Rosenverse

Log in or create a free Rosenverse account to watch this video.

Log in Create free account

100s of community videos are available to free members. Conference talks are generally available to Gold members.

To Protect People, You Have to Protect Information: A Human-Centered Design Approach to Cybersecurity
Thursday, January 23, 2025 • Rosenfeld Community
Share the love for this talk
To Protect People, You Have to Protect Information: A Human-Centered Design Approach to Cybersecurity
Speakers: Heidi Trost
Link:

Summary

If you design digital products, you’re already influencing the security user experience—even if you don’t realize it. Your design choices impact how users handle security and privacy decisions. We live in an ecosystem where everything increasingly relies on the security of systems: from hospitals, to our water supply, to cars and robots. So the stakes are high: disruptions to these systems mean people can get hurt. Further, technology like AI agents—services that will know nearly everything about us and will take actions on our behalf—mean security and privacy are more important than ever. As a UX designer, you understand your product better than your users ever will. This gives you the power to protect users by developing safer systems. By the end of this talk, you’ll learn how to: Apply human-centered design principles to security: human-centered security. Identify key areas where security impacts users most. Understand the dynamics of the security ecosystem. Collaborate with your security UX allies. Ask better questions to balance security and usability. You’ll leave with a human-centered security framework that you and your team can use immediately. Start asking the right questions to improve security outcomes and keep people and systems safer.

Key Insights

  • Security user experience is hindered by conflicting priorities among UX, security, engineering, compliance, and product teams.

  • Users (Alice) generally focus on their goals, not security, so security often only surfaces as friction during critical moments.

  • Charlie represents the frustrating and jargon-heavy security communications that users encounter, impacting their trust and compliance.

  • Building a positive relationship between Alice (user) and Charlie (security systems) is essential to improve security outcomes.

  • Threat actors exploit gaps in the security user experience by understanding user behavior and system vulnerabilities better than designers do.

  • Signup and onboarding are critical moments to influence lasting security behavior since users have a captive and motivated audience.

  • Clear, jargon-free communication across disciplines helps unify disparate security languages into a shared understanding.

  • AI and sophisticated social engineering attacks will intensify the challenges in user trust and security communications.

  • Cross-disciplinary collaboration involving UX, security, product, and legal teams is key to designing effective human-centered security.

  • Security solutions should anticipate user stress, confusion, and typical user behaviors to design helpful, context-aware interactions.

Notable Quotes

"The stakes are really high, from disrupting critical infrastructure to AI acting on our behalf."

"If Alice no longer believes Charlie, she’s going to resent him and change how she responds next time."

"Charlie is like the worst coworker you’ve ever had: well intentioned but painful to interact with."

"Threat actors often understand Alice and Charlie better than we do and use that to their advantage."

"Users literally swat security warnings away because the flows are so overwhelming and confusing."

"We all speak different security languages, but at some point, they have to come together."

"We can’t improve security outcomes until we improve the relationship between Alice and Charlie."

"Threat actors try to convince Alice that they are Charlie to trick her into giving up access."

"Signup and onboarding offer a fleeting but critical opportunity to influence user security behaviors."

"The user is the weakest link is an unhelpful mindset; understanding dynamics helps design better security UX."

Ask the Rosenbot
Scott Jensen
Short Take #2: UX/Product Lessons from Your Industry Peers
2022 • Design in Product 2022
Gold
Chris Geison
What is Research Strategy?
2021 • Advancing Research 2021
Gold
Ron Bronson
Design, Consequences & Everyday Life
2022 • Civic Design 2022
Gold
Robin Beers
Research as a Catalyst for Organizational Transformation
2021 • Advancing Research 2021
Gold
Anna Avrekh
Expert Panel: Leading in and with Research
2022 • Advancing Research 2022
Gold
Steve Chaparro
Bringing Into Alignment Brand, Culture and Space (Videoconference)
2020 • DesignOps Community
Joseph Meersman
Sweating the Pixel: Scaling Quality through Critique
2021 • Design at Scale 2021
Gold
Steve Baty
Breaking Out of Ruts: Tips for Overcoming the Fear of Change
2016 • Enterprise UX 2016
Gold
Rich Mironov
How Can Product Managers and UXers Help Each Other (and Why are Product Folks so Annoying Sometimes)?
2022 • Design in Product 2022
Gold
Dave Malouf
Closing Keynote: Amplify. Not Optimize.
2019 • DesignOps Summit 2019
Gold
Michael Land
Establishing Design Operations in Government (Videoconference)
2021 • DesignOps Community
Davis Neable
How to Drive a Design Project When you Don’t Have a Design Team
2021 • Design at Scale 2021
Gold
How to Identify and Increase your "Experience Quotient"
2018 • Enterprise Experience 2018
Gold
Craig Villamor
Resilient Enterprise Design
2017 • Enterprise Experience 2017
Gold
Pippa Lomas
Paving the Path for Neurodiversity in Design
2023 • DesignOps Summit 2023
Gold
Natalie M. Dunbar
DesignOps and Content Strategy: Envisioning the Future Together
2021 • DesignOps Summit 2021
Gold

More Videos

Adam Cutler

"Don't be cool, be good—work hard at managing your teams because they need you to nail it."

Adam Cutler Karen Pascoe Ian Swinson Susan Worthman

Discussion

June 8, 2016

Peter Merholz

"Developing trust means showing you understand what it takes to get something shipped, that you’re reliable, and that people can be vulnerable with you."

Peter Merholz

The Trials and Tribulations of Directors of UX (Videoconference)

July 13, 2023

Lisa Welchman

"In the automotive industry, most safety standards only became mandatory after governments intervened."

Lisa Welchman

Cleaning Up Our Mess: Digital Governance for Designers

June 14, 2018

Vincent Brathwaite

"Transportation must evolve to be more sustainable and accessible for all."

Vincent Brathwaite

Opener: Past, Present, and Future—Closing the Racial Divide in Design Teams

October 22, 2020

Brenna Fallon

"Engineers can be our biggest allies in making really important process changes."

Brenna Fallon

Learning Over Outcomes

October 24, 2019

Tricia Wang

"Hip hop proves that we can re-animate spaces with highly generative communities that weren't built for us."

Tricia Wang

Spatial Collapse: Designing for Emergent Culture

January 8, 2024

Edgar Anzaldua Moreno

"Proto personas created by cross-department participants helped us build unbiased, relevant survey questions."

Edgar Anzaldua Moreno

Using Research to Determine Unique Value Proposition

March 11, 2021

"The toy shouldn’t be the goal of play, but a tool or a process that unlocks the unlimited possibilities set forth before a child."

Designing Systems at Scale

November 7, 2018

Erin Weigel

"Ethics evolve faster than law; just because something is legal doesn’t mean it’s ethical."

Erin Weigel

Get Your Whole Team Testing to Design for Impact

July 24, 2024