SlideShare a Scribd company logo
Security vs UX
Deathmatch
@ccollingridge
@Avecto
@nuxuk
Security vs. UX
Security is human
We’re not making good design decisions
We can do better
Security is human
We’re not making good design decisions
We can do better
Kamyar Adl
Troy Tolley
Mike Photo Art
Jenn Durfey
Chaoyue 超越 PAN 潘
Key Multimedia
Surian Soosay
Jon Duhig
Security vs. UX
Alexandra Bolzer
Security vs. UX
Security is human
We’re not making good design decisions
We can do better
Steve Way
Overloading memory
Security vs. UX
Jason Kottke
XKCD
Security vs. UX
Security vs. UX
Nihilistic password security questions (by Soheil Rezayazdi)
What is the name of your least favorite child?
In what year did you abandon your dreams?
What is the maiden name of your father’s mistress?
At what age did your childhood pet run away?
In what city did you first experience ennui?
What is your ex-wife’s newest last name?
What sports team do you fetishize to avoid meaningful discussion with others?
What is the name of your favorite canceled TV show?
What was the middle name of your first rebound?
On what street did you lose your childlike sense of wonder?
Technically driven barriers
Troy Hunt
Security vs. UX
Security vs. UX
Relying on users making good decisions
Alec Meer
Amanda French
MyOnlineSecurity
Not promoting good practice
Security vs. UX
Security vs. UX
Security vs. UX
Security vs. UX
Security vs. UX
Security vs. UX
Security vs. UX
Security vs. UX
Security vs. UX
Security is human
We’re not making good design decisions
We can do better
Best Car Mag
Security vs. UX
Security vs. UX
Bill Boaden
Security vs. UX
Security vs. UX
Security vs. UX
@Elgarfrombeyond
Encourage
two-factor
Security vs. UX
Security vs. UX
Security vs. UX
Stand on the
shoulders of giants
Start thinking about biometrics
Encourage passphrases
Password-less login
“Regular password changing harms rather than improves
security, so avoid placing this burden on users. However,
users must change their passwords on indication or
suspicion of compromise.”
Use honeypots
& throttling
Ram Joshi
Don’t break
password managers
Set safe
defaults; be
proactive
Create secure-by-design places
Security is not an inconvenience, but a human need
Good security serves your user, your organisation,
and the wider world
You can design for better security and less friction
Joachim S. Müller
Security vs UX
Deathmatch
Romance
Be the love you want to feel
@ccollingridge
@Avecto
@nuxuk

More Related Content

PDF
Staying human centric in emerging technology / Tracy Rolling
PDF
Usability vs. Security: Find the Right Balance in Mobile Apps
PDF
(Un)usable Security
PDF
UX for Security: Power of Design
PPSX
Usable Security: When Security Meets Usability
PPTX
DSS @ Digital ERA 2014 - Security in the digital world
PDF
Design thinking 101
 
PDF
Design Thinking and Business Intelligence
Staying human centric in emerging technology / Tracy Rolling
Usability vs. Security: Find the Right Balance in Mobile Apps
(Un)usable Security
UX for Security: Power of Design
Usable Security: When Security Meets Usability
DSS @ Digital ERA 2014 - Security in the digital world
Design thinking 101
 
Design Thinking and Business Intelligence

Viewers also liked (7)

PDF
D4D Tools - The NEXT Tool
PDF
Innovation Management: Design Thinking Workshop
PDF
Design Thinking - Designing for People
PDF
Field Guide to Rapid Experimentation
PDF
IDEO - Design thinking workshop 2016
PPT
End User Security Awareness Presentation
PDF
Intro to Design Thinking
D4D Tools - The NEXT Tool
Innovation Management: Design Thinking Workshop
Design Thinking - Designing for People
Field Guide to Rapid Experimentation
IDEO - Design thinking workshop 2016
End User Security Awareness Presentation
Intro to Design Thinking
Ad

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
A Presentation on Artificial Intelligence
PDF
August Patch Tuesday
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
Teaching material agriculture food technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Spectroscopy.pptx food analysis technology
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Machine learning based COVID-19 study performance prediction
PPTX
TLE Review Electricity (Electricity).pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Tartificialntelligence_presentation.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Mushroom cultivation and it's methods.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Approach and Philosophy of On baking technology
OMC Textile Division Presentation 2021.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
A Presentation on Artificial Intelligence
August Patch Tuesday
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Spectral efficient network and resource selection model in 5G networks
Teaching material agriculture food technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Spectroscopy.pptx food analysis technology
A comparative analysis of optical character recognition models for extracting...
Machine learning based COVID-19 study performance prediction
TLE Review Electricity (Electricity).pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Programs and apps: productivity, graphics, security and other tools
Network Security Unit 5.pdf for BCA BBA.
Tartificialntelligence_presentation.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Mushroom cultivation and it's methods.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Ad

Security vs. UX