Rosenverse

Log in or create a free Rosenverse account to watch this video.

Log in Create free account

100s of community videos are available to free members. Conference talks are generally available to Gold members.

To Protect People, You Have to Protect Information: A Human-Centered Design Approach to Cybersecurity
Thursday, January 23, 2025 • Rosenfeld Community
Share the love for this talk
To Protect People, You Have to Protect Information: A Human-Centered Design Approach to Cybersecurity
Speakers: Heidi Trost
Link:

Summary

If you design digital products, you’re already influencing the security user experience—even if you don’t realize it. Your design choices impact how users handle security and privacy decisions. We live in an ecosystem where everything increasingly relies on the security of systems: from hospitals, to our water supply, to cars and robots. So the stakes are high: disruptions to these systems mean people can get hurt. Further, technology like AI agents—services that will know nearly everything about us and will take actions on our behalf—mean security and privacy are more important than ever. As a UX designer, you understand your product better than your users ever will. This gives you the power to protect users by developing safer systems. By the end of this talk, you’ll learn how to: Apply human-centered design principles to security: human-centered security. Identify key areas where security impacts users most. Understand the dynamics of the security ecosystem. Collaborate with your security UX allies. Ask better questions to balance security and usability. You’ll leave with a human-centered security framework that you and your team can use immediately. Start asking the right questions to improve security outcomes and keep people and systems safer.

Key Insights

  • Security user experience is hindered by conflicting priorities among UX, security, engineering, compliance, and product teams.

  • Users (Alice) generally focus on their goals, not security, so security often only surfaces as friction during critical moments.

  • Charlie represents the frustrating and jargon-heavy security communications that users encounter, impacting their trust and compliance.

  • Building a positive relationship between Alice (user) and Charlie (security systems) is essential to improve security outcomes.

  • Threat actors exploit gaps in the security user experience by understanding user behavior and system vulnerabilities better than designers do.

  • Signup and onboarding are critical moments to influence lasting security behavior since users have a captive and motivated audience.

  • Clear, jargon-free communication across disciplines helps unify disparate security languages into a shared understanding.

  • AI and sophisticated social engineering attacks will intensify the challenges in user trust and security communications.

  • Cross-disciplinary collaboration involving UX, security, product, and legal teams is key to designing effective human-centered security.

  • Security solutions should anticipate user stress, confusion, and typical user behaviors to design helpful, context-aware interactions.

Notable Quotes

"The stakes are really high, from disrupting critical infrastructure to AI acting on our behalf."

"If Alice no longer believes Charlie, she’s going to resent him and change how she responds next time."

"Charlie is like the worst coworker you’ve ever had: well intentioned but painful to interact with."

"Threat actors often understand Alice and Charlie better than we do and use that to their advantage."

"Users literally swat security warnings away because the flows are so overwhelming and confusing."

"We all speak different security languages, but at some point, they have to come together."

"We can’t improve security outcomes until we improve the relationship between Alice and Charlie."

"Threat actors try to convince Alice that they are Charlie to trick her into giving up access."

"Signup and onboarding offer a fleeting but critical opportunity to influence user security behaviors."

"The user is the weakest link is an unhelpful mindset; understanding dynamics helps design better security UX."

Melissa Tsang
From Insights to Action: Driving Business Values through DesignOps
2024 • DesignOps Summit 2020
Gold
Dr. Jamika D. Burge
Broad Strokes: Connecting Design, Research, and AI to the World Around Us
2023 • Enterprise UX 2023
Gold
Sarah Rink
Remote User Research: Dos and Don'ts from the Virtual Field (Videoconference)
2020 • Advancing Research Community
Sarah Kinkade
Design Management Models in the Face of Transformation
2022 • Design at Scale 2022
Gold
Holly Cole
Understanding Experiences: When you have to do more than work
2018 • DesignOps Summit 2018
Gold
Mujtaba Hameed
Frameworks for Excellence: Using Visual Thinking and Communication to Elevate Your Research
2024 • Advancing Research 2024
Gold
Mike Oren
Why Pharmaceutical's Research Model Should Replace Design Thinking
2023 • Advancing Research 2023
Gold
Rebecca Buck
Mission: Keep Talent in Research Roles!
2021 • Advancing Research 2021
Gold
Civic Design in 2022 (Videoconference)
2022 • Civic Design Community
Denise Jacobs
Interactive Keynote: Social Change by Design
2024 • Enterprise Experience 2020
Gold
Jemma Ahmed
Democratization: Working with it, not against it [Advancing Research Community Workshop Series]
2024 • Advancing Research Community
Louis Rosenfeld
Discussion: What Operations can teach DesignOps
2017 • DesignOps Summit 2017
Gold
Rachael Dietkus, LCSW
AI: Passionate defenses and reasoned critique [Advancing Research Community Workshop Series]
2024 • Advancing Research Community
Scott Stephens
The Next Generation in DesignOps Toolsets (Videoconference)
2022 • DesignOps Community
Discussion
2017 • Enterprise Experience 2017
Gold
Maria Skaaden
Panel Discussion: Methodologies and Work Environments
2018 • DesignOps Summit 2018
Gold

More Videos

Wyatt Hayman

"Panels enable researchers to check cultural assumptions and sensitivities before launching larger studies."

Wyatt Hayman

Global Research Panels (Videoconference)

August 8, 2020

PJ Buddhari

"We hold quarterly town halls and office hours to keep the community informed and supported."

PJ Buddhari Nate Baldwin

Meet Spectrum, Adobe’s Design System

June 9, 2021

Sarah Gallimore

"Exploring Wi-Fi-free zones in Toronto highlights citizen-driven desires to unplug and maintain data privacy in public spaces."

Sarah Gallimore

Inspire Progress with Artifacts from the Future

November 18, 2022

Peter Merholz

"UXers are less satisfied than their peers because we have failed to set expectations about the real work of UX in organizations."

Peter Merholz

The Trials and Tribulations of Directors of UX (Videoconference)

July 13, 2023

Dr. Jamika D. Burge

"Feeling heard and seen by research practitioners is one of the best compliments a participant can give."

Dr. Jamika D. Burge Mansi Gupta

Advancing the Inclusion of Womxn in Research Practices (Videoconference)

September 15, 2022

Amy Marquez

"Don’t advertise to kids. That’s a belief we stick to even when it’s uncomfortable."

Amy Marquez

INVEST: Discussion

June 15, 2018

Dane DeSutter

"Valorant builds hyperlocal agents with teams from the agent’s actual city to boost authenticity and representation."

Dane DeSutter Natalie Gedeon Deborah Hendersen Cheryl Platz

Beyond the Console: The rise of the Gamer Experience and how gaming will impact UX Research across industries (Videoconference)

May 17, 2024

Zariah Cameron

"Play invites curiosity, and curiosity allows us to imagine and create new worlds."

Zariah Cameron

ReDesigning Wellbeing for Equitable Care in the Workplace

September 23, 2024

Jessica Norris

"Regular positive feedback, not just negative, is essential because many with ADHD rely on extrinsic motivation."

Jessica Norris

ADHD: A DesignOps Superpower

September 9, 2022