Rosenverse

Log in or create a free Rosenverse account to watch this video.

Log in Create free account

100s of community videos are available to free members. Conference talks are generally available to Gold members.

To Protect People, You Have to Protect Information: A Human-Centered Design Approach to Cybersecurity
Thursday, January 23, 2025 • Rosenfeld Community
Share the love for this talk
To Protect People, You Have to Protect Information: A Human-Centered Design Approach to Cybersecurity
Speakers: Heidi Trost
Link:

Summary

If you design digital products, you’re already influencing the security user experience—even if you don’t realize it. Your design choices impact how users handle security and privacy decisions. We live in an ecosystem where everything increasingly relies on the security of systems: from hospitals, to our water supply, to cars and robots. So the stakes are high: disruptions to these systems mean people can get hurt. Further, technology like AI agents—services that will know nearly everything about us and will take actions on our behalf—mean security and privacy are more important than ever. As a UX designer, you understand your product better than your users ever will. This gives you the power to protect users by developing safer systems. By the end of this talk, you’ll learn how to: Apply human-centered design principles to security: human-centered security. Identify key areas where security impacts users most. Understand the dynamics of the security ecosystem. Collaborate with your security UX allies. Ask better questions to balance security and usability. You’ll leave with a human-centered security framework that you and your team can use immediately. Start asking the right questions to improve security outcomes and keep people and systems safer.

Key Insights

  • Security means different things to different roles, making cross-disciplinary collaboration essential.

  • Users (Alice) often do not think about security until it directly interrupts their tasks.

  • Charlie personifies the security systems and communications users interact with; their unhelpfulness harms user trust.

  • Improving the relationship between Alice and Charlie is critical to enhancing security behaviors and outcomes.

  • Threat actors understand users and security systems better than many security teams do, exploiting weak points.

  • Onboarding and signup are crucial moments to influence secure user behaviors because users are motivated and captive.

  • Security messaging must balance clarity and avoiding fatigue caused by false positives or jargon.

  • AI-driven social engineering and deepfakes will make future attacks more convincing and harder to detect.

  • Designers should anticipate user objections and behaviors when creating security flows.

  • Clear standard protocols for unusual financial requests reduce vulnerability to phishing scams.

Notable Quotes

"Security means protecting business, productivity, safety."

"The user is the weakest link is an unhelpful and harmful perspective."

"You cannot improve security outcomes until you improve the relationship between Alice and Charlie."

"Threat actors can masquerade as Charlie to trick users like Alice."

"Most security work happens below the surface where users don’t need to think about it."

"If users have to look things up, they often won’t, so policies must be easy and fast to respond to."

"Onboarding is often fleeting, so influencing security behavior there has an outsized impact."

"With AI, phishing will get worse; attackers will craft messages users are more likely to believe."

"We need to get really good at strategy board games to outsmart threat actors."

"Clear outcomes and defined secure behaviors are better than vague goals like 'be more secure'."

Ask the Rosenbot
Dianne Que
Real Talk: Proving Value through a Scrappy Playbook
2019 • DesignOps Summit 2019
Gold
Tanya Snook
Designing the team experience: Building culture through onboarding
2021 • Enterprise Community
Dantley Davis
Leadership & Diversity—A Fireside Chat with Dantley Davis
2020 • Enterprise Community
Sarah Williams
Verizon_A Framework for CX Transformation
2024 • Design at Scale 2021
Gold
Megan Nipe
Human-Centered Design for Engagement: Maturing from Newsletterville to Personalized, One-to-One Messaging
2021 • Civic Design 2021
Gold
Kristin Skinner
Group Activity: A Deep Dive Into Value and Outcomes
2019 • DesignOps Summit 2019
Gold
Emily Danielson
“I mean, I can lift a shovel”: Design Skills in Disaster Response
2022 • Design at Scale 2022
Gold
John Cutler
Oxbows, Rivers, and Estuaries: How to navigate the currents of change (without burning out)
2024 • Advancing Service Design 2024
Gold
Ignacio Martinez
Fair and Effective Designer Evaluation
2024 • DesignOps Summit 2024
Gold
Ben Davies
Expert Panel: The Principles of Research Repository Design
2022 • Advancing Research 2022
Gold
Lori Muszynski
Keeping Design Weird
2023 • DesignOps Summit 2023
Gold
Bruce Gillespie
Learning from journalism: Balancing impactful communication with compassionate storytelling
2025 • Advancing Research 2025
Gold
Catherine Dubut
Bridging Physical and Digital Spaces: Approaches to Retail Service Design
2021 • Enterprise Community
Patrick Commarford
Design Staffing for Impact
2024 • DesignOps Summit 2020
Gold
Tony Turner
Capturing Deep Insights
2021 • DesignOps Summit 2021
Gold
Holly Cole
Panel Discussion: Growing People and Teams
2018 • DesignOps Summit 2018
Gold

More Videos

Tim Parmee

"We’ve honed and refined our mechanisms for output, for scale, for growth, and even in moments of high uncertainty, organizations still measure success through quantity."

Tim Parmee

Changing Our Design Pressure Points

October 2, 2023

Kristin Taylor

"Being a formal leader is harder in many ways, but you have more leverage to make change."

Kristin Taylor

Building Bridges Across Organizational Silos

November 18, 2022

Bria Alexander

"You can also reach us quickly by going to help-desk-customer-service for any tech or support issues."

Bria Alexander

Opening Remarks

October 3, 2023

Amy Jiménez Márquez

"You can’t manage everybody the same way; different personalities require different approaches."

Amy Jiménez Márquez Michael J. Metts Joie Chung

The Atypical UX Manager Path

July 23, 2020

Bria Alexander

"If you’re not in Slack, you’re missing out on the party."

Bria Alexander

Opening Remarks

June 11, 2021

Ted Neward

"We have to balance crisis management with long-term strategic exploration to not lose sight of growth."

Ted Neward

Theme 4: Enterprise Organizational Journey

June 4, 2019

Ellen Chisa

"Share price is actually a model of the expected value of all future income of a company."

Ellen Chisa

The Values of Design

November 29, 2023

Dave Hora

"Ten years ago, I did not know that we could do research as a job."

Dave Hora

A Research Skills Evolution

March 10, 2021

Feleesha Sterling

"We ended up doing an average of five labs per quarter covering 12 to 15 research questions, which helped avoid design delays."

Feleesha Sterling

Building a Rapid Research Program

May 18, 2023