Rosenverse

Log in or create a free Rosenverse account to watch this video.

Log in Create free account

100s of community videos are available to free members. Conference talks are generally available to Gold members.

To Protect People, You Have to Protect Information: A Human-Centered Design Approach to Cybersecurity
Thursday, January 23, 2025 • Rosenfeld Community
Share the love for this talk
To Protect People, You Have to Protect Information: A Human-Centered Design Approach to Cybersecurity
Speakers: Heidi Trost
Link:

Summary

If you design digital products, you’re already influencing the security user experience—even if you don’t realize it. Your design choices impact how users handle security and privacy decisions. We live in an ecosystem where everything increasingly relies on the security of systems: from hospitals, to our water supply, to cars and robots. So the stakes are high: disruptions to these systems mean people can get hurt. Further, technology like AI agents—services that will know nearly everything about us and will take actions on our behalf—mean security and privacy are more important than ever. As a UX designer, you understand your product better than your users ever will. This gives you the power to protect users by developing safer systems. By the end of this talk, you’ll learn how to: Apply human-centered design principles to security: human-centered security. Identify key areas where security impacts users most. Understand the dynamics of the security ecosystem. Collaborate with your security UX allies. Ask better questions to balance security and usability. You’ll leave with a human-centered security framework that you and your team can use immediately. Start asking the right questions to improve security outcomes and keep people and systems safer.

Key Insights

  • Security user experience (UX) has significant implications for personal safety and operational integrity.

  • Collaboration across disciplines—UX design, engineering, compliance, and security—is necessary for effective security practices.

  • Users often have different definitions and perceptions of security that need to be understood by designers and security professionals.

  • Alice (user persona) represents the end user who often finds security measures cumbersome or confusing.

  • Charlie (personification of security systems) embodies the frustration users feel when interacting with security protocols.

  • Threat actors possess a deep understanding of user weaknesses and often have better insight into user behaviors than the designers themselves.

  • Effective security measures should be integrated seamlessly into user experiences to minimize disruption.

  • Initial stages like onboarding and signup are critical for shaping long-term user security practices.

  • Clear language and communication strategies are essential to help users navigate security complexities.

  • User education about security is paramount, especially given the increasing sophistication of threats.

Notable Quotes

"I have become even more worried about the state of the security user experience and the impact that it may have on all of us."

"We all need to collaborate to understand the complex security ecosystem and improve security outcomes."

"When security impacts the user experience, that's where Alice meets Charlie."

"The dynamic between Alice and Charlie is really important."

"If Alice doesn't believe Charlie, she's going to resent him."

"We're often unhelpful, right? The way that Charlie comes across is complicated."

"You cannot improve security outcomes until you improve the relationship between Alice and Charlie."

"Threat actors are constantly adapting, and we need to be as good as them at understanding the dynamics of security and users."

"We have to understand that dynamic in order to improve security outcomes."

"Saying we want to be more secure is not enough. What are the behaviors that lead to more secure?"

More Videos

Mike Oren

"Our discipline is about helping companies make better decisions, even if it means saying no to existing projects."

Mike Oren

Why Pharmaceutical's Research Model Should Replace Design Thinking

March 28, 2023

Sam Proulx

"Starting with mobile can provide accessibility wins for users with disabilities."

Sam Proulx

Mobile Accessibility: Why Moving Accessibility Beyond the Desktop is Critical in a Mobile-first World

November 17, 2022

Louis Rosenfeld

"It's so exciting to have a global audience."

Louis Rosenfeld Christian Crumlish

Opening Remarks

November 29, 2023

Patrick Commarford

"To maximize our mission, we focused on aligning staffing to strategic priorities while being transparent throughout."

Patrick Commarford

Design Staffing for Impact

January 8, 2024

Erin Weigel

"We democratized user research. The researchers were there to enable us to do our own research."

Erin Weigel

UX Lessons from running more than 1,200 A/B Tests

July 10, 2024

Magdalena Zadara

"You need to relax and open your mind to the specific challenges of your locality."

Magdalena Zadara

Zero Hour: How to Get Far Quickly When Starting Your Digital Service Unit Late

November 16, 2022

Sharbani Dhar

"It's never over; continuous improvement is the goal."

Sharbani Dhar

Breathing Room for Delight

January 8, 2024

Kelly Dern

"It’s important to synthesize and find themes so you can design for a shorter list and avoid overwhelming yourself."

Kelly Dern

AI as a Design Partner: How to Get the Most Out of AI Tools to Scale Your Process

October 3, 2023

Saara Kamppari-Miller

"Aligning themes for Global Accessibility Awareness Day with top business priorities reinforces our message."

Saara Kamppari-Miller Nicole Bergstrom Shashi Jain

Key Metrics: Comparing Three Letter Acronym Metrics That Include the Word “Key”

November 13, 2024