Tino Sokic

Unleashing the Power of Developers: Why Cybersecurity is the Missing Piece?!?

What if the biggest security threats aren't in your code, but in your process? Learn the ten common vulnerabilities that have nothing to do with coding.

Unleashing the Power of Developers: Why Cybersecurity is the Missing Piece?!?
#1about 3 minutes

Why we must trust developers like airline pilots

Software developers hold immense responsibility for critical infrastructure, similar to pilots, yet the industry lacks the same level of regulation and assumed trust.

#2about 4 minutes

Proposing a Hippocratic oath for software engineering

An ethical oath, similar to the one doctors take, should be adopted by software engineers and managers to prioritize user welfare and security.

#3about 6 minutes

Ten software vulnerabilities that have nothing to do with code

Security flaws often originate from non-technical issues like poor requirements, inadequate testing, technical debt, and resistance to change.

#4about 4 minutes

Introducing the Human Software Development Lifecycle

The HSDLC model emphasizes incorporating the human element and user feedback throughout every stage, from planning and design to deployment and iteration.

#5about 5 minutes

A song about weak passwords and encryption

A musical performance highlights common cybersecurity mistakes like using weak passwords and failing to implement proper encryption.

#6about 2 minutes

Defining vulnerability versus a threat in cybersecurity

A vulnerability is simply a weakness in a system, whereas a threat is the agent or action that exploits that weakness to cause harm.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

Related Articles

View all articles
CH
Chris Heilmann
Dev Digest 138 - Are you secure about this?
Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Dev Digest 138 - Are you secure about this?
DC
Daniel Cranney
Dev Digest 194: AI vs. Version Control, Password Louvre & Cursed Webdev
Inside last week’s Dev Digest 194 . 🧠 Learn how to become an AI-native software engineer 🤷‍♂️ How can you stand out when anyone can build anything? 👂 Whisper Leak allows listening to encrypted chats 🐝 What’s new the OWASP2025 Top Ten List 🙅‍♀️ Curse...
Dev Digest 194: AI vs. Version Control, Password Louvre & Cursed Webdev

From learning to earning

Jobs that call for the skills explored in this talk.

Security Engineer

Security Engineer

Cyberr®
Municipality of Madrid, Spain

Remote
Bash
Azure
Python
Powershell
+4