Rosenverse

Log in or create a free Rosenverse account to watch this video.

Log in Create free account

100s of community videos are available to free members. Conference talks are generally available to Gold members.

To Protect People, You Have to Protect Information: A Human-Centered Design Approach to Cybersecurity
Thursday, January 23, 2025 • Rosenfeld Community
Share the love for this talk
To Protect People, You Have to Protect Information: A Human-Centered Design Approach to Cybersecurity
Speakers: Heidi Trost
Link:

Summary

If you design digital products, you’re already influencing the security user experience—even if you don’t realize it. Your design choices impact how users handle security and privacy decisions. We live in an ecosystem where everything increasingly relies on the security of systems: from hospitals, to our water supply, to cars and robots. So the stakes are high: disruptions to these systems mean people can get hurt. Further, technology like AI agents—services that will know nearly everything about us and will take actions on our behalf—mean security and privacy are more important than ever. As a UX designer, you understand your product better than your users ever will. This gives you the power to protect users by developing safer systems. By the end of this talk, you’ll learn how to: Apply human-centered design principles to security: human-centered security. Identify key areas where security impacts users most. Understand the dynamics of the security ecosystem. Collaborate with your security UX allies. Ask better questions to balance security and usability. You’ll leave with a human-centered security framework that you and your team can use immediately. Start asking the right questions to improve security outcomes and keep people and systems safer.

Key Insights

  • Security user experience (UX) has significant implications for personal safety and operational integrity.

  • Collaboration across disciplines—UX design, engineering, compliance, and security—is necessary for effective security practices.

  • Users often have different definitions and perceptions of security that need to be understood by designers and security professionals.

  • Alice (user persona) represents the end user who often finds security measures cumbersome or confusing.

  • Charlie (personification of security systems) embodies the frustration users feel when interacting with security protocols.

  • Threat actors possess a deep understanding of user weaknesses and often have better insight into user behaviors than the designers themselves.

  • Effective security measures should be integrated seamlessly into user experiences to minimize disruption.

  • Initial stages like onboarding and signup are critical for shaping long-term user security practices.

  • Clear language and communication strategies are essential to help users navigate security complexities.

  • User education about security is paramount, especially given the increasing sophistication of threats.

Notable Quotes

"I have become even more worried about the state of the security user experience and the impact that it may have on all of us."

"We all need to collaborate to understand the complex security ecosystem and improve security outcomes."

"When security impacts the user experience, that's where Alice meets Charlie."

"The dynamic between Alice and Charlie is really important."

"If Alice doesn't believe Charlie, she's going to resent him."

"We're often unhelpful, right? The way that Charlie comes across is complicated."

"You cannot improve security outcomes until you improve the relationship between Alice and Charlie."

"Threat actors are constantly adapting, and we need to be as good as them at understanding the dynamics of security and users."

"We have to understand that dynamic in order to improve security outcomes."

"Saying we want to be more secure is not enough. What are the behaviors that lead to more secure?"

More Videos

Noz Urbina

"You are not just trusting an LLM; they are not databases, they mess up in ways databases never would."

Noz Urbina

Rapid AI-powered UX (RAUX): A framework for empowering human designers

May 1, 2025

Jim Kalbach

"We have lots of chances to learn from each other as we iterate."

Jim Kalbach

Jazz Improvisation as a Model for Team Collaboration

June 4, 2019

Holly Cole

"I want to talk to you about are you really doing user-centered teamwork when you're thinking about growing a team."

Holly Cole

Understanding Experiences: When you have to do more than work

November 8, 2018

Jack Behar

"We have harmony between design and development, and now a common language to align our processes."

Jack Behar

How to Build Prototypes that Behave like an End-Product

December 6, 2022

Bria Alexander

"We are still a community, and we are obligated to treat each other with kindness and respect."

Bria Alexander

Opening Remarks

October 3, 2023

Erika Flowers

"It's not just about implementing AI; it's about how AI enhances the organization's mission."

Erika Flowers

AI-Readiness: Preparing NASA for a Data-Driven, Agile Future

June 10, 2025

Kristin Skinner

"Teachers need actionable insights, not just raw data."

Kristin Skinner

Five Years of DesignOps

September 29, 2021

Jim Kalbach

"Our goal is to create a sound for you, the audience, and empathize with each other to do that."

Jim Kalbach

Jazz Improvisation as a Model for Team Collaboration

November 6, 2017

Surya Vanka

"We need to tap into everybody's creativity to find solutions for societal challenges."

Surya Vanka

Unleashing Swarm Creativity to Solve Enterprise Challenges

June 10, 2021