Date: June 19, 2018 Time: Noon ET (60 Minutes) Guest Speaker: Dr. David Yeske, CFP® Host: Carol Anderson, Founder & President, Money Quotient, PPI Dean of Financial Life Planning Dr. David Yeske, CFP® is known in the advisory world for his efforts to bring scientific rigor to the financial planning process. In a recent industry article, [...]
Date: March 6, 2018Time: Noon ET (60 Minutes)Guest Speaker: Chris Venn, Partner, The Legacy CompaniesHost: Timothy J. Belber, JD, AEP, PPI Dean of FusionPowerful client connections are the difference between lasting, successful business relationships, or an empty meeting room. Your expertise is important, but it takes more than that to truly connect with clients - it takes a powerful [...]
In this session, we discuss best practices for cybersecurity and data privacy, as well as federal and state legal considerations that drive business requirements. Please see the archives for Part 1, which focuses on the most urgent threats to business today, as identified by the FBI.
The news is awash with reports of identity theft. Equifax, Sony, Office of Personnel Management (OPM), Anthem and other hacks increasingly dominate the news and even bring our national election into question. We hear of ransomware hitting Merck Pharmaceuticals and our local hospitals. Insiders at Wells Fargo are using our identities to churn accounts for bonuses. Power grids and water supply systems are at risk, and the FBI reports that business email compromise (BEC) is a primary threat to all businesses within the United States. Why is this happening, and what can we do to protect ourselves? Should we even try? What are our legal obligations to our clients and employees? We have become completely reliant upon cutting-edge technologies. We love their convenience but often do not grasp the behavioral and organizational changes these new capabilities require, nor the vulnerabilities they create. Criminals rely on our inertia and procrastination. The good news is that there are some relatively simple and inexpensive steps that everyone can take to greatly enhance security. The first step is to change our mental models. This session will investigate the invisible rise of a cultural meme every bit as relentless and destructive as a hurricane and some relatively simple steps we can all take to better secure ourselves and others we have a duty to protect.
John A. and Tim share their highlights of the “Best of Fusion Collaboration 2017”. Several other Fusion Collaboration presenters and attendees share what they considered the best takeaways from this year’s event.