Get ready to comply with the five new data privacy laws that will come into effect in January 2025 in Delaware, Nebraska, Iowa, New Hampshire, and New Jersey. With the active enforcement by several states’ Attorneys General and a trend toward broader applicability, data privacy compliance is becoming increasingly important and complex. Companies sh...
We have the answers
Search Results
Family offices of every size and type can serve as unknowing gateways to sensitive data and personal information due to their extensive financial dealings and relatively low maturity in cyber preparedness. These vulnerabilities make family offices attractive targets to threat actors who may not even need sophisticated hacking skills to compromise a...
This guidebook takes a critical look at significant challenges and opportunities in family office operations and offers comprehensive guidance with a future-focused lens. Gain expert insight, strategies, and best practices on the top-of-mind issues that include strengthening your cybersecurity, leveraging your technology, the role of the chief inve...
Cyber threats are seen as the third most impactful risk to businesses over the next three years, after the cost of capital and economic downturns, respectively. Threat actors are not only deploying new tactics using generative artificial intelligence (AI) to conduct more targeted and sophisticated attacks, but they are also advancing familiar threa...
The act of giving through family philanthropy can be a transformative experience for both family members and the communities they serve, sometimes with an impact that lasts generations. However, achieving a positive, enduring impact requires purposeful vision and decision making throughout the lifespan of the family's philanthropic work. With the d...
New cybersecurity guidance for artificial intelligence (AI) systems was issued jointly by the U.S. Cybersecurity and Infrastructure Security Agency, the FBI, the National Security Agency’s Artificial Intelligence Security Center, and cybersecurity agencies of Australia, New Zealand, the U.K., and Canada. The Guidelines, Deploying AI Systems Securel...
Amid the growing excitement surrounding generative artificial intelligence (AI) and other emerging technologies, CFOs in asset management and banking remain keenly focused on the impact that these tools can have on their clients. AI is enabling asset management firms to provide investors with valuable insights from extensive datasets, assisting the...
The U.S. Securities and Exchange Commission (SEC) released the Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure Rules in August 2023, requiring registrants to provide and report timely information about their cyber risk so that investors can make informed investment decisions. With the rules in place, the SEC expects tha...
Despite cybersecurity being noted as a top priority according to PwC’s 2024 Global Digital Trust Insights survey of 3,876 business and tech executives at the largest global companies, the actual progress on improving security is sluggish, even stagnant. By making one or two bold moves to put security at the epicenter of innovation, the top companie...
The evolution of cybersecurity threats is increasing at a rapid pace and becoming more sophisticated as they leverage the same advanced technologies and methodologies as cyber defense tools. No longer are cyberattacks focused primarily on financial incentives, they are also aiming at maximizing operational disruption. With the continuing cyber t...
Cybersecurity is a known and growing risk that all family offices need to address. The potential of a cybersecurity attack is no longer a matter of whether it will happen, it’s now a matter of when it will happen. During this interview with Brian Lucareli, attorney Jen Urban and co-chair of Cybersecurity & Data Privacy at Foley & Lardner ra...
As many as 20% of family offices have knowingly experienced a cyber security attack prior to the coronavirus pandemic, and it’s likely that number is significantly higher today. Learn how to build cyber protection from the surge in cybercrime, including how to reduce your digital footprint and what to do if you become a victim of a cyber breach. Pr...