About admin

This author has not yet filled in any details.
So far admin has created 461 blog entries.

Fighting A Meme – How to Keep What We Build During the Proliferation of Cyber Crime (Part 2 of 2)

In this session, we discuss best practices for cybersecurity and data privacy, as well as federal and state legal considerations that drive business requirements.  Please see the archives for Part 1, which focuses on the most urgent threats to business today, as identified by the FBI.

By | 2017-11-06T11:37:57+00:00 October 31st, 2017|Technical Corner, The Business of the Practice|

Fighting A Meme – How to Keep What We Build During the Proliferation of Cyber Crime (Part 1 of 2)

The news is awash with reports of identity theft.  Equifax, Sony, Office of Personnel Management (OPM), Anthem and other hacks increasingly dominate the news and even bring our national election into question.  We hear of ransomware hitting Merck Pharmaceuticals and our local hospitals.  Insiders at Wells Fargo are using our identities to churn accounts for bonuses.  Power grids and water supply systems are at risk, and the FBI reports that business email compromise (BEC) is a primary threat to all businesses within the United States. Why is this happening, and what can we do to protect ourselves? Should we even try?  What are our legal obligations to our clients and employees?  We have become completely reliant upon cutting-edge technologies.  We love their convenience but often do not grasp the behavioral and organizational changes these new capabilities require, nor the vulnerabilities they create.  Criminals rely on our inertia and procrastination.  The good news is that there are some relatively simple and inexpensive steps that everyone can take to greatly enhance security.  The first step is to change our mental models. This session will investigate the invisible rise of a cultural meme every bit as relentless and destructive as a hurricane and some relatively simple steps we can all take to better secure ourselves and others we have a duty to protect.

By | 2017-10-31T08:35:05+00:00 October 24th, 2017|Technical Corner, The Business of the Practice|

Gen Z: What is the Impact of a Generation Raised in a Digital World?

“What adults can learn from Kids,” a TED talk by a Gen Z member, captures this generation’s desire to impact the world. As they view technology as commonplace, they have the power to utilize this to change family and business relationships. Through interactive exercises focused on Generational Thinking, this call questions our approaches to the governance and wealth transfer tools designed with top-down approaches. 

By | 2017-10-20T12:34:47+00:00 October 17th, 2017|Purposeful Next-Gen Collaboration|

Enemies of Communication

When faced with a difficult conversation, most us drag our feet – and in many instances, avoid the tough issues. These conversations consume time, space and energy while impacting the health of the people involved and our relationships.  This often makes communication reactionary rather than responsive and deliberate. There is no “real” communication when reaction is in play impacting the listening levels.  This session explores ways to identify and control enemies of communication and improve client relationships. 

By | 2017-09-28T14:13:01+00:00 September 26th, 2017|Uncategorized|

Managing Family Conflict Informed by Bowen Family Systems Theory

Consultants in the field of family enterprise are often faced with families having considerable conflict as they make decisions around wealth, succession, and legacy. Bowen family systems theory informs how to manage conflict so that families can overcome it and move towards their goal. If the consultant can “stay relatively out of the system and be in contact with it, the system itself will begin to settle down” (Bowen, 1979). When anxiety decreases, people can think better. In this call, I will provide some concrete ideas on how to facilitate the shift from conflict to collaboration.

By | 2017-10-13T12:02:33+00:00 September 25th, 2017|Family Office Summit, Intersections|