BEGIN:VCALENDAR VERSION:2.0 PRODID:-//ChamberMaster//Event Calendar 2.0//EN METHOD:PUBLISH X-PUBLISHED-TTL:P1H REFRESH-INTERVAL:P1H CALSCALE:GREGORIAN BEGIN:VTIMEZONE TZID:America/New_York BEGIN:DAYLIGHT RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=2SU DTSTART:20070101T000000 TZOFFSETFROM:-0500 TZOFFSETTO:-0400 TZNAME:Eastern Daylight Time END:DAYLIGHT BEGIN:STANDARD RRULE:FREQ=YEARLY;BYMONTH=11;BYDAY=1SU DTSTART:20070101T000000 TZOFFSETFROM:-0400 TZOFFSETTO:-0500 TZNAME:Eastern Standard Time END:STANDARD END:VTIMEZONE BEGIN:VEVENT DTSTART;VALUE=DATE:20210730 DTEND;VALUE=DATE:20210731 TRANSP:TRANSPARENT X-MICROSOFT-CDO-ALLDAYEVENT:TRUE SUMMARY:TAG Ed Class: CertNexus Cyber Secure Coder (CSC-210) DESCRIPTION:PCI-DSS Training Requirement Are You Compliant?Section 6.5 of the PCI Data Security Standard states that organizations must "Train developers at least annually in up to-date secure coding techniques\, including how to avoid common coding vulnerabilities." Training records and proof of competency are required. Achievement of an industry-recognized certification is accepted as proof. CertNexus Cyber Secure Coder (CSC-210)\, leveraging many of the OWASP Top Ten best practices\, focused on the knowledge and skills required to design and develop protected applications. This includes better understanding vulnerabilities that undermine security\, general strategy for dealing with security defects and misconfiguration\, and how to incorporate security into all phases of development.To access the full program\, please contact Heather Maxfield. X-ALT-DESC;FMTTYPE=text/html:
PCI-DSS Training Requirement &ndash\; Are You Compliant?
Section 6.5 of the PCI Data Security Standard states that organizations must &ldquo\;Train developers at least annually in up to-date secure coding techniques\, including how to avoid common coding vulnerabilities.&rdquo\; Training records and proof of competency are required. Achievement of an industry-recognized certification is accepted as proof.
 \;CertNexus Cyber Secure Coder (CSC-210)\, leveraging many of the OWASP Top Ten best practices\, focused on the knowledge and skills required to design and develop protected applications. This includes better understanding vulnerabilities that undermine security\, general strategy for dealing with security defects and misconfiguration\, and how to incorporate security into all phases of development.
To access the full program\, please contact Heather Maxfield. \;
LOCATION: UID:e.1848.370629 SEQUENCE:3 DTSTAMP:20240329T074632Z URL:https://members.tagonline.org/calendar/Details/tag-ed-class-certnexus-cyber-secure-coder-csc-210-366210?sourceTypeId=Hub END:VEVENT END:VCALENDAR