{"code":"PRV9UP","title":"Using deployment diagrams to explain architecture and security to everybody","speakers":["QV8XVW"],"submission_type":1,"track":1,"tags":[],"state":"confirmed","abstract":"This talk will enable you to lead architecture conversations and discuss their security options through an informal diagramming technique. I will use examples such as key/encryption architectures, DevOps, and even your home music system.","description":"Presentation at https://digitalinfrastructures.nl/why2025/\r\n\r\nYou have seen many diagrams of computer and information systems in your career. They have been around since the early days of computing. They can be useful, but there are a few typical problems with them:\r\n•\tThey are drawn with obscure symbols that are only understood by architects\r\n•\tThey are drawn in an inconsistent way\r\n•\tThey are not used to their fullest potential.\r\nIn my practice I have run into these problems often, and I have found ways to turn a certain type of diagram, a simplified version of deployment diagrams, into the cornerstone of explanation of what goes on in cloud and cybersecurity.\r\nIn the talk I will lead you through the basic principles, and a few examples. This will enable you to lead architecture conversations and discuss their security options. I will use examples such as key/encryption architectures, DevOps, and even your home music system.","duration":25,"slot_count":1,"content_locale":"en","do_not_record":false,"image":null,"resources":[],"slots":[13363],"answers":[]}