BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
METHOD:PUBLISH
PRODID://NDCP//432193
BEGIN:VEVENT
DTSTAMP:20260505T200349
VTIMEZONE:America/Chicago
DTSTART:20260427T190000Z
DTEND:20260427T223700Z
UID:432193
SUMMARY:K2's Securing Your Data: Practical Tools For Protecting Information
LOCATION:Webinar
DESCRIPTION:K2's Securing Your Data: Practical Tools For Protecting Information\n\n04/27/26 02:00 PM CST\n - 04/27/26 05:37 PM CST\Description:\nSecurity is not optional, and yesterday’s security techniques do not minimize today’s security threats. Therefore, now is the time for you to tune up what you know about protecting sensitive data. This program will teach you the latest tools and techniques for securing your data, including encryption, virus protection, safe communications, electronic signatures, secure authentication, and more. You will also learn how to implement a practical, five-step approach to securing your PC and the questions you should ask your staff to ensure server-based information remains protected.
 Security failures, such as a breach of client or customer data, are costly – they can even drive your company out of business. So, what security tools do you need, and how should you use them to secure your sensitive data and systems? Can you afford to risk attempting to manage today’s threats using yesterday’s techniques? Participate in this program to learn how to identify viable and practical solutions to mitigating today’s security threats.
  
 Speakers:Thomas G. Stephens Jr., CPA.CITP, CGMA\Location:\nWebinar\n\n,
X-ALT-DESC;FMTTYPE=text/html:K2's Securing Your Data: Practical Tools For Protecting Information<br /><br />04/27/26 02:00 PM CST - 04/27/26 05:37 PM CST<br />Description:<br /><p style="text-align:justify">Security is not optional, and yesterday&rsquo;s security techniques do not minimize today&rsquo;s security threats. Therefore, now is the time for you to tune up what you know about protecting sensitive data. This program will teach you the latest tools and techniques for securing your data, including encryption, virus protection, safe communications, electronic signatures, secure authentication, and more. You will also learn how to implement a practical, five-step approach to securing your PC and the questions you should ask your staff to ensure server-based information remains protected.</p>

<p style="text-align:justify">Security failures, such as a breach of client or customer data, are costly &ndash; they can even drive your company out of business. So, what security tools do you need, and how should you use them to secure your sensitive data and systems? Can you afford to risk attempting to manage today&rsquo;s threats using yesterday&rsquo;s techniques? Participate in this program to learn how to identify viable and practical solutions to mitigating today&rsquo;s security threats.</p>

<p>&nbsp;</p>
<br><b>Speakers:</b><br>Thomas G. Stephens Jr., CPA.CITP, CGMA<br><br />Location:<br />Webinar<br /><br />,  
PRIORITY:3
TRANSP:TRANSPARENT
BEGIN:VALARM
TRIGGER:-PT5M
ACTION:DISPLAY
DESCRIPTION:Reminder
END:VALARM
END:VEVENT
END:VCALENDAR
