Robert Hudock Again on Winning Team at Defcon 15, the World’s Largest Computer Security CompetitionAssociated Press August 10, 2007
Robert J. Hudock, an associate in the Health Care and Life Sciences Practice in the firm's Washington, DC office, was for the second time in a row a key member of the winning team at the hackers-only Defcon conference, the world's largest computer security competition.
Out of approximately 100 participants in the "Capture the Flag" (CTF) competition at the 15th annual Defcon conference, held in Las Vegas August 3-5, 2007, Hudock was the only attorney participating among security and computer experts.
Hudock participated in the three-day CTF Information Security defense competition, where he worked on a computer network to detect other team software and server vulnerabilities. Each of the eight teams were scored on their success in defending their assigned network and in invading other team networks. The teams were finalists from a preliminary competition held in June involving approximately 160 teams from around the world. The Associated Press described the event in an article titled, "Hackers meet to exploit computer flaws: Annual Defcon show aims to demonstrate network vulnerabilities."
CTF contests are designed to serve as an educational exercise to give participants experience in securing a machine, as well as conducting and reacting to the possible attacks on computers and networks. Reverse-engineering, network sniffing, protocol analysis, system administration, programming, and cryptanalysis are all skills that contestants are required to hold. Additionally, these games often touch on many other aspects of information security, such as physical security, regulatory compliance, and software licensing.
In the Associated Press article, Hudock was quoted on the challenges faced from the stiff competition from a rival team.
Hudock has been an attorney in Epstein Becker & Green's Health Care and Life Sciences practice since 2000. Hudock advises leading financial and health institutions as well as innovative startup companies on identifying, evaluating and improving the security posture critical to its organization. He is a Certified Information Systems Security Professional and is certified by the National Security Agency to perform INFOSEC Security Methodology (IAM) audits.