Exam Security Threats Presentation and Panel Discussion

Share This Post:

Facebook
Twitter
LinkedIn
Email

This session was held on Thursday, July 15, 2021

At the ITCC’s July Education Session, the Securing Certifications task force presented on the findings from the Exam Security Threats survey and interviews.

The goal of the Exam Security Threats survey was to help us all understand how effective programs have found various security techniques to be in mitigating different types of threats to certification exams. 

Rather than attempting to show how many programs are using what technique, the ITCC wanted to show what techniques programs are finding useful – based on their unique business model.

After the survey was completed in early 2020, the Securing Certifications task force continued with an interview process to add further support, detail, and context to the survey data with anecdotal stories. This input was vital to ensuring better representation and stronger statistics in the report.

At the education session on July 15th, the co-chairs of the Securing Certifications task force, Karyn Waller-Finkelstein from Teradata and Stephanie Dille from Meazure Learning, presented on the survey results and then lead a panel discussion with participants from the interview process. Corina Owens from Alpine Testing provided data analysis to help present the survey results in a meaningful way.

The panelists will include: Clyde Seepersad from The Linux Foundation, Liberty Munson from Microsoft, Pete Van Dyke from AWS, and Adam Rabidoux from Juniper Networks.

Related Posts

Download Our Free Resource

There’s something about the word “certified” when it precedes a professional title that conveys the consumers and employers a sense of trust, credibility, knowledge and an official “stamp” of approval. This is not a coincidence. IT certification has long been a proven means of differentiation and qualification among professionals in the industry. Employers often include certification as a prerequisite when seeking qualified candidates to fill positions; consumers often trust only those IT professionals who boast credentials proving they have attained a certain level of knowledge.