Главная
Study mode:
on
1
Introduction
2
Why do things work
3
Human stupidity
4
Complex systems
5
Desire trails
6
Checklists
7
Design Thinking
8
Empathy
9
Design
10
Phishing
11
The real problem
12
Phishing emails
13
Microsoft Office
14
AB Testing
15
Power of defaults
16
Popular options
17
Incentives
18
Ecosystem
19
Language
20
Practical Tips
21
Closing
Description:
Explore the intersection of security and user-centered design in this Black Hat conference talk. Delve into why certain technologies frustrate users while others delight, and examine how security processes and solutions are typically created. Challenge the notion that "humans are the weakest link" by learning user-centered design methods and concepts from disciplines like economics, psychology, and marketing. Discover how to build truly usable security tools, team structures, communication strategies, and incentive alignments. Gain practical tips for improving corporate productivity and security through design thinking, empathy, and understanding human behavior. Learn about desire trails, checklists, phishing prevention, AB testing, the power of defaults, and ecosystem considerations in security design.

Security Through Design - Making Security Better by Designing for People

Black Hat
Add to list