Take a Virtual, Interactive Tour 

Events, Cyber Security, People, Places, and Things

  |  
3 Min Read

What are DEFCON Groups (DCG or DC-Groups)?

 

dcg-logo-light

 

DCGs are a gathering point for folks interested in the alternate applications of modern technology, referred to properly as "hacking." DCGs are not intended to compete with any other computer groups, such as 2600, but rather to provide yet another gathering place for the discussion of technology and security topics.

DCG meetings are open to anyone and are designed to help members learn new things, meet new people, mentor others in areas you may be strong in, and provide some cohesion within the hacker culture and its members.

 

How did DCGs come into existence?

 

DEF CON Groups (DCG) were the brainchild of former University of Advancing Technology (UAT) Program Champion for Network Security, Russ Rogers. As part of his role as a DEF CON Goon (staff) the program was introduced at DEF CON 12 in Las Vegas, NV., about 15 years ago.

DCG’s were created across the country with the first two being DC719 (Colorado Springs, CO) and DC480 (Phoenix, AZ) with the majority of the members being a part of UAT. The purpose of DCG is to bring like-minded people together in an environment of safe collaboration and knowledge sharing of Cybersecurity Topics. Currently there are over 270 different DCGs, spanning about half the US states and 20+ various countries around the world.

 

What DCG is in Arizona?

 

Screen Shot 2019-07-02 at 10.02.11 AM

 

Comment

Special Topics in Technology: Open Source Intelligence

Using Shodan to Look for Vulnerable Critical Infrastructure Students at the University of Advancing Technology are often tasked with real world goals designed to make them flex and grow while ...
Picture of Aaron Jones Aaron Jones 3 Min Read

To Tempe Town and Beyond

There’s so much more to Arizona than the desert. For students new to the area, it would be easy to just stick around campus and play video games, but don’t do that! Take advantage of all that Tempe ...
Picture of Lisha Dunlap Lisha Dunlap 3 Min Read

Warning: Your iPhone has been Hacked

Latest Apple Hack Leaves Users Open to Spyware You may have recently heard about the extremely important update being pushed out to Apple iOS devices (iOS 14.8). You may have heard terms like zero ...
Picture of Aaron Jones Aaron Jones 3 Min Read