From risk management to objective perspectives to succession planning, boards are a crucial component to help the family business achieve longevity. Boards serve as a mechanism to clarify the mandates of the family and provide continuity and formal guidance to future generations. During this session, experts will share easy-to-implement governance ...
We have the answers
Search Results
Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
The tech industry has been undergoing a difficult period. Economic instability, high inflation, and rising interest rates have prompted tech companies to reevaluate their business strategies, adjust their growth plans, and revisit their staffing models. At the same time, there have been remarkable advancements with generative artificial intelligenc...
As family offices expand their technology footprint, cyberattacks are rising. Hackers continue to refine their approaches, but security controls and proactive planning can strengthen your family office cybersecurity defenses. Initially, focus on the key action items to validate your existing security setup and inform your plans to address any short...
Cyberattacks are impossible to completely prevent and the consequences of a data breach can be devastating. In addition to information and finances lost, breaches can result in downtime and reputational damage that can set your company far behind competitors. If your organization has experienced a cyberattack, there are three things that can b...
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Bu...
In the aftermath of a natural disaster, businesses will need to take the important steps to recovery. Here is a checklist to help guide you through that process. For additional tips and guidance on how to prepare for other disasters, see the following: Hurricane Safety Checklist Evacuation Checklist: Preparing for a Hurricane or S...
Being prepared and knowing how to respond to a hurricane or storm makes the difference in minimizing damage and protecting you, your family, and property. Here is a checklist to help guide you on what to do before and during hurricane season.
The wildfire season has caused unprecedented damage across the United States. With drought conditions prevalent across much of the western United States, the wildfire outlook continues above normal wildfire conditions. Learn what you can do to be prepared for it.
If you have been ordered to evacuate a storm area, knowing how to respond will help you protect your family and home before and after an evacuation. Learn the important steps to take when local authorities ask you to leave your home.
Before a hurricane or storm hits, plan in advance by having an evacuation “Grab and Go” checklist, with special considerations made for children, infants, and pets. Continue to follow all evacuation orders and allow for enough time to pack and inform family and friends if you need to leave your home.
With climate disclosures like TCFD (the Task Force on Climate-related Financial Disclosures) being mandated across the globe, it’s time for risk management professionals to prepare for it. This playbook explores climate-related disclosures through the lens of risk and insurance, providing you with the information, specialist insight, disclosure req...
The cyber landscape is always evolving and requires proactive diligence, effective controls, and regular education to significantly reduce the risks. While the volume and complexity of threats continue to grow, experts agree that businesses can significantly reduce their exposure—and costs, if a breach occurs—by following some well-vetted best prac...
The use of artificial intelligence (AI) continues to spread with a staggering speed as it reshapes industries through improved efficiency, productivity, and decision-making. However, the meteoric rise and adoption of AI technology—including ChatGPT—can overshadow some valid concerns around security and privacy. Addressing those concerns, this repor...