Rosenverse

Log in or create a free Rosenverse account to watch this video.

Log in Create free account

100s of community videos are available to free members. Conference talks are generally available to Gold members.

To Protect People, You Have to Protect Information: A Human-Centered Design Approach to Cybersecurity
Thursday, January 23, 2025 • Rosenfeld Community
Share the love for this talk
To Protect People, You Have to Protect Information: A Human-Centered Design Approach to Cybersecurity
Speakers: Heidi Trost
Link:

Summary

If you design digital products, you’re already influencing the security user experience—even if you don’t realize it. Your design choices impact how users handle security and privacy decisions. We live in an ecosystem where everything increasingly relies on the security of systems: from hospitals, to our water supply, to cars and robots. So the stakes are high: disruptions to these systems mean people can get hurt. Further, technology like AI agents—services that will know nearly everything about us and will take actions on our behalf—mean security and privacy are more important than ever. As a UX designer, you understand your product better than your users ever will. This gives you the power to protect users by developing safer systems. By the end of this talk, you’ll learn how to: Apply human-centered design principles to security: human-centered security. Identify key areas where security impacts users most. Understand the dynamics of the security ecosystem. Collaborate with your security UX allies. Ask better questions to balance security and usability. You’ll leave with a human-centered security framework that you and your team can use immediately. Start asking the right questions to improve security outcomes and keep people and systems safer.

Key Insights

  • Security user experience is hindered by conflicting priorities among UX, security, engineering, compliance, and product teams.

  • Users (Alice) generally focus on their goals, not security, so security often only surfaces as friction during critical moments.

  • Charlie represents the frustrating and jargon-heavy security communications that users encounter, impacting their trust and compliance.

  • Building a positive relationship between Alice (user) and Charlie (security systems) is essential to improve security outcomes.

  • Threat actors exploit gaps in the security user experience by understanding user behavior and system vulnerabilities better than designers do.

  • Signup and onboarding are critical moments to influence lasting security behavior since users have a captive and motivated audience.

  • Clear, jargon-free communication across disciplines helps unify disparate security languages into a shared understanding.

  • AI and sophisticated social engineering attacks will intensify the challenges in user trust and security communications.

  • Cross-disciplinary collaboration involving UX, security, product, and legal teams is key to designing effective human-centered security.

  • Security solutions should anticipate user stress, confusion, and typical user behaviors to design helpful, context-aware interactions.

Notable Quotes

"The stakes are really high, from disrupting critical infrastructure to AI acting on our behalf."

"If Alice no longer believes Charlie, she’s going to resent him and change how she responds next time."

"Charlie is like the worst coworker you’ve ever had: well intentioned but painful to interact with."

"Threat actors often understand Alice and Charlie better than we do and use that to their advantage."

"Users literally swat security warnings away because the flows are so overwhelming and confusing."

"We all speak different security languages, but at some point, they have to come together."

"We can’t improve security outcomes until we improve the relationship between Alice and Charlie."

"Threat actors try to convince Alice that they are Charlie to trick her into giving up access."

"Signup and onboarding offer a fleeting but critical opportunity to influence user security behaviors."

"The user is the weakest link is an unhelpful mindset; understanding dynamics helps design better security UX."

Ask the Rosenbot
Rachael Dietkus, LCSW
AI: Passionate defenses and reasoned critique [Advancing Research Community Workshop Series]
2024 • Advancing Research Community
Nicole Aleong
Future Orientations to Everyday Life: Futures Anthropology as a Methodology
2024 • Advancing Research 2024
Gold
Patrizia Bertini
Pushing DesignOps’ Influence into New Global Markets
2022 • DesignOps Summit 2022
Gold
Changying (Z) Zheng
Navigating Innovation with Integrity
2024 • DesignOps 2024
Gold
Bria Alexander
Opening Remarks
2024 • Advancing Research 2021
Gold
John Calhoun
Meters, Miles, and Madness: New Frameworks to Measure the (Elusive) Value of DesignOps
2024 • DesignOps 2024
Gold
Zariah Cameron
ReDesigning Wellbeing for Equitable Care in the Workplace
2024 • DesignOps 2024
Gold
Marisa Bernstein
It Takes GRIT: Lessons from the Small, but Mighty World of Civic Usability Testing
2021 • Civic Design 2021
Gold
Dianne Que
Real Talk: Proving Value through a Scrappy Playbook
2019 • DesignOps Summit 2019
Gold
Michal Anne Rogondino
Saving Outer Space: The First UX Design System for Our Nation’s Satellites
2024 • Enterprise Experience 2020
Gold
Anna Avrekh
Expert Panel: Leading in and with Research
2022 • Advancing Research 2022
Gold
Mark Interrante
Collaboration Flows in Product Development
2017 • Enterprise Experience 2017
Gold
Sarah Barrett
The "How" of Enterprise Information Architecture
2023 • Enterprise UX 2023
Gold
Yasmine Khan
Checking Bias and Listening to Financially Vulnerable Americans
2020 • Advancing Research 2020
Gold
Joanna Vodopivec
One Research Team for All - Influence Without Authority
2022 • Advancing Research 2022
Gold
Aditi Ruiz
Pulse Check: Empathy Mapping Your Product Manager, Pt. 2
2022 • Design in Product 2022
Gold

More Videos

Amy Jiménez Márquez

"Imagine if everyone you worked with had deep empathy for your customers and made decisions based on those customer needs."

Amy Jiménez Márquez Michael J. Metts Joie Chung

The Atypical UX Manager Path (Videoconference)

July 23, 2020

Feleesha Sterling

"It’s important to socialize the research program internally so teams get excited and take initiative."

Feleesha Sterling

Building a Rapid Research Program (Videoconference)

May 18, 2023

Chris Geison

"Building relationships means listening more than evangelizing and making research a partnership rather than a solo mission."

Chris Geison Cristen Torrey Eric Mahlstedt

What is Research Strategy?: A Panel of Research Leaders Discuss this Emergent Question (Videoconference)

March 4, 2021

Julie Baher

"Design thinking could be bigger than just about products; we could really use this in many ways."

Julie Baher

Culture Change—My Journey

May 14, 2015

Shelby Switzer

"Take space and likewise give space — it’s everyone’s responsibility."

Shelby Switzer

Making Space for Community Knowledge-sharing in a Distributed World

December 10, 2021

"If design didn’t move the needle, we wouldn’t be having this conversation."

Standardizing Product Merits for Leaders, Designers, and Everyone

June 15, 2018

Tony Turner

"Knowledge repositories enable storytelling that builds empathy for end users by showing their journey longitudinally."

Tony Turner

Capturing Deep Insights

September 30, 2021

Lija Hogan

"Participatory action research is about designing alongside communities, not for them, giving them ownership over outcomes."

Lija Hogan

Contexts of Use: A Framework for Connection

December 9, 2021

Surya Vanka

"Hackathons with thousands of employees swarming on problems unlocked hidden leadership and rapid innovation."

Surya Vanka

Unleashing Swarm Creativity to Solve Enterprise Challenges

June 10, 2021