This session with the Salgar Family will provide background on the transitions underway in their family and how they used the Family Charter / Constitution to reaffirm the family values, align their goals, and organize their governance process. As part of the move from the first generation to the leadership of Gen 2-3, the family outlined the key c...
We have the answers
Search Results
Join the Tsotsorkov family’s journey over the decades, from its entrepreneurial roots going back 250 years to its modern-day enterprise. Gen 2 family leader, Dimitar Tsotsorkov, shares the story of, and learnings from, the family’s recent efforts to capture and codify the unique values that have shaped the enterprise family and its ecosystem throug...
Philanthropy is no longer just a box to check on the year-end planning list – over the last decade, strategic philanthropy has emerged as an invaluable tool for maximizing family engagement and creating targeted impact. This overlap of values and interests provides critical structure for families to come together to make targeted gifts. Panelists f...
When a strategic plan is developed with the family's values and mission in mind, it can serve as a family-endorsed and impactful roadmap. In this event session, hear about FOX's work with developing a vision and mission statement, and from a seasoned family governance expert who has worked with families and family offices to create proven strategic...
Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
Sharing, documenting, and preserving family narratives are an important part of wealth planning and governance. This session explores how family histories can set a foundation for connection and continuity. Karen McNeill, PhD, Managing Director, Family History, Ascent Private Capital Management of U.S. Bank Moderated by Scott Winget, Enter...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
The tech industry has been undergoing a difficult period. Economic instability, high inflation, and rising interest rates have prompted tech companies to reevaluate their business strategies, adjust their growth plans, and revisit their staffing models. At the same time, there have been remarkable advancements with generative artificial intelligenc...
As family offices expand their technology footprint, cyberattacks are rising. Hackers continue to refine their approaches, but security controls and proactive planning can strengthen your family office cybersecurity defenses. Initially, focus on the key action items to validate your existing security setup and inform your plans to address any short...
Cyberattacks are impossible to completely prevent and the consequences of a data breach can be devastating. In addition to information and finances lost, breaches can result in downtime and reputational damage that can set your company far behind competitors. If your organization has experienced a cyberattack, there are three things that can b...
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Bu...
The cyber landscape is always evolving and requires proactive diligence, effective controls, and regular education to significantly reduce the risks. While the volume and complexity of threats continue to grow, experts agree that businesses can significantly reduce their exposure—and costs, if a breach occurs—by following some well-vetted best prac...
The use of artificial intelligence (AI) continues to spread with a staggering speed as it reshapes industries through improved efficiency, productivity, and decision-making. However, the meteoric rise and adoption of AI technology—including ChatGPT—can overshadow some valid concerns around security and privacy. Addressing those concerns, this repor...
We all want our children and grandchildren to be critical thinkers and to find their own way in the world. But we often want them to also adopt the family’s values and, in some cases, the responsibilities of running a family business. When those two goals are mutually exclusive, it can be a challenge to chart a course that embraces the future witho...
By now, most organizations have implemented mandatory annual cyber awareness training for their employees, covering topics such as phishing and social engineering attacks. While this education is thwarting cybercrime, it is only part of robust defense strategy. In looking back at the state of cyber in 2022 and highlighting important developments, w...