• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us
OCD Tech Takes 1st in Capture the Flag Event

OCD Tech Takes 1st in Capture the Flag Event

October 30, 2019 Posted by Kate Upton Cybersecurity, IT Advisory Services, penetration testing

Saturday, October 26th was not a typical weekend afternoon for the team at OCD Tech. Instead of mowing our lawns and watching college football, we teamed up to compete at a Capture the Flag event… and came out on top.

For those unfamiliar, Capture the Flag (CTF) from an IT security perspective is an event where teams use their penetration testing and problem-solving skills to work through problem sets. When a particular problem is solved, the team will submit the “flag” for points and move on to the next problem set. Teams had a total of 7 hours to accumulate the most points that they could. 

OCD Tech sent 8 analysts to the competition and they were divided into 2 teams of 4. Respectively, the teams placed 1st and 3rd out of 14. The first-place team pulled away from the pack early on in the competition while the team placing third rallied right up until the end. Team 1 was represented by Michael Huffman, Huy Vu, and Greg Haapaoja. Team 2 was represented by Michael Hammond, Jill Kamperides, and Kate Upton.

 

3/4 of OCD TECH Team 1 from Left to Right: Huy Vu, Greg Haapaoja, and Scott Goodwin

We were glad to have our teams place but we were even more thankful for the opportunity to learn and to refine our skills. This event provided the perfect virtual playground for our analysts to practically apply the tools and knowledge they have to better service our current clients and as well as those who will trust us to provide IT security services in the future. We look forward to next year!

Tags: Capture The Flag CTFdata breachhackingIT Security
Share
4
Kate Upton

About Kate Upton

Kate Upton is the IT Government Compliance Team Lead at OCD-Tech. Kate has been with the firm since May 2019. Before joining the firm, Kate received her Bachelor’s degree in Political Science & Legal Studies from the University of Maine and went on to earn a Master’s degree from Northeastern University in Strategic Intelligence. She dedicates her time at the firm to meeting the unique compliance needs of clients in the Defense Industrial Base with projects including CMMC, NIST 800-171, NIST 800-53, and DFARS rules. Kate lives in Portland, Maine with her dog Lucy.

You also might be interested in

Vulnerabilities in the Cloud: Whose Responsibility is it Anyways?

Vulnerabilities in the Cloud: Whose Responsibility is it Anyways?

Aug 23, 2018

Many organizations are rapidly moving to the cloud for hosting everything from their products and services to their corporate infrastructure.

OCD TECH MICROSOFT PHISHING

Microsoft Phishing Scams Increase

Sep 27, 2023

Phishing scams involving Microsoft have soared in the past three[...]

Security Rule Compliance

Security Rule Compliance 

May 9, 2024

Understanding Your Risks For organizations in the healthcare industry, protecting[...]

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us
Prev Next