Rosenverse

Log in or create a free Rosenverse account to watch this video.

Log in Create free account

100s of community videos are available to free members. Conference talks are generally available to Gold members.

To Protect People, You Have to Protect Information: A Human-Centered Design Approach to Cybersecurity
Thursday, January 23, 2025 • Rosenfeld Community
Share the love for this talk
To Protect People, You Have to Protect Information: A Human-Centered Design Approach to Cybersecurity
Speakers: Heidi Trost
Link:

Summary

If you design digital products, you’re already influencing the security user experience—even if you don’t realize it. Your design choices impact how users handle security and privacy decisions. We live in an ecosystem where everything increasingly relies on the security of systems: from hospitals, to our water supply, to cars and robots. So the stakes are high: disruptions to these systems mean people can get hurt. Further, technology like AI agents—services that will know nearly everything about us and will take actions on our behalf—mean security and privacy are more important than ever. As a UX designer, you understand your product better than your users ever will. This gives you the power to protect users by developing safer systems. By the end of this talk, you’ll learn how to: Apply human-centered design principles to security: human-centered security. Identify key areas where security impacts users most. Understand the dynamics of the security ecosystem. Collaborate with your security UX allies. Ask better questions to balance security and usability. You’ll leave with a human-centered security framework that you and your team can use immediately. Start asking the right questions to improve security outcomes and keep people and systems safer.

Key Insights

  • Security means different things to different roles, making cross-disciplinary collaboration essential.

  • Users (Alice) often do not think about security until it directly interrupts their tasks.

  • Charlie personifies the security systems and communications users interact with; their unhelpfulness harms user trust.

  • Improving the relationship between Alice and Charlie is critical to enhancing security behaviors and outcomes.

  • Threat actors understand users and security systems better than many security teams do, exploiting weak points.

  • Onboarding and signup are crucial moments to influence secure user behaviors because users are motivated and captive.

  • Security messaging must balance clarity and avoiding fatigue caused by false positives or jargon.

  • AI-driven social engineering and deepfakes will make future attacks more convincing and harder to detect.

  • Designers should anticipate user objections and behaviors when creating security flows.

  • Clear standard protocols for unusual financial requests reduce vulnerability to phishing scams.

Notable Quotes

"Security means protecting business, productivity, safety."

"The user is the weakest link is an unhelpful and harmful perspective."

"You cannot improve security outcomes until you improve the relationship between Alice and Charlie."

"Threat actors can masquerade as Charlie to trick users like Alice."

"Most security work happens below the surface where users don’t need to think about it."

"If users have to look things up, they often won’t, so policies must be easy and fast to respond to."

"Onboarding is often fleeting, so influencing security behavior there has an outsized impact."

"With AI, phishing will get worse; attackers will craft messages users are more likely to believe."

"We need to get really good at strategy board games to outsmart threat actors."

"Clear outcomes and defined secure behaviors are better than vague goals like 'be more secure'."

Taiye Akin-Akinyosoye
Amplifying voices and enhancing user research through group interviews
2025 • Advancing Research 2025
Gold
George Zhang
UX Research Excellence Framework
2021 • Advancing Research 2021
Gold
Susan Simon-Daniels
War Stories LIVE! Susan Simon-Daniels
2020 • Advancing Research 2020
Gold
Davis Neable
How to Drive a Design Project When you Don’t Have a Design Team
2021 • Design at Scale 2021
Gold
Aras Bilgen
Research Democratization: A Debate
2023 • Advancing Research 2023
Gold
James Rampton
The Basics of Automotive UX & Why Phones Are a Part of That Future
2024 • Rosenfeld Community
Aditi Ruiz
Pulse Check: Empathy Mapping Your Product Manager, Pt. 2
2022 • Design in Product 2022
Gold
Chris Hammond
Embedding sustainability into enterprise design and development: A journey towards "sustainability consciousness"
2025 • Climate UX Interest Group
Sarah Fathallah
Beyond insights: Rethinking the role of researchers as stewards of organizational wisdom
2025 • Advancing Research 2025
Gold
Bria Alexander
Opening Remarks
2021 • DesignOps Summit 2021
Gold
Renee Bouwens
Landing Product Impact: Aligning Research as a Foundational Driver for Delivering the World’s Best Products
2023 • QuantQual Interest Group
Joshua Graves
We Need To Talk: Managing Ludicrous Requests at Work (Part 3 of 3)
2025 • Rosenfeld Community
Lada Gorlenko
Theme 1: Intro
2024 • Enterprise Experience 2020
Gold
Catt Small
Moving from Execution to Strategy as a Designer
2022 • Design in Product 2022
Gold
Andy Polaine
What is the role of service design in product-led organizations?
2024 • Advancing Service Design 2024
Gold
Aditi Ruiz
A PM State of Mind: Empathy Mapping Your Product Manager, Pt. 1
2022 • Design in Product 2022
Gold

More Videos

Randolph Duke II

"Do I find a way to make this conversation more about the software as scheduled or do I show Laura how to react to the unplanned?"

Randolph Duke II

War Stories LIVE! Randy Duke II

March 30, 2020

Corey Nelson

"If you were blindsided recently, I’ve been there. I just really appreciated a kind voice because I didn’t hear a single word they said."

Corey Nelson Amy Santee

Layoffs

November 15, 2022

Landon Barnes

"When executives start questioning your research details, that’s a good sign they’re engaged and trusting the process."

Landon Barnes

Are My Research Findings Actually Meaningful?

March 10, 2022

Amy Bucher

"Design for Evil by Chris Nodder is a great resource to understand how behavioral design can be misused, sometimes very subtly."

Amy Bucher

Harnessing behavioral science to uncover deeper truths

March 12, 2025

David Sternberg

"Momentum in users is like energy in fluid—strong motivation drives fast, decisive movement."

David Sternberg

Uncovering the hidden forces shaping user behavior

July 17, 2025

Deanna Smith

"Piloting your ideas before committing helps prevent disruption and saves energy in the long run."

Deanna Smith

Leading Change with Confidence: Strategies for Optimizing Your Process

September 23, 2024

Jennifer Strickland

"Equity is equal outcomes, not just equal access to a bicycle everyone can’t necessarily ride."

Jennifer Strickland

Adopting a "Design By" Method

December 9, 2021

Rachel Posman

"If adding a design program manager gives each designer back even one hour a day, you might make your entire team more efficient."

Rachel Posman John Calhoun

A Closer Look at Team Ops and Product Ops (Two Sides of the DesignOps Coin)

November 19, 2020

Gina Mendolia

"Service designers connect the dots, which represent elements, teams, processes, policies, and customer needs that all must align."

Gina Mendolia

Therapists, Coaches, and Grandmas: Techniques for Service Design in Complex Systems

December 3, 2024