Once the family enterprise is clear on which values it aims to preserve, the next step is to integrate and execute those values in an intentional way. Enter: The B Corps. Certified B Corporations are leaders in the global movement for an inclusive, equitable, and regenerative economy. Join this session to learn how one family office achieved B Corp...
We have the answers
Search Results
Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
The tech industry has been undergoing a difficult period. Economic instability, high inflation, and rising interest rates have prompted tech companies to reevaluate their business strategies, adjust their growth plans, and revisit their staffing models. At the same time, there have been remarkable advancements with generative artificial intelligenc...
As family offices expand their technology footprint, cyberattacks are rising. Hackers continue to refine their approaches, but security controls and proactive planning can strengthen your family office cybersecurity defenses. Initially, focus on the key action items to validate your existing security setup and inform your plans to address any short...
Cyberattacks are impossible to completely prevent and the consequences of a data breach can be devastating. In addition to information and finances lost, breaches can result in downtime and reputational damage that can set your company far behind competitors. If your organization has experienced a cyberattack, there are three things that can b...
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Bu...
As enterprising families expand across generations, they often stray from their entrepreneurial wealth creation roots to a more risk-averse wealth-protection mode. However, if maintaining shared family capital across multiple generations is the goal, wealth protection mode is not an ideal strategy and may have some unintended consequences. Building...
It is not uncommon for enterprising families to end up making sub-optimal capital allocation decisions due to limited visibility into, and planning around, the entirety of their shared family assets. To optimize the value of shared family capital, both the business and other entities or advisors in the enterprise ecosystem must work in harmony. Wit...
The cyber landscape is always evolving and requires proactive diligence, effective controls, and regular education to significantly reduce the risks. While the volume and complexity of threats continue to grow, experts agree that businesses can significantly reduce their exposure—and costs, if a breach occurs—by following some well-vetted best prac...
The use of artificial intelligence (AI) continues to spread with a staggering speed as it reshapes industries through improved efficiency, productivity, and decision-making. However, the meteoric rise and adoption of AI technology—including ChatGPT—can overshadow some valid concerns around security and privacy. Addressing those concerns, this repor...
By now, most organizations have implemented mandatory annual cyber awareness training for their employees, covering topics such as phishing and social engineering attacks. While this education is thwarting cybercrime, it is only part of robust defense strategy. In looking back at the state of cyber in 2022 and highlighting important developments, w...
Cyber threats and fraud schemes are designed to infiltrate and compromise your business. By using this cybersecurity resource guide and taking proactive actions to prevent cyber threats, you can strengthen your defensive strategy. This guide includes: Cyber Fraud Overview Recommendations and Resources Quick Reference Guide f...
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
As the world becomes more digitally connected, cybersecurity risks will keep rising. The larger your digital footprint, the greater your cyber risk. With this self-defense guide and best practices by William Blair & Company, you can safeguard your online identity and protect yourself against the loss of personal data and assets.