Download our Survival Guide for Healthcare Security Teams:
Playbook: Eliminating Breach Risks — 2025 Edition for midmarket organizations. Download to learn more

Incident Response Leaders from Pondurance Take Top Prize in SentinelOne Capture-the-Flag Event for the Second Year in a Row
In a repeat performance, professional threat hunters and incident responders from the Pondurance team have taken top honors in the SentinelOne Incident Responder Partner ThreatOps Challenge, a Capture-the-Flag (CTF) competition. Part of the CFO Forum, this event brings together professionals from the entire SentinelOne Partner ecosystem to engage in friendly competition. While all the competitors in this year’s event were exceptional, we’re proud to announce that William Gadzinski and Jeremiah Dennen brought the trophy back to Pondurance once again.
CTF competitions and exercises allow teams of cybersecurity experts, newcomers, and hobbyists to attempt to reach a pre-defined goal in the shortest amount of time - using any techniques they choose within the limitations of clearly stated rules. In this event, participants were challenged to quickly and accurately perform rapid incident analysis of a scenario created by SentinelOne. Without prior knowledge of the parameters of the event; each team was required to identify the situation, undertake a forensic investigation, and provide a complete analysis of the threat activity using SentinelOne’s suite of tools.
While we’re really proud of William and Jeremiah, everyone here at Pondurance would like to applaud all the contestants. Each of these events is a chance to learn new techniques, discover new ways to identify and block threat activity, and further knit together the community of cybersecurity professionals and practitioners. Even those who didn’t take home a trophy have advanced their careers, company reputations, and the overall ability of our industry to keep people safer in an ever-evolving threat landscape.
As for our team, no matter if it is on the stage of a CTF event or hunting down a threat actor in one of our customers’ environments, we look forward to the next challenge that comes our way.
