Rosenverse

Log in or create a free Rosenverse account to watch this video.

Log in Create free account

100s of community videos are available to free members. Conference talks are generally available to Gold members.

To Protect People, You Have to Protect Information: A Human-Centered Design Approach to Cybersecurity
Thursday, January 23, 2025 • Rosenfeld Community
Share the love for this talk
To Protect People, You Have to Protect Information: A Human-Centered Design Approach to Cybersecurity
Speakers: Heidi Trost
Link:

Summary

If you design digital products, you’re already influencing the security user experience—even if you don’t realize it. Your design choices impact how users handle security and privacy decisions. We live in an ecosystem where everything increasingly relies on the security of systems: from hospitals, to our water supply, to cars and robots. So the stakes are high: disruptions to these systems mean people can get hurt. Further, technology like AI agents—services that will know nearly everything about us and will take actions on our behalf—mean security and privacy are more important than ever. As a UX designer, you understand your product better than your users ever will. This gives you the power to protect users by developing safer systems. By the end of this talk, you’ll learn how to: Apply human-centered design principles to security: human-centered security. Identify key areas where security impacts users most. Understand the dynamics of the security ecosystem. Collaborate with your security UX allies. Ask better questions to balance security and usability. You’ll leave with a human-centered security framework that you and your team can use immediately. Start asking the right questions to improve security outcomes and keep people and systems safer.

Key Insights

  • Security means different things to different roles, making cross-disciplinary collaboration essential.

  • Users (Alice) often do not think about security until it directly interrupts their tasks.

  • Charlie personifies the security systems and communications users interact with; their unhelpfulness harms user trust.

  • Improving the relationship between Alice and Charlie is critical to enhancing security behaviors and outcomes.

  • Threat actors understand users and security systems better than many security teams do, exploiting weak points.

  • Onboarding and signup are crucial moments to influence secure user behaviors because users are motivated and captive.

  • Security messaging must balance clarity and avoiding fatigue caused by false positives or jargon.

  • AI-driven social engineering and deepfakes will make future attacks more convincing and harder to detect.

  • Designers should anticipate user objections and behaviors when creating security flows.

  • Clear standard protocols for unusual financial requests reduce vulnerability to phishing scams.

Notable Quotes

"Security means protecting business, productivity, safety."

"The user is the weakest link is an unhelpful and harmful perspective."

"You cannot improve security outcomes until you improve the relationship between Alice and Charlie."

"Threat actors can masquerade as Charlie to trick users like Alice."

"Most security work happens below the surface where users don’t need to think about it."

"If users have to look things up, they often won’t, so policies must be easy and fast to respond to."

"Onboarding is often fleeting, so influencing security behavior there has an outsized impact."

"With AI, phishing will get worse; attackers will craft messages users are more likely to believe."

"We need to get really good at strategy board games to outsmart threat actors."

"Clear outcomes and defined secure behaviors are better than vague goals like 'be more secure'."

Ask the Rosenbot
Rachael Dietkus, LCSW
Leading through the long tail of trauma
2022 • Enterprise Community
Laine Riley Prokay
Carving a Path for Early Career DesignOps Practitioners
2022 • DesignOps Summit 2022
Gold
Erika Kincaid
Connecting the Dots: How to Foster Collaboration and Build a Strong Design Review Culture
2022 • Design at Scale 2022
Gold
Kit Unger
Theme 3 Intro
2022 • Design at Scale 2022
Gold
Bria Alexander
Theme Two Intro
2023 • DesignOps Summit 2023
Gold
Megan Clegg
Space for Everyone: Reframing Accessibility Through a Wider Lens
2021 • Design at Scale 2021
Gold
Jemma Ahmed
Convergent Research Techniques in Customer Journey Mapping
2020 • Advancing Research 2020
Gold
Kristin Skinner
Opening Keynote: Org Design for Design Orgs
2017 • DesignOps Summit 2017
Gold
Sarah Fathallah
A Typology of Participation in Participatory Research
2023 • Advancing Research 2023
Gold
Jennifer Kong
Journeying toward AI-assisted documentation in healthcare
2024 • Designing with AI 2024
Gold
Lavrans Løvlie
Ask me anything – Authors of Service Design: From Insight to Implementation
2025 • Advancing Service Design 2025
Gold
Tricia Wang
From Users to Shapers of AI: The Future of Research
2024 • Advancing Research 2024
Gold
Daniel Korczynski
From generic to contextual research insights with AI | Live Q&A
2026 • Advancing Research 2026
Conference
Tony Turner
Capturing Deep Insights
2021 • DesignOps Summit 2021
Gold
Iain McMaster
Design and Product: from Frenemy to Harmony
2023 • Design in Product 2023
Gold
Jess Greco
Claiming your power: Practical tools for amplifying your unique voice
2025 • Advancing Research 2025
Gold

More Videos

Theresa Neil

"Color tells you where to look. That’s why color in data visualization must be intentional."

Theresa Neil

Just Build Me a Dashboard!

April 9, 2019

Sahibzada Mayed

"We must distinguish between right and entitlement when engaging in research and acknowledge the responsibility that accompanies privilege."

Sahibzada Mayed

The Politics of Radical Research: A Manifesto

March 27, 2023

Lily Aduana

"If I forgot a critical screener question, I just messaged all qualified participants to confirm they meet the criteria before approval."

Lily Aduana Savannah Hobbs Brittany Rutherford

5 Reasons to Bring Your Recruiting in-House (and How To Do It)

March 12, 2021

David Cronin

"We didn’t have enough knowledge initially to have a strong opinion about what was good design for these users."

David Cronin

The GE Design System and Thoughts about Craft at Scale

May 13, 2015

Jacqui Frey

"Listening with tactical empathy means understanding the full emotional journey during times of change."

Jacqui Frey Alison Rand

Setting the Table for Dynamic Change

October 24, 2019

Daniel J. Rosenberg

"You don’t want to game anybody here. This is persuasion by evidence, not by trickery."

Daniel J. Rosenberg

Designing with and for Artificial Intelligence

August 11, 2022

Kate Kalcevich

"Accessibility research is part of overall user research; including people with accessibility needs can replace some general population participants."

Kate Kalcevich

Integrating Accessibility in DesignOps

September 23, 2024

Bob Baxley

"Low UX maturity is often a symptom of a bigger problem in how you build product, not just design adoption."

Bob Baxley Sara Asche Anderson Sharon Bautista Frank Duran Jamie Kaspszak Abbey Smalley Sylas Souza

Theme 4: Discussion

January 8, 2024

Verónica Urzúa

"Being those who create constructive discomfort in the industry is necessary to bring our Latin researcher identity forward."

Verónica Urzúa Jorge Montiel

The B-side of the Research Impact

March 12, 2021