In a competitive global marketplace, employers across the United States spend countless resources attempting to set themselves apart and claim their share of available business opportunities. Against that backdrop, it is easy to understand why employers will do everything possible to protect the confidential information they have created and the go...
We have the answers
Search Results
Ask a wealth management colleague to define “the cloud” and you are likely to get a vague response. Even among information technology experts, the term “cloud” may refer to different technologies that are only connected in a general sense. And despite the fact that cloud computing has quickly become the IT norm, the question...
Families of significant wealth often own a diverse mix of assets, including multiple residences, less liquid alternative or private equity investments, and valuable collectibles, all of which requires more sophisticated planning. They also have somewhat different emotions about their wealth that can include, among others, fear that wealth can have ...
The revolution of the “information age” has created tremendous advantages and helped accelerate innovation, but it has also brought with it new risks—namely cyber attacks. While the corporate attacks get most of the media attention, do not forget that individuals—especially the high net worth—need to be vigilant about cyber security. The good news ...
Cloud-based applications, also known as Software as a Service (SaaS), offer significant benefits. They are highly affordable, require minimal IT involvement, have no hardware requirements, and offer great flexibility. Yet there can be significant risks to a firm if it does not review vendors carefully. Unfortunately, security controls vary signific...
Data breaches have become an accepted fact of modern business. According to the Privacy Rights Clearinghouse, twenty-nine businesses reported data breaches in August of 2016 alone. No industry was safe. For many organizations, the question now is not “if,” but “when.” This year appears to be on pace to surpass the number of ...
This presentation uses survey data and case studies to explore non-monetary incentives employed by single and multi-family offices including policies for paid time off and other benefits and perqs. Most single family offices are smaller organizations that employ 20 or fewer people. Their policies related to non-monetary incentives vary dependi...
A rising generation of clients in their 20s and 30s turned to Jim Steiner, president of Abbot Downing, and asked him to share his insights, both as a parent and a wealth management leader. Through four memorable stories and thoughtful questions, Mr. Steiner reflected on matters of career, philanthropy, family, and leaving a legacy. He beg...
Fund groups face disruptive developments, as advances in financial technology, often called fintech, continue at an ever more rapid pace. Even as new efficiencies and opportunities blossom, regulators have pushed financial firms to recognize the dangers of technological failures. To prepare for the changes ushered in by fintech, it is important for...
The hedge fund industry got started in Greenwich when the location offered access to the best talent, tax and business incentives, and proximity to key executives’ homes. These important factors and the trend towards a private investment model have been shifting and accelerating the location of hedge funds and private equity firms to Palm Bea...
The family wealth industry is at a strategic inflection point with a future that’s both bright and turbulent. Wealth professionals will face challenges driven by the rising complexity of the families they serve and the imperative to evolve quickly and serve a broader range of their clients’ needs and expectations.  ...
Increased use of modern networking technologies, including social media, is creating new forms of participation, shifting power from producer to citizen and building customer sovereignty. For corporations and organizations, entry into the digital society rests on new economic principles, rules of play, and collaborative business models.
Recognize that a cyber attack will occur at some point during a business lifecycle. Whether it is through web attacks, email phishing, exploit kits, point of sale, keystroke logging, or ransomware, the bad actors have figured out how to defeat your latest defense against a cyber attack. They know what will make you click on the link that will give ...
Cybercriminals targets the financial industry 300 times more frequently than any other industry, resulting in mega breaches and millions of records stolen through hacktivism, malware, social engineering, phishing, and other applications. The harsh consequences of remaining vulnerable to cybersecurity breaches are costly, and the number one threat t...