Human-Centered Security
In our interconnected world, we face a complex cybersecurity ecosystem where digital vulnerabilities can have far-reaching consequences. Threats to digital infrastructure often impact critical physical systems, potentially causing real-world harm. With AI agents set to handle extensive personal information, data security and privacy are more crucial than ever.

Human-Centered Security targets professionals designing digital products that handle sensitive data: UX designers, engineers, and product managers. It's also for those responsible for securing organizational data and systems: security engineers, CISOs, CIOs, and teams focused on risk management, legal, privacy, and compliance.

These professionals influence security-related behaviors and possess deep knowledge of threats to their products or organizations. This places a significant responsibility on them to design resilient systems that encourage safer outcomes. As the stakes continue to rise in our digital landscape, their role in protecting users from evolving cybersecurity risks becomes increasingly vital.

This book will help you:
  • Focus on areas of the user experience where security impacts users the most. These are places where users are signing up, configuring a product for the first time, handling customer or patient data, or when confronted with a security or privacy-related message or warning, to name a few.
  • Understand the dynamics of the security ecosystem. Looking at the security ecosystem from a single vantage point won’t work. Instead, you need to understand how the system design impacts users, how user actions prompt changes to the system design, how threat actors take advantage, how threat actors actions prompt changes to the system design, how users react, and on and on.
  • Find your security UX allies. Think of a Venn diagram, with circles representing the security team, the UX team, the product team, the engineering team, the legal and privacy teams, as so on. To improve the security user experience, these circles must overlap. In other words, each group’s expertise and perspective are required to understand and design for the dynamic cybersecurity ecosystem.
  • Ask better questions when talking to your cross-disciplinary team. These questions will help your team anticipate how users might react and how threat actors might take advantage.
  • What to consider when designing for secure outcomes. The book examines some of the most common security user experience issues.
  • Embrace iteration. Users will do things you didn't expect or account for. Even more importantly, threat actors will act in ways you couldn't have predicted. What was effective yesterday might not be as effective today.
1146391336
Human-Centered Security
In our interconnected world, we face a complex cybersecurity ecosystem where digital vulnerabilities can have far-reaching consequences. Threats to digital infrastructure often impact critical physical systems, potentially causing real-world harm. With AI agents set to handle extensive personal information, data security and privacy are more crucial than ever.

Human-Centered Security targets professionals designing digital products that handle sensitive data: UX designers, engineers, and product managers. It's also for those responsible for securing organizational data and systems: security engineers, CISOs, CIOs, and teams focused on risk management, legal, privacy, and compliance.

These professionals influence security-related behaviors and possess deep knowledge of threats to their products or organizations. This places a significant responsibility on them to design resilient systems that encourage safer outcomes. As the stakes continue to rise in our digital landscape, their role in protecting users from evolving cybersecurity risks becomes increasingly vital.

This book will help you:
  • Focus on areas of the user experience where security impacts users the most. These are places where users are signing up, configuring a product for the first time, handling customer or patient data, or when confronted with a security or privacy-related message or warning, to name a few.
  • Understand the dynamics of the security ecosystem. Looking at the security ecosystem from a single vantage point won’t work. Instead, you need to understand how the system design impacts users, how user actions prompt changes to the system design, how threat actors take advantage, how threat actors actions prompt changes to the system design, how users react, and on and on.
  • Find your security UX allies. Think of a Venn diagram, with circles representing the security team, the UX team, the product team, the engineering team, the legal and privacy teams, as so on. To improve the security user experience, these circles must overlap. In other words, each group’s expertise and perspective are required to understand and design for the dynamic cybersecurity ecosystem.
  • Ask better questions when talking to your cross-disciplinary team. These questions will help your team anticipate how users might react and how threat actors might take advantage.
  • What to consider when designing for secure outcomes. The book examines some of the most common security user experience issues.
  • Embrace iteration. Users will do things you didn't expect or account for. Even more importantly, threat actors will act in ways you couldn't have predicted. What was effective yesterday might not be as effective today.
49.99 In Stock
Human-Centered Security

Human-Centered Security

Human-Centered Security

Human-Centered Security

Paperback

$49.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

In our interconnected world, we face a complex cybersecurity ecosystem where digital vulnerabilities can have far-reaching consequences. Threats to digital infrastructure often impact critical physical systems, potentially causing real-world harm. With AI agents set to handle extensive personal information, data security and privacy are more crucial than ever.

Human-Centered Security targets professionals designing digital products that handle sensitive data: UX designers, engineers, and product managers. It's also for those responsible for securing organizational data and systems: security engineers, CISOs, CIOs, and teams focused on risk management, legal, privacy, and compliance.

These professionals influence security-related behaviors and possess deep knowledge of threats to their products or organizations. This places a significant responsibility on them to design resilient systems that encourage safer outcomes. As the stakes continue to rise in our digital landscape, their role in protecting users from evolving cybersecurity risks becomes increasingly vital.

This book will help you:
  • Focus on areas of the user experience where security impacts users the most. These are places where users are signing up, configuring a product for the first time, handling customer or patient data, or when confronted with a security or privacy-related message or warning, to name a few.
  • Understand the dynamics of the security ecosystem. Looking at the security ecosystem from a single vantage point won’t work. Instead, you need to understand how the system design impacts users, how user actions prompt changes to the system design, how threat actors take advantage, how threat actors actions prompt changes to the system design, how users react, and on and on.
  • Find your security UX allies. Think of a Venn diagram, with circles representing the security team, the UX team, the product team, the engineering team, the legal and privacy teams, as so on. To improve the security user experience, these circles must overlap. In other words, each group’s expertise and perspective are required to understand and design for the dynamic cybersecurity ecosystem.
  • Ask better questions when talking to your cross-disciplinary team. These questions will help your team anticipate how users might react and how threat actors might take advantage.
  • What to consider when designing for secure outcomes. The book examines some of the most common security user experience issues.
  • Embrace iteration. Users will do things you didn't expect or account for. Even more importantly, threat actors will act in ways you couldn't have predicted. What was effective yesterday might not be as effective today.

Product Details

ISBN-13: 9781959029090
Publisher: Rosenfeld Media
Publication date: 12/10/2024
Pages: 160
Product dimensions: 6.00(w) x 9.00(h) x 0.34(d)

About the Author

Heidi Trost is a UX leader who helps cross-disciplinary teams improve the security user experience. With a background in UX research, Heidi does this by helping teams better understand the people they are designing for, as well as the security threats that may impact people and systems negatively. Heidi is also the host of the podcast, Human-Centered Security, where she interviews security experts and people who design for the security user experience. When not thinking about security, you can find her in a sunny spot reading a book, hiking, or riding horses.
From the B&N Reads Blog

Customer Reviews