BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
METHOD:PUBLISH
PRODID://NDCP//478647
BEGIN:VEVENT
DTSTAMP:20260506T033040
VTIMEZONE:America/Chicago
DTSTART:20260917T160000Z
DTEND:20260917T165600Z
UID:478647
SUMMARY:Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 2 (Cryptology)
LOCATION:Webinar
DESCRIPTION:Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 2 (Cryptology)\n\n09/17/26 11:00 AM CST\n - 09/17/26 11:56 AM CST\Description:\nThis is a continuing part of our series on forensic accounting. Within this segment we discuss the concepts that are part of computer forensics known as cryptology. The term cryptography is from Ancient Greek and means “hidden secret”. It is the practice and study of techniques for secure communications in the presence of adversarial behavior. Cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Cryptography starts with secrets. Various aspects in information security such as data confidentiality, data integrity, authentication and non-repudiation (where a statement’s author cannot successfully dispute its authorship) are central to modern cryptography.
 Speakers:Lynn Fountain\Location:\nWebinar\n\n,
X-ALT-DESC;FMTTYPE=text/html:Preparing to be a Forensic Accountant - Focus on Computer Forensics - Part 2 (Cryptology)<br /><br />09/17/26 11:00 AM CST - 09/17/26 11:56 AM CST<br />Description:<br /><p>This is a continuing part of our series on forensic accounting. Within this segment we discuss the concepts that are part of computer forensics known as cryptology. The term cryptography is from Ancient Greek and means &ldquo;hidden secret&rdquo;. It is the practice and study of techniques for secure communications in the presence of adversarial behavior. Cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Cryptography starts with secrets. Various aspects in information security such as data confidentiality, data integrity, authentication and non-repudiation (where a statement&rsquo;s author cannot successfully dispute its authorship) are central to modern cryptography.</p>
<br><b>Speakers:</b><br>Lynn Fountain<br><br />Location:<br />Webinar<br /><br />,  
PRIORITY:3
TRANSP:TRANSPARENT
BEGIN:VALARM
TRIGGER:-PT5M
ACTION:DISPLAY
DESCRIPTION:Reminder
END:VALARM
END:VEVENT
END:VCALENDAR
