Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
We have the answers
Search Results
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
Effective philanthropy is a process of continual learning. An assessment plan will help you define and measure the progress of your partners, your strategy, and the governance and operations of your social impact vehicles. Find out how to create a robust learning agenda and assessment plan. This primer is the fifth in a series of seve...
How will you use your resources to achieve your philanthropic purpose? Learn how to consider the context in which you are operating, the role you want to play within that context, and what processes you need to implement to achieve those goals within your role. This primer is the fourth in a series of seven about the Family Giving Lifecycle...
The form of your giving must follow the function you intend for your philanthropy. Explore the vehicles and structures available to you and how to determine which best supports your philanthropic goals. This primer is the second in a series of seven about the Family Giving Lifecycle by the National Center for Family Philanthropy, comprising of s...
Cyberattacks are impossible to completely prevent and the consequences of a data breach can be devastating. In addition to information and finances lost, breaches can result in downtime and reputational damage that can set your company far behind competitors. If your organization has experienced a cyberattack, there are three things that can b...
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Bu...
The way individuals are approaching philanthropy has evolved in recent years, with philanthropists taking the very best of the corporate world and adding more rigor and measurement to how they give back to social causes, reprioritizing how and where they invest, and going beyond financial contributions to direct both time and talent to their philan...
The growth of ChatGPT and other artificial intelligence (AI) tools is not slowing down. From small startups to multinational corporations, employees across the spectrum are leveraging ChatGPT to enhance their productivity and streamline their workflows. Given the potential risks—including confidentiality and personal data and privacy violations—ass...
While every philanthropic journey is unique, there are points at which all families must make decisions. This series of seven short videos offers a comprehensive introduction and refresher to critical concepts to consider at each stage of your family philanthropy—from philanthropic purpose and selecting giving vehicles, to operations, successi...
Focusing on how companies are implementing enhanced security as the attacker-defender struggle continues, this Report dives into the 9 key takeaways along with other cutting-edge topics related to the data life cycle. While ransomware attacks decreased dramatically during 2022, they were again on the rise at the end of 2022 into 2023. Business emai...
Cyber threats and fraud schemes are designed to infiltrate and compromise your business. By using this cybersecurity resource guide and taking proactive actions to prevent cyber threats, you can strengthen your defensive strategy. This guide includes: Cyber Fraud Overview Recommendations and Resources Quick Reference Guide f...
Because nearly 90% of all foundations are set up with the intent to exist in perpetuity, their success depends on their ability to prepare for and manage change. The challenge isn’t merely a transition, but also the internal stress of balancing the energy and engagement of new blood with the experience and traditions of its senior members. Based on...
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...