admin

/admin

About admin

This author has not yet filled in any details.
So far admin has created 458 blog entries.

What Their Stories Reveal: Getting to The Heart of What Matters Most to Your Clients

Join legacy specialist Susan Turnbull and story expert Lani Peterson, PsyD as they share their process of deepening client engagement through the lens of stories. Using an easy to learn strategy, Susan and Lani will share their universally applicable narrative framework for uncovering and exploring the themes and values revealed through clients’ life experiences. This story listening approach yields not only deeply engaging interaction but rich source of material for planning, especially in the realm of envisioning legacy, sometimes a difficult or awkward subject to talk about in any depth.

By | November 7th, 2017|Purposeful Conversations, The Best of Legacy & Purposeful Planning|

Traditions and Family – The ThankMas Season

We are rapidly approaching the holiday season, a time for families and joyous traditions, and perhaps too much pie, turkey, etc.  What gets lost in the commercialization of the holiday season, are the opportunities we have as individuals and families to make, honor and celebrate traditions.  In this call, John A. Warnick shares a number of simple but powerful ways in which we can take advantage of what Lee Brower calls Thankmas.  Learn about Thankmas and several other ways in which you can help your family and your clients strengthen family bonds, create meaningful traditions, and explore the pathway to a more significant and purposeful life in 2018.

Fighting A Meme – How to Keep What We Build During the Proliferation of Cyber Crime (Part 1 of 2)

The news is awash with reports of identity theft.  Equifax, Sony, Office of Personnel Management (OPM), Anthem and other hacks increasingly dominate the news and even bring our national election into question.  We hear of ransomware hitting Merck Pharmaceuticals and our local hospitals.  Insiders at Wells Fargo are using our identities to churn accounts for bonuses.  Power grids and water supply systems are at risk, and the FBI reports that business email compromise (BEC) is a primary threat to all businesses within the United States. Why is this happening, and what can we do to protect ourselves? Should we even try?  What are our legal obligations to our clients and employees?  We have become completely reliant upon cutting-edge technologies.  We love their convenience but often do not grasp the behavioral and organizational changes these new capabilities require, nor the vulnerabilities they create.  Criminals rely on our inertia and procrastination.  The good news is that there are some relatively simple and inexpensive steps that everyone can take to greatly enhance security.  The first step is to change our mental models. This session will investigate the invisible rise of a cultural meme every bit as relentless and destructive as a hurricane and some relatively simple steps we can all take to better secure ourselves and others we have a duty to protect.

By | October 24th, 2017|Technical Corner, The Business of the Practice|

Gen Z: What is the Impact of a Generation Raised in a Digital World?

“What adults can learn from Kids,” a TED talk by a Gen Z member, captures this generation’s desire to impact the world. As they view technology as commonplace, they have the power to utilize this to change family and business relationships. Through interactive exercises focused on Generational Thinking, this call questions our approaches to the governance and wealth transfer tools designed with top-down approaches. 

By | October 17th, 2017|Purposeful Next-Gen Collaboration|