Preparing to be a Forensic Accountant - Focus on Network Forensics
June 19, 2025
Webinar
1.5 CPE
Instructor
Lynn Fountain
Preparing to be a Forensic Accountant - Focus on Network Forensics
View Bio
Instructor
Lynn
Fountain
View Bio
Lynn Fountain
Bio
Lynn Fountain, CGMA, CRMA, MBA
Overland Park, Kansas
Lynn Fountain has over 35 years of experience spanning public accounting, corporate accounting and consulting. 20 years of her experience has been working in the areas of internal and external auditing. She is a subject matter expert in multiple fields including internal audit, ethics, fraud evaluations, Sarbanes-Oxley, enterprise risk management, governance, financial management and compliance and she has held two Chief Audit Executive positions for international companies. She currently is engaged in her own consulting and training practice and has trained internationally. Ms. Fountain is a discussion leader for the AICPA for numerous classes as well as conducting her own various training courses. Topics include fraud and forensic courses for both profit and not-for profit, internal controls for large and small entities, COSO 2013, ethics, and risk management and various leadership courses.
Ms. Fountain is the author of three separate technical books released in 2015. The first book entitled “Raise the Red Flag – The Internal Auditors Guide to Fraud Evaluations” was published by the Institute of Internal Auditors Research Foundation and released in April 2015. She will be a featured presenter at the Institute of Internal Auditors International convention in July 2016 conducting a half-day training on her book, “Raise The Red Flag”. Her second book “Leading The Internal Audit Function” was released in October 2015 by Taylor & Francis Publications. This book serves as the initial launch for a series of leading practice internal audit and information technology publications. In addition, her third book “Ethics and the Internal Auditor’s Dilemma” was released winter of 2016.
Ms. Fountain obtained her BSBA from Pittsburg State University and her MBA from Washburn University in Kansas. She has her CGMA, CRMA credentials and CPA certificate.
www.lynnfountain.net
fountainlynn1@gmail.com
Network forensics
defined as the investigation of network traffic patterns and data captured in transit between computing devices
can provide insight into the source and extent of an attack. It is used in forensic accounting and with the expansion of information technology it has become a growing field. Network forensics is a relatively new field of forensic science. Computing has become network centric. Data is now available outside of disk-based digital evidence. Network forensics can be performed as a standalone investigation or alongside a computer forensics analysis. When used alongside a computer forensic analysis it is used to reveal links between digital devices or reconstruct how a crime was committed. Network investigations deal with volatile and dynamic information and is a sub-branch of digital forensics. It relates to the monitoring and analysis of computer network traffic for information gathering, legal evidence, or intrusion detection. This course is a complement to our other courses in the series on becoming a forensic accountant.
Learning Objectives
Explore the basics of network forensic analysis
Discover and examine how web protocols impact network forensic analysis
Explore and examine how file transfer protocols impact network forensic analysis
Identify and understand encrypted traffic analysis