Log in or create a free Rosenverse account to watch this video.
Log in Create free account100s of community videos are available to free members. Conference talks are generally available to Gold members.
Summary
If you design digital products, you’re already influencing the security user experience—even if you don’t realize it. Your design choices impact how users handle security and privacy decisions. We live in an ecosystem where everything increasingly relies on the security of systems: from hospitals, to our water supply, to cars and robots. So the stakes are high: disruptions to these systems mean people can get hurt. Further, technology like AI agents—services that will know nearly everything about us and will take actions on our behalf—mean security and privacy are more important than ever. As a UX designer, you understand your product better than your users ever will. This gives you the power to protect users by developing safer systems. By the end of this talk, you’ll learn how to: Apply human-centered design principles to security: human-centered security. Identify key areas where security impacts users most. Understand the dynamics of the security ecosystem. Collaborate with your security UX allies. Ask better questions to balance security and usability. You’ll leave with a human-centered security framework that you and your team can use immediately. Start asking the right questions to improve security outcomes and keep people and systems safer.
Key Insights
-
•
Security means different things to different roles, making cross-disciplinary collaboration essential.
-
•
Users (Alice) often do not think about security until it directly interrupts their tasks.
-
•
Charlie personifies the security systems and communications users interact with; their unhelpfulness harms user trust.
-
•
Improving the relationship between Alice and Charlie is critical to enhancing security behaviors and outcomes.
-
•
Threat actors understand users and security systems better than many security teams do, exploiting weak points.
-
•
Onboarding and signup are crucial moments to influence secure user behaviors because users are motivated and captive.
-
•
Security messaging must balance clarity and avoiding fatigue caused by false positives or jargon.
-
•
AI-driven social engineering and deepfakes will make future attacks more convincing and harder to detect.
-
•
Designers should anticipate user objections and behaviors when creating security flows.
-
•
Clear standard protocols for unusual financial requests reduce vulnerability to phishing scams.
Notable Quotes
"Security means protecting business, productivity, safety."
"The user is the weakest link is an unhelpful and harmful perspective."
"You cannot improve security outcomes until you improve the relationship between Alice and Charlie."
"Threat actors can masquerade as Charlie to trick users like Alice."
"Most security work happens below the surface where users don’t need to think about it."
"If users have to look things up, they often won’t, so policies must be easy and fast to respond to."
"Onboarding is often fleeting, so influencing security behavior there has an outsized impact."
"With AI, phishing will get worse; attackers will craft messages users are more likely to believe."
"We need to get really good at strategy board games to outsmart threat actors."
"Clear outcomes and defined secure behaviors are better than vague goals like 'be more secure'."
Or choose a question:
More Videos
"The user experience will allow us to win."
Doug PowellClosing Keynote: Design at Scale
November 8, 2018
"Middle schoolers might ask you tough questions about release forms and how their data will be used."
Mila Kuznetsova Lucy DentonHow Lessons Learned from Our Youngest Users Can Help Us Evolve our Practices
March 9, 2022
"In Toronto it’s now illegal to transmit a Wi-Fi signal in designated public spaces, with penalties for violations—a policy driven by people wanting to unplug from digital life."
Sarah GallimoreInspire Progress with Artifacts from the Future
November 18, 2022
"Stakeholders start demanding better digital experiences at work because they expect the same quality they have at home."
Lada Gorlenko Sharbani Dhar Sébastien Malo Rob Mitzel Ivana Ng Michal Anne RogondinoTheme 1: Discussion
January 8, 2024
"Nobody can predict where we’re going, but we can choose to shape the future."
Alnie FigueroaThe Future of Design Operations: Transforming Our Craft
September 10, 2025
"Research is not as easy as putting on a shoe and just doing it; it requires careful consideration and alignment with imperatives."
Landon BarnesAre My Research Findings Actually Meaningful?
March 10, 2022
"In public radio, your listener can’t rewind. We have to design for thoughtful user progression."
Emily EagleCan't Rewind: Radio and Retail
June 3, 2019
"Legacy applications linger because changing them is risk-ridden and a major undertaking."
Malini RaoLessons Learned from a 4-year Product Re-platforming Journey
June 9, 2021
"Building rapport and rituals helped our remote team foster camaraderie and trust."
Asia HoePartnering with Product: A Journey from Junior to Senior Design
November 29, 2023
Latest Books All books
Dig deeper with the Rosenbot
What are examples of AI failures that highlight the need for bias testing and regulation?
What are effective methods to create feedback loops between strategy, orchestration, and implementation teams?
How does the second edition of the service design book address the relationship between service design and digital products?