First of all, a big thank you to everyone who supported the first-ever Borders Tech Connect track.
We now have 46 subscribers here on Substack and 49 members in the LinkedIn group. That might not break the internet, but for a regional tech initiative focused on real-world impact, we’re delighted — and more importantly, we’re growing.
Special thanks to Oli Littlejohn, who led our first no-code track with a clear, practical energy that’s been hugely appreciated. The workshops are now live on our BTC Resources Page, and we’ve already heard how they’re being used by people working on live internal tools and no-code prototypes. That’s exactly what we hoped for — and it’s something we’ll continue with every BTC track going forward:
Real content. Still useful. Always available.
Up Next: Cybersecurity (But Make It Useful)
This time, we’re turning our attention to cybersecurity, not the headline-grabbing kind, but the practical, day-to-day kind that local businesses, community orgs, and internal teams can actually act on.
Meet-Up:
Think Like an Attacker
Tuesday 29 July | 12:00–14:00 | Borders College
We’re joined by Ross McKelvie, founder of Swordbreaker Ltd and CivTech winner, to explore how attackers think — and how we can defend what we build. Whether you’re buying software or building it yourself (especially in Airtable, Stacker, Zapier or Excel), this is about learning to see the weak spots before someone else does.
Workshop 1:
The No-Code ISMS Knowledge Hub
Friday 8 August | 10:00–13:00 | Borders College
This session isn’t just a workshop — it’s an invitation to build something real with BTC.
We’re kicking off a live, community-built Knowledge Hub for no-code security:
Platform profiles (Stacker, Softr, Glide, etc.)
Risk checklists and plain-language compliance guidance
Downloadable policies and templates
A public, open resource for the wider no-code community, not just the Borders
Whether you’re a builder, writer, designer or organiser, there’s a place for you in this.
Workshop 2:
Attack Surfaces & Social Engineering
Friday 15 August | 10:00–13:00 | Borders College
Led by Debbie Baird from Techscaler/CodeBase, this workshop explores two overlooked but highly effective cyber attack paths:
Your attack surface (the parts of your stack you’ve forgotten about)
Social engineering (how humans are usually the weakest link)
Perfect for anyone working on internal tools, spreadsheets, CRM systems or shared logins. Expect real-world scenarios, group work, and a few lightbulb moments.
Workshop 3:
Capture the Flag
Friday 29 August | 10:00–13:00 | Borders College
We wrap the track with a live cybersecurity game — a chance to test what you’ve learned in a safe, hands-on challenge.
You don’t need to be a coder. You don’t even need to win. You just need to show up and see how cyber attackers really think.
What’s Next?
We’ll post individual updates for each session (and maybe a few more Cold War-inspired visuals…). If you haven’t already, join the LinkedIn group, or follow us on Substack for updates.
Thanks again for being part of BTC — we’re building something together. Quietly. Competently. With strong passwords.