Rosenverse

Log in or create a free Rosenverse account to watch this video.

Log in Create free account

100s of community videos are available to free members. Conference talks are generally available to Gold members.

To Protect People, You Have to Protect Information: A Human-Centered Design Approach to Cybersecurity
Thursday, January 23, 2025 • Rosenfeld Community
Share the love for this talk
To Protect People, You Have to Protect Information: A Human-Centered Design Approach to Cybersecurity
Speakers: Heidi Trost
Link:

Summary

If you design digital products, you’re already influencing the security user experience—even if you don’t realize it. Your design choices impact how users handle security and privacy decisions. We live in an ecosystem where everything increasingly relies on the security of systems: from hospitals, to our water supply, to cars and robots. So the stakes are high: disruptions to these systems mean people can get hurt. Further, technology like AI agents—services that will know nearly everything about us and will take actions on our behalf—mean security and privacy are more important than ever. As a UX designer, you understand your product better than your users ever will. This gives you the power to protect users by developing safer systems. By the end of this talk, you’ll learn how to: Apply human-centered design principles to security: human-centered security. Identify key areas where security impacts users most. Understand the dynamics of the security ecosystem. Collaborate with your security UX allies. Ask better questions to balance security and usability. You’ll leave with a human-centered security framework that you and your team can use immediately. Start asking the right questions to improve security outcomes and keep people and systems safer.

Key Insights

  • Security user experience (UX) has significant implications for personal safety and operational integrity.

  • Collaboration across disciplines—UX design, engineering, compliance, and security—is necessary for effective security practices.

  • Users often have different definitions and perceptions of security that need to be understood by designers and security professionals.

  • Alice (user persona) represents the end user who often finds security measures cumbersome or confusing.

  • Charlie (personification of security systems) embodies the frustration users feel when interacting with security protocols.

  • Threat actors possess a deep understanding of user weaknesses and often have better insight into user behaviors than the designers themselves.

  • Effective security measures should be integrated seamlessly into user experiences to minimize disruption.

  • Initial stages like onboarding and signup are critical for shaping long-term user security practices.

  • Clear language and communication strategies are essential to help users navigate security complexities.

  • User education about security is paramount, especially given the increasing sophistication of threats.

Notable Quotes

"I have become even more worried about the state of the security user experience and the impact that it may have on all of us."

"We all need to collaborate to understand the complex security ecosystem and improve security outcomes."

"When security impacts the user experience, that's where Alice meets Charlie."

"The dynamic between Alice and Charlie is really important."

"If Alice doesn't believe Charlie, she's going to resent him."

"We're often unhelpful, right? The way that Charlie comes across is complicated."

"You cannot improve security outcomes until you improve the relationship between Alice and Charlie."

"Threat actors are constantly adapting, and we need to be as good as them at understanding the dynamics of security and users."

"We have to understand that dynamic in order to improve security outcomes."

"Saying we want to be more secure is not enough. What are the behaviors that lead to more secure?"

Cheryl Platz
Merging Improv with Design (Videoconference)
2019 • Enterprise Community
Tatyana Mamut
Opening Keynote: Breaking Conway's Law--or How to Work Differently and Not Ship Your Org Chart
2019 • Enterprise Experience 2019
Gold
Sarah Rink
Remote User Research: Dos and Don'ts from the Virtual Field (Videoconference)
2020 • Advancing Research Community
Ovetta Sampson
Turning UX Passion into Real Product Influence
2023 • Enterprise UX 2023
Gold
Shan Shen
Translating UX Terms into Business Contexts
2023 • Design in Product 2023
Gold
Rachel Posman
"Ask Me Anything" with Rachel Posman and John Calhoun, Authors of the Upcoming Rosenfeld Book, The Design Conductors
2024 • DesignOps Summit 2024
Gold
Ross Smith
Breaking Barriers with Empathy
2017 • Enterprise Experience 2017
Gold
Matt Bernius
Trauma-informed Research: A Panel Discussion (Videoconference)
2021 • Advancing Research Community
Sheri Byrne-Haber
The Importance of Accessible Design Systems
2024 • DesignOps Summit 2020
Gold
Daniel Gloyd
Warming the User Experience: Lessons from America's first and most radical human-centered designers (Videoconference)
2024 • Rosenfeld Community
Laura Gatewood
Beyond Buzzwords: Adding Heart to Effective Slack Communication
2024 • DesignOps Summit 2024
Gold
Tricia Wang
The most popular design thinking strategy is BS (Videoconference)
2022 • Enterprise Community
Rob Mitzel
The Tale of Two Companies: Building a Successful UX Practice in a Century-Old Enterprise
2024 • Enterprise Experience 2020
Gold
Sha Hwang
The Lost Year
2021 • Design at Scale 2021
Gold
Laura Klein
Unique challenges of innovation in enterprises (Videoconference)
2020 • Enterprise Community
Ruzanna Rozman
Getting in Flow with Your Team
2024 • DesignOps Summit 2020
Gold

More Videos

Kristin Skinner

"Design operations is never done; it's always evolving."

Kristin Skinner Kamdyn Moore

Group Activity: A Deep Dive Into Value and Outcomes

October 23, 2019

Jorge Arango

"The broader framing here is about enhancing our thinking through effective note-taking."

Jorge Arango

The Best of Both Worlds: How to Integrate Paper and Digital Notes (1st of 3 seminars) (Videoconference)

April 5, 2024

Prabhas Pokharel

"We want to make it simple and easy and let you do that without losing your flow."

Prabhas Pokharel Mayo Nissen

Order and Chaos: New Ways of Collaborating on Synthesis and Storytelling

March 10, 2022

Sam Proulx

"Modern mobile apps have features that can greatly enhance accessibility needs."

Sam Proulx

Mobile Accessibility: Why Moving Accessibility Beyond the Desktop is Critical in a Mobile-first World

March 10, 2022

Roberta Dombrowski

"Every research project should start with the concrete decisions it hopes to enable."

Roberta Dombrowski Sam Duong Woloszynski

Making Research a Team Sport

March 11, 2022

Josina Vink

"We have a tendency to always look outside and say these changes are needed."

Josina Vink

Navigating the pitfalls of systems thinking in service design

December 4, 2024

Angelos Arnis

"Design operations are often viewed as a luxury, rather than a necessity in organizations."

Angelos Arnis

Navigating the Rapid Shifts in Tech's Turbulent Terrain

October 2, 2023

Ted Neward

"We can leverage our strengths with customers by directly going to large businesses."

Ted Neward

Theme 4: Enterprise Organizational Journey

June 4, 2019

Maria Skaaden

"Change has to come from within the community."

Maria Skaaden

Panel Discussion: Methodologies and Work Environments

November 8, 2018