The new cyber risk paradigm requires organizations to become more comfortable with the reality that the connective tissue of modern business is digital. Given this landscape and the increasing cyber threat, organizations are recommended to implement twelve cyber hygiene controls that are key to achieving cyber resilience and insurability. ...
We have the answers
Search Results
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
While each family office has its own unique makeup and course to success, there are many recurring themes over the years which, when aggregated, form something of a roadmap which can be used to help guide other families on their own unique journeys—be they new to wealth or several generations deep. Against that backdrop, this eBook brings collectiv...
This breakout session will expand on the methods introduced earlier, sharing specific tools and techniques that can help families get ‘unstuck’ and move their enterprises forward. The authors of Build an Enterprise Family to Last: Proven Strategies to Thrive Across Generations will highlight milestones that have helped families explain co...
FOX founder Sara Hamilton, together with Margaret Vaughan Cox, will describe what a complex enterprise family looks like and share a new framework, detailed in their recently published book, Build an Enterprise Family to Last: Proven Strategies to Thrive Across Generations, that distinguishes the Family Journey, the Enterprise Journey, an...
Defining a family enterprise’s governance structures is a journey, not a destination. In this webcast Stephanie Traversy, Vice President of Personal Development and Governance at Bridgegreen Capital, will unpack four critical milestones along the path to purposeful governance. She’ll cover why families need to establish their higher purpose and lon...
For business and wealth creators, preserving the family in the midst of wealth is far more difficult than creating the wealth. Integrating second and third generations into ownership and decision-making is something business builders haven’t yet experienced. We focus on 14 strategies families can use to integrate rising generations and pass down re...
No one is immune from cybersecurity threats. And responsibility for protecting your data doesn’t rest with one person or provider. So it’s essential every organization follows at least some basic cybersecurity best practices. A great step toward ensuring your data is safe is to maintain good cyber hygiene. We recommend hiring a third party to co...
This annual cybersecurity update covers the leading threats you need to be aware of to keep your clients and your firm protected. 2021 cybersecurity trends and best practices will be shared.
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
The internet and specifically e-commerce has grown exponentially over the last 30 years, incorporating nearly every aspect of trade. As a result, industries and governmental agencies have blossomed to ensure cybersecurity, expending over $150 billion annually to combat this persistent threat. As this market segment continues to expand, crippling cy...
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
Fraud is happening at your organization; you just don’t know it. Then again, maybe you do, but you are not sure how pervasive the problem is, where to begin your anti-fraud journey, or how to enhance your current fraud risk management practices. This playbook—which includes templates, checklists, and tools—draws from best practices and leading guid...
Enterprise families are unique because they share ownership and stewardship of more than just family businesses. In addition to co-owning operating companies, they are the guardians of family legacy, family trusts, shared philanthropy, and joint properties. As leadership moves from founders to siblings to cousins and family priorities change, the d...