Please join us for a continuation of our conversation with the Industry Founders panel. James (Jay) E. Hughes Jr., Author of Family Wealth: Keeping it in the Family, and of Family - The Compact Among Generations Sara Hamilton, Founder and Board Chair, FOX Dennis T. Jaffe, Senior Research Fellow, BanyanGlobal Family Business Advisors Ellen Per...
We have the answers
Search Results
For nearly 40 years, the pioneers of the family wealth profession have been working with family leaders and family office executives to help their families manage and grow their enterprises, strengthen their family systems and well-being, and deliver a positive impact on their communities and the world. For the first time ever, FOX will gather on t...
Cybersecurity is by no means novel, but in an evolving landscape affected by new technologies, geopolitical tensions, and a larger-than-ever digital footprint, the importance of your family office’s cyber strategy cannot be overemphasized. Join us to learn how SEI’s experience as a regulated financial firm translates to a hyper awareness of existin...
This fireside chat will focus on the challenges that family offices are facing today and how to maximize insight into financials. We will identify solutions that Sage Intacct can offer to help streamline your multi-entity management, data security, and transaction automation with artificial intelligence and machine learning technology. Karen M. ...
Our annual cybersecurity update will discuss one of the leading cybersecurity risks to your firm and your clients—ransomware. With the instances of ransomware attacks rising every day, wealthy family offices are particularly attractive targets to cybercriminals. In this webinar, Baker Tilly Cybersecurity Principal Joe Shusko provides insights on ma...
At some point on your family journey and through the key life stages, you may take a step back and realize the wealth and legacy you’ve created are going to live on for generations. As you begin to reflect, you can look to the legacy and estate planning guide in this Digest as a starting point. You’ll also find helpful checklists, thoughtful questi...
Cyberattacks are impossible to completely prevent and the consequences of a data breach can be devastating. In addition to information and finances lost, breaches can result in downtime and reputational damage that can set your company far behind competitors. If your organization has experienced a cyberattack, there are three things that can b...
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Bu...
As enterprising families expand across generations, they often stray from their entrepreneurial wealth creation roots to a more risk-averse wealth-protection mode. However, if maintaining shared family capital across multiple generations is the goal, wealth protection mode is not an ideal strategy and may have some unintended consequences. Building...
It is not uncommon for enterprising families to end up making sub-optimal capital allocation decisions due to limited visibility into, and planning around, the entirety of their shared family assets. To optimize the value of shared family capital, both the business and other entities or advisors in the enterprise ecosystem must work in harmony. Wit...
The growth of ChatGPT and other artificial intelligence (AI) tools is not slowing down. From small startups to multinational corporations, employees across the spectrum are leveraging ChatGPT to enhance their productivity and streamline their workflows. Given the potential risks—including confidentiality and personal data and privacy violations—ass...
Wealthy families have a significant positive socio-economic impact around the world, but lasting impact depends on those families prospering for generations. This is not guaranteed, however, and more intergenerational wealth transfers succeed if families adopt a modern Family Office model that suits their needs and goes beyond managing and gro...
Focusing on how companies are implementing enhanced security as the attacker-defender struggle continues, this Report dives into the 9 key takeaways along with other cutting-edge topics related to the data life cycle. While ransomware attacks decreased dramatically during 2022, they were again on the rise at the end of 2022 into 2023. Business emai...
Cyber threats and fraud schemes are designed to infiltrate and compromise your business. By using this cybersecurity resource guide and taking proactive actions to prevent cyber threats, you can strengthen your defensive strategy. This guide includes: Cyber Fraud Overview Recommendations and Resources Quick Reference Guide f...
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...