2025-08-11 –, Cassiopeia
Language: English
This talk will enable you to lead architecture conversations and discuss their security options through an informal diagramming technique. I will use examples such as key/encryption architectures, DevOps, and even your home music system.
You have seen many diagrams of computer and information systems in your career. They have been around since the early days of computing. They can be useful, but there are a few typical problems with them:
• They are drawn with obscure symbols that are only understood by architects
• They are drawn in an inconsistent way
• They are not used to their fullest potential.
In my practice I have run into these problems often, and I have found ways to turn a certain type of diagram, a simplified version of deployment diagrams, into the cornerstone of explanation of what goes on in cloud and cybersecurity.
In the talk I will lead you through the basic principles, and a few examples. This will enable you to lead architecture conversations and discuss their security options. I will use examples such as key/encryption architectures, DevOps, and even your home music system.
Peter van Eijk is an instructor and coach, focussing on modern digital infrastructures and their challenges. Think cloud, security, zero trust, AI.
He is one of the world’s most experienced cloud security trainers, and has developed (and help develop) many courses.
With decades of experience in industry, government and academia, he has a very unique perspective on the world of digital infrastructures and the power structures that go with it.
Currently he is also developing a book, which you can preview live at www.digitalinfrastructures.nl
Peter is also a long time member of Toastmasteres International.