SCI Family Office Services

A Family Office working with SCI can expect the following

ASSESSMENT
Conduct a thorough review of the family members, their staff and their assets, looking at both the security measures currently in place compared to Best Practice appropriate to the vulnerabilities.

STRATEGY
Build a balanced security strategy that draws from the Threat and Vulnerability Report, suggests recommendations, and presents mitigating factors. The strategy development forms an integral part of the security framework.

PLAN
Building on the strategy framework, a detailed plan will be developed, incorporating adequate, tailored solutions. The plan will mitigate the determined risks and allocate costs and resources.

IMPLEMENT
Select the right people, implement policies and procedures, install the right systems and infrastructure, monitor media and cyber threats – train, test and prepare.

SUPPORT
Ongoing monitoring, assistance, and advice to ensure a complete evolving solution that can grow with you.