurity resource guide and taking proactive actions to prevent cyber threats, you can strengthen your defensive strategy. This guide includes: Cyber Fraud Overview Recommendations and Resources Quick Reference Guide f...
From Australia to United States and many places in between, this Global Employer Guide reflects an easy-to-read summary of employment law that changed in each country over the past year, including pandemic-related changes where applicable. Visa processes, employee rights, contract requirements, transfer of business considerations, privacy standards...
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
Employing service providers in your home carries considerable risk. If not handled with extreme care, the process of hiring, termination, and managing day-to-day responsibilities can create liability—and even result in claims of discrimination and retaliation by the employee. This report provides a snapshot of an increasingly complex employment lan...