Practical analysis for investment professionals

interview


The Evolution of ESG: An Interview with Erika Karp

"Standards for disclosure around material ESG factors by sector are critical. Once we have this, we can start to innovate at a faster rate," says Erika Karp, founder of Cornerstone Capital.

Maximizing Your Philanthropic Impact

"With charitable giving," Eric Friedman, CFA, tells Sloane Ortel, "if you’re not focused on the evidence behind your approach and the potential outcomes, then you’re flying blind with respect to impact."

How (Not) to Sabotage Your Firm

Perusing an old war manual on how to sabotage organizations will spark instant recognition for any modern office worker. How can firms stop unintentionally sabotaging themselves?

Mastering Social Media for Wealth Management Pros

Advisers who “go social” have an edge in business. A wealth management veteran shares the story of his social media conversion and offers tips on how advisers can build their own personal brand online.

Martin Wolf on the Eurozone, the ECB, and General Investment Woes

Gustavo Teruel, CFA, recently spoke with Martin Wolf of the Financial Times about his latest book, recent developments in the eurozone, and the global investing outlook more generally.

Job Interview Preparation

The main strategy for successful interviews — and this is no surprise really — is to spend adequate time preparing. If you know that you are likely to be invited to tell interviewers about yourself and asked to discuss your weaknesses, there is no reason to walk into an interview without having crafted and practiced respectable responses.

What’s Really Behind the Plunge in Oil Prices?

Given the recent developments in the price of oil and their implications for the broader market, what follows is an interview with Daniel Lacalle, a specialist in energy and utilities.

Bruce Schneier: Cyberattacks Aren’t Going Away

After the online breach of JPMorgan Chase, cybersecurity awareness is growing in the financial world. But what exactly is cybersecurity (and cybervulnerability)? What can or cannot be done to make sensitive information more secure?



By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close