SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
Copyright 2018 Virtru Corporation
Bootstrapping UX
In a Privacy & Security Organization
Jim Lane
Vice President of User Experience
jlane@virtru.com
@jimlanenova
/in/jimlane
Copyright 2019 Virtru CorporationCopyright 2019 Virtru Corporation
We help organizations worldwide protect data
wherever it’s created or shared so they can
collaborate with confidence.
In so doing, we foster trust
and unlock the power of data.
Virtru’s Mission
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 3
DataAge 2025, Seagate
https://www.seagate.com/our-story/data-age-2025/
175
Zettabytes of data world-wide by 2025
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 4
Global Encryption Trends Study, conducted by Ponemon Institute and sponsored by nCipher Security
https://www.ncipher.com/2018/global-encryption-trends-study
43%
Only 43% of organizations have encryption
deployed across the enterprise
Part of the problem: usability.
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 5
106M records
540M records
885M records
11.9M records
Just a few of the major data breaches this year...
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 6
CHARTER PEOPLE PROCESS TOOLS STRATEGY
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 7
What is the Strategic Priority of UX?
1 2 3 4 5 6 7 8
Hostility
towards user
experience
Teams designing
for themselves
Small skunk
work projects
Dedicated
UX budget
Managed
UX team
Systematic
UCD process
Integrated UX &
design process
User driven
organization
With executive alignment…
Adapted from UX Maturity Model by Nielsen Norman Group
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 8
Tips & Tricks
Check out: John Whalen, Brilliant Experience: “Building Buy-In: Internally Positioning UX for Executive Impact”
Speak their language.
Communicate how design metrics will map to business goals.
Be a champion for both your team and the business.
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 9
CHARTER PEOPLE
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 10
Scenario
Design
Hire specialists,
Or generalists?
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 11
Product
Family
Product
Family
Product
Family
Product
Family
Product designers
embedded in teams with
product and engineering
leads
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 12
Tips & Tricks
Invest in your network.
Go beyond portfolio – look for process and soft skills.
Host an intern program.
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 13
CHARTER PEOPLE PROCESS
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 14
Research Prototype Design Develop Release
Iterative Cross-Functional Design Process
Check out: “Articulating Design Decisions” by Tom Greever
Copyright 2018 Virtru Corporation
Iterative Cross-Functional Design Process
Sometimes we sprint...
Sometimes we sprint ahead...
And sometimes we work on larger design problems or concepts outside
of the Agile process, and bring it back into sprints later when solutions are
better understood
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 16
Tips & Tricks
Share early and often.
Create opportunities to collaborate.
Demonstrate the value of UX quickly.
Check out: “Articulating Design Decisions” by Tom Greever
Copyright 2018 Virtru Corporation 17
heuristic evaluation
noun
A usability inspection method for computer software that helps to identify
usability problems in the user interface (UI) design.
Heuristics -> Observations -> Severity -> Frequency -> Scope -> Prioritization
Copyright 2018 Virtru Corporation 18
The system should:
1. provide appropriate feedback
2. act in a way the user expects
3. provide the user control and freedom
4. provide consistency and follows standards
5. not require users to remember information from one part of the interface to another
6. provide flexibility and efficiency of use
7. provide an aesthetic and simple-as-applicable design
8. help users recognize, diagnose, and recover from errors
9. prevent user error in the first place
10. provide appropriate help and documentation
Nielsen Norman Group
https://www.nngroup.com/articles/ten-usability-heuristics/
Copyright 2018 Virtru Corporation 19
The cryptographic API should:
1. Integrate crypto functionality into standard APIs
2. Sufficiently powerful to satisfy both security and non-security requirements
3. Easy to learn, even without cryptographic expertise
4. Don’t break the developer’s paradigm
5. Easy to use, even without documentation
6. Hard to misuse. Incorrect use should lead to visible errors.
7. Defaults should be safe and never ambiguous
8. Provide a testing mode
9. Easy to read and maintain code that uses it/updatability
10. Assist with/handle end-user interaction
Adapted from “Developers Are Not The Enemy! The Need for Usable Security APIs”
Green & Smith (2016)
Copyright 2018 Virtru Corporation 20
Personas
Customer Journeys
Service Blueprints
User Testing
Copyright 2018 Virtru Corporation 21
Personas
Customer Journeys
Service Blueprints
User Testing
Copyright 2018 Virtru Corporation 22
Personas
Customer Journeys
Service Blueprints
User Testing
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 23
CHARTER PEOPLE PROCESS TOOLS
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 24
+ + =
Sketch
Project Files,
Symbol Libraries
Abstract
Version
Control
Storybook
Javascript UI
Components
Design System
Componentized
Prod Design & Dev
Virtuoso Design System
Copyright 2019 Virtru Corporation
Product Design
Plug-ins
Secure Reader
Dashboard
Authentication
Marketing
Headers
Footers
Navigation
Forms
Menus
Tables
Layouts
...
25
Virtuoso Design System
Color
Shape
Typography
Icons
Buttons
Fields
Checkboxes
Radio
Buttons
...
Atoms Molecules Organisms
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 26
Tips & Tricks
Choose tools that will help your team collaborate,
prototype, scale, and pivot quickly.
Handoff to engineers is critical!
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 27
CHARTER PEOPLE PROCESS TOOLS STRATEGY
Copyright 2018 Virtru Corporation 28
Why Do Customers Protect Data?
Use cases:
Protect intellectual property from intentional or unintentional misuse
Share data securely within an organization, and with partners and service providers
Comply with regulations such as HIPAA, CFPB, GLBA
Protect data shared outside of the organization
Allow migration to Cloud platforms without sacrificing security - back to encryption
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 29
1. Persistent: Protect the data wherever it goes.
2. Share with Anyone: No prior trust relationship/key exchange required.
3. Positive Control: Control who can access data, from where, and for how long.
4. Visibility and Audit: Track and audit where data is shared and accessed.
What is Usable Encryption?
Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 30
Basic Usability
Control & Visibility
Scalability
Value
Can I collaborate successfully, securely, end-to-end,
with anyone?
Is security there when I need it?
Does it grow with my
experience & needs?
Are my company
and I secure?
Designing Usable Experiences
Copyright 2019 Virtru CorporationCopyright 2019 Virtru Corporation
We help organizations worldwide protect data
wherever it’s created or shared so they can
collaborate with confidence.
In so doing, we foster trust
and unlock the power of data.
Virtru’s Mission
Copyright 2018 Virtru Corporation
Thank you!
Jim Lane
Vice President of User Experience
jlane@virtru.com
@jimlanenova
/in/jimlane

Weitere ähnliche Inhalte

Was ist angesagt?

neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?Leonard Lee
 
Social Media Bootcamp for LinkedIn
Social Media Bootcamp for LinkedInSocial Media Bootcamp for LinkedIn
Social Media Bootcamp for LinkedInBob West
 
Technology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software IndustryTechnology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software IndustrySoftware Park Thailand
 
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote WorkforceClose the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforcejlieberman07
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudForcepoint LLC
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilienceaccenture
 
Towards a Digital teammate to support sensemaking in Cyber Security teams
Towards a Digital teammate to support sensemaking in Cyber Security teamsTowards a Digital teammate to support sensemaking in Cyber Security teams
Towards a Digital teammate to support sensemaking in Cyber Security teamsRick van der Kleij
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomyCisco Russia
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and auditMarc Vael
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - SymantecHarry Gunns
 
Why care about GDPR and avoid over $20 million fines, even outside EU ?
Why care about GDPR and avoid over $20 million fines, even outside EU ?Why care about GDPR and avoid over $20 million fines, even outside EU ?
Why care about GDPR and avoid over $20 million fines, even outside EU ?FactoVia
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf toolsMarc Vael
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy NetworkCollaborators
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationNetworkCollaborators
 
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...JamieWilliams130
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoEMarc Vael
 
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guideNUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guideNUS-ISS
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4Nur Shiqim Chok
 
Infographic: 5 Tips for Approaching Customers About Cloud Security
Infographic: 5 Tips for Approaching Customers About Cloud SecurityInfographic: 5 Tips for Approaching Customers About Cloud Security
Infographic: 5 Tips for Approaching Customers About Cloud SecurityIntronis MSP Solutions by Barracuda
 
CompTIA Instructor Network - CyberFest 2018 Week 1
CompTIA Instructor Network - CyberFest 2018 Week 1CompTIA Instructor Network - CyberFest 2018 Week 1
CompTIA Instructor Network - CyberFest 2018 Week 1Daniel Millbank
 

Was ist angesagt? (20)

neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
 
Social Media Bootcamp for LinkedIn
Social Media Bootcamp for LinkedInSocial Media Bootcamp for LinkedIn
Social Media Bootcamp for LinkedIn
 
Technology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software IndustryTechnology Trends & The Impact for Software Industry
Technology Trends & The Impact for Software Industry
 
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote WorkforceClose the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforce
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
 
From Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber ResilienceFrom Cybersecurity to Cyber Resilience
From Cybersecurity to Cyber Resilience
 
Towards a Digital teammate to support sensemaking in Cyber Security teams
Towards a Digital teammate to support sensemaking in Cyber Security teamsTowards a Digital teammate to support sensemaking in Cyber Security teams
Towards a Digital teammate to support sensemaking in Cyber Security teams
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and audit
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
Why care about GDPR and avoid over $20 million fines, even outside EU ?
Why care about GDPR and avoid over $20 million fines, even outside EU ?Why care about GDPR and avoid over $20 million fines, even outside EU ?
Why care about GDPR and avoid over $20 million fines, even outside EU ?
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
 
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guideNUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
 
Infographic: 5 Tips for Approaching Customers About Cloud Security
Infographic: 5 Tips for Approaching Customers About Cloud SecurityInfographic: 5 Tips for Approaching Customers About Cloud Security
Infographic: 5 Tips for Approaching Customers About Cloud Security
 
CompTIA Instructor Network - CyberFest 2018 Week 1
CompTIA Instructor Network - CyberFest 2018 Week 1CompTIA Instructor Network - CyberFest 2018 Week 1
CompTIA Instructor Network - CyberFest 2018 Week 1
 

Ähnlich wie Bootstrapping UX

Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingProtecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingIntralinks
 
DataEd Slides: Approaching Data Management Technologies
DataEd Slides:  Approaching Data Management TechnologiesDataEd Slides:  Approaching Data Management Technologies
DataEd Slides: Approaching Data Management TechnologiesDATAVERSITY
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy ManagementTrustArc
 
Dominando o 'Dragão Digital' | Encontro de Cios DTI e Sucesu Minas 27/02/2014
Dominando o 'Dragão Digital' | Encontro de Cios  DTI e Sucesu Minas 27/02/2014Dominando o 'Dragão Digital' | Encontro de Cios  DTI e Sucesu Minas 27/02/2014
Dominando o 'Dragão Digital' | Encontro de Cios DTI e Sucesu Minas 27/02/2014sucesuminas
 
WatchGuard Corporate Presentation.pptx
WatchGuard  Corporate Presentation.pptxWatchGuard  Corporate Presentation.pptx
WatchGuard Corporate Presentation.pptxRachatrinTongrungroj1
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023Search Engine Journal
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaUlf Mattsson
 
Summary : 5G adoption plans
Summary : 5G adoption plansSummary : 5G adoption plans
Summary : 5G adoption plansTuan Anh Nguyen
 
Brands as Services: How the IoT Is Creating New Ecosystems
Brands as Services: How the IoT Is Creating New EcosystemsBrands as Services: How the IoT Is Creating New Ecosystems
Brands as Services: How the IoT Is Creating New EcosystemsIPG Media Lab
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 
Inflectra Enterprise Agile Planning Briefing for Gartner 2018
Inflectra Enterprise Agile Planning Briefing for Gartner 2018Inflectra Enterprise Agile Planning Briefing for Gartner 2018
Inflectra Enterprise Agile Planning Briefing for Gartner 2018Adam Sandman
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaCristian Garcia G.
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKUlf Mattsson
 
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Executive Leaders Network
 
Innovation story
Innovation storyInnovation story
Innovation storySmartOrg
 
An Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductAn Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductSalesforce Developers
 
(ENT312) Should You Build or Buy Cloud Infrastructure and Platforms? | AWS re...
(ENT312) Should You Build or Buy Cloud Infrastructure and Platforms? | AWS re...(ENT312) Should You Build or Buy Cloud Infrastructure and Platforms? | AWS re...
(ENT312) Should You Build or Buy Cloud Infrastructure and Platforms? | AWS re...Amazon Web Services
 

Ähnlich wie Bootstrapping UX (20)

Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingProtecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File Sharing
 
DataEd Slides: Approaching Data Management Technologies
DataEd Slides:  Approaching Data Management TechnologiesDataEd Slides:  Approaching Data Management Technologies
DataEd Slides: Approaching Data Management Technologies
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 
Dominando o 'Dragão Digital' | Encontro de Cios DTI e Sucesu Minas 27/02/2014
Dominando o 'Dragão Digital' | Encontro de Cios  DTI e Sucesu Minas 27/02/2014Dominando o 'Dragão Digital' | Encontro de Cios  DTI e Sucesu Minas 27/02/2014
Dominando o 'Dragão Digital' | Encontro de Cios DTI e Sucesu Minas 27/02/2014
 
WatchGuard Corporate Presentation.pptx
WatchGuard  Corporate Presentation.pptxWatchGuard  Corporate Presentation.pptx
WatchGuard Corporate Presentation.pptx
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
Summary : 5G adoption plans
Summary : 5G adoption plansSummary : 5G adoption plans
Summary : 5G adoption plans
 
Brands as Services: How the IoT Is Creating New Ecosystems
Brands as Services: How the IoT Is Creating New EcosystemsBrands as Services: How the IoT Is Creating New Ecosystems
Brands as Services: How the IoT Is Creating New Ecosystems
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Inflectra Enterprise Agile Planning Briefing for Gartner 2018
Inflectra Enterprise Agile Planning Briefing for Gartner 2018Inflectra Enterprise Agile Planning Briefing for Gartner 2018
Inflectra Enterprise Agile Planning Briefing for Gartner 2018
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
VSD Paris 2018 - Présentation Finale
VSD Paris 2018 - Présentation FinaleVSD Paris 2018 - Présentation Finale
VSD Paris 2018 - Présentation Finale
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
Streaming Processes: Creating a Start-up Within a Big Corporate (Mohammad Sha...
 
Innovation story
Innovation storyInnovation story
Innovation story
 
An Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductAn Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT Product
 
(ENT312) Should You Build or Buy Cloud Infrastructure and Platforms? | AWS re...
(ENT312) Should You Build or Buy Cloud Infrastructure and Platforms? | AWS re...(ENT312) Should You Build or Buy Cloud Infrastructure and Platforms? | AWS re...
(ENT312) Should You Build or Buy Cloud Infrastructure and Platforms? | AWS re...
 
Security and Data Breach
Security and Data BreachSecurity and Data Breach
Security and Data Breach
 

Mehr von Jim Lane

Design Systems, Beyond Components: Spacing, Measurement & More
Design Systems, Beyond Components: Spacing, Measurement & MoreDesign Systems, Beyond Components: Spacing, Measurement & More
Design Systems, Beyond Components: Spacing, Measurement & MoreJim Lane
 
ux@addthis NoVA UX meetup presentation
ux@addthis NoVA UX meetup presentationux@addthis NoVA UX meetup presentation
ux@addthis NoVA UX meetup presentationJim Lane
 
Notion Theory: UX Lessons Learned
Notion Theory: UX Lessons LearnedNotion Theory: UX Lessons Learned
Notion Theory: UX Lessons LearnedJim Lane
 
NoVA UX User Testing Workshop July 2015 - Will King
NoVA UX User Testing Workshop July 2015 - Will KingNoVA UX User Testing Workshop July 2015 - Will King
NoVA UX User Testing Workshop July 2015 - Will KingJim Lane
 
Chrissy Ching: How to Land a Job in UX
Chrissy Ching: How to Land a Job in UXChrissy Ching: How to Land a Job in UX
Chrissy Ching: How to Land a Job in UXJim Lane
 
UI Testing Automation - Alex Kalinovsky - CreamTec LLC
UI Testing Automation - Alex Kalinovsky - CreamTec LLCUI Testing Automation - Alex Kalinovsky - CreamTec LLC
UI Testing Automation - Alex Kalinovsky - CreamTec LLCJim Lane
 
NoVA UX Meetup: Product Testing and Data-informed Design
NoVA UX Meetup: Product Testing and Data-informed DesignNoVA UX Meetup: Product Testing and Data-informed Design
NoVA UX Meetup: Product Testing and Data-informed DesignJim Lane
 
AddThis Web Intents Lightning Talk
AddThis Web Intents Lightning TalkAddThis Web Intents Lightning Talk
AddThis Web Intents Lightning TalkJim Lane
 

Mehr von Jim Lane (8)

Design Systems, Beyond Components: Spacing, Measurement & More
Design Systems, Beyond Components: Spacing, Measurement & MoreDesign Systems, Beyond Components: Spacing, Measurement & More
Design Systems, Beyond Components: Spacing, Measurement & More
 
ux@addthis NoVA UX meetup presentation
ux@addthis NoVA UX meetup presentationux@addthis NoVA UX meetup presentation
ux@addthis NoVA UX meetup presentation
 
Notion Theory: UX Lessons Learned
Notion Theory: UX Lessons LearnedNotion Theory: UX Lessons Learned
Notion Theory: UX Lessons Learned
 
NoVA UX User Testing Workshop July 2015 - Will King
NoVA UX User Testing Workshop July 2015 - Will KingNoVA UX User Testing Workshop July 2015 - Will King
NoVA UX User Testing Workshop July 2015 - Will King
 
Chrissy Ching: How to Land a Job in UX
Chrissy Ching: How to Land a Job in UXChrissy Ching: How to Land a Job in UX
Chrissy Ching: How to Land a Job in UX
 
UI Testing Automation - Alex Kalinovsky - CreamTec LLC
UI Testing Automation - Alex Kalinovsky - CreamTec LLCUI Testing Automation - Alex Kalinovsky - CreamTec LLC
UI Testing Automation - Alex Kalinovsky - CreamTec LLC
 
NoVA UX Meetup: Product Testing and Data-informed Design
NoVA UX Meetup: Product Testing and Data-informed DesignNoVA UX Meetup: Product Testing and Data-informed Design
NoVA UX Meetup: Product Testing and Data-informed Design
 
AddThis Web Intents Lightning Talk
AddThis Web Intents Lightning TalkAddThis Web Intents Lightning Talk
AddThis Web Intents Lightning Talk
 

Kürzlich hochgeladen

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...kumaririma588
 
Pastel Portfolio _ by Slidesgo.pptx. Xxx
Pastel Portfolio _ by Slidesgo.pptx. XxxPastel Portfolio _ by Slidesgo.pptx. Xxx
Pastel Portfolio _ by Slidesgo.pptx. XxxSegundoManuelFaichin1
 
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceanilsa9823
 
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...Call Girls in Nagpur High Profile
 
Design Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptxDesign Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptxTusharBahuguna2
 
Case Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneCase Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneLukeKholes
 
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Tapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the FunnelTapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the Funneljen_giacalone
 
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...Delhi Call girls
 
AMBER GRAIN EMBROIDERY | Growing folklore elements | Root-based materials, w...
AMBER GRAIN EMBROIDERY | Growing folklore elements |  Root-based materials, w...AMBER GRAIN EMBROIDERY | Growing folklore elements |  Root-based materials, w...
AMBER GRAIN EMBROIDERY | Growing folklore elements | Root-based materials, w...BarusRa
 
DragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxDragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxmirandajeremy200221
 
Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...amitlee9823
 
UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...
UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...
UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...RitikaRoy32
 
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...SUHANI PANDEY
 
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
infant assessment fdbbdbdddinal ppt.pptx
infant assessment fdbbdbdddinal ppt.pptxinfant assessment fdbbdbdddinal ppt.pptx
infant assessment fdbbdbdddinal ppt.pptxsuhanimunjal27
 
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...Call Girls in Nagpur High Profile
 

Kürzlich hochgeladen (20)

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...Verified Trusted Call Girls Adugodi💘 9352852248  Good Looking standard Profil...
Verified Trusted Call Girls Adugodi💘 9352852248 Good Looking standard Profil...
 
Pastel Portfolio _ by Slidesgo.pptx. Xxx
Pastel Portfolio _ by Slidesgo.pptx. XxxPastel Portfolio _ by Slidesgo.pptx. Xxx
Pastel Portfolio _ by Slidesgo.pptx. Xxx
 
young call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Service
young call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Service
young call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Service
 
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Aminabad Lucknow best Night Fun service
 
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...Top Rated  Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
Top Rated Pune Call Girls Koregaon Park ⟟ 6297143586 ⟟ Call Me For Genuine S...
 
Design Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptxDesign Inspiration for College by Slidesgo.pptx
Design Inspiration for College by Slidesgo.pptx
 
Case Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneCase Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, Pune
 
B. Smith. (Architectural Portfolio.).pdf
B. Smith. (Architectural Portfolio.).pdfB. Smith. (Architectural Portfolio.).pdf
B. Smith. (Architectural Portfolio.).pdf
 
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Brookefield Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Tapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the FunnelTapestry Clothing Brands: Collapsing the Funnel
Tapestry Clothing Brands: Collapsing the Funnel
 
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
call girls in Kaushambi (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝...
 
AMBER GRAIN EMBROIDERY | Growing folklore elements | Root-based materials, w...
AMBER GRAIN EMBROIDERY | Growing folklore elements |  Root-based materials, w...AMBER GRAIN EMBROIDERY | Growing folklore elements |  Root-based materials, w...
AMBER GRAIN EMBROIDERY | Growing folklore elements | Root-based materials, w...
 
DragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxDragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptx
 
Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Jigani Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
 
UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...
UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...
UI:UX Design and Empowerment Strategies for Underprivileged Transgender Indiv...
 
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
 
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Nagavara ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
infant assessment fdbbdbdddinal ppt.pptx
infant assessment fdbbdbdddinal ppt.pptxinfant assessment fdbbdbdddinal ppt.pptx
infant assessment fdbbdbdddinal ppt.pptx
 
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
VVIP Pune Call Girls Hadapsar (7001035870) Pune Escorts Nearby with Complete ...
 

Bootstrapping UX

  • 1. Copyright 2018 Virtru Corporation Bootstrapping UX In a Privacy & Security Organization Jim Lane Vice President of User Experience jlane@virtru.com @jimlanenova /in/jimlane
  • 2. Copyright 2019 Virtru CorporationCopyright 2019 Virtru Corporation We help organizations worldwide protect data wherever it’s created or shared so they can collaborate with confidence. In so doing, we foster trust and unlock the power of data. Virtru’s Mission
  • 3. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 3 DataAge 2025, Seagate https://www.seagate.com/our-story/data-age-2025/ 175 Zettabytes of data world-wide by 2025
  • 4. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 4 Global Encryption Trends Study, conducted by Ponemon Institute and sponsored by nCipher Security https://www.ncipher.com/2018/global-encryption-trends-study 43% Only 43% of organizations have encryption deployed across the enterprise Part of the problem: usability.
  • 5. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 5 106M records 540M records 885M records 11.9M records Just a few of the major data breaches this year...
  • 6. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 6 CHARTER PEOPLE PROCESS TOOLS STRATEGY
  • 7. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 7 What is the Strategic Priority of UX? 1 2 3 4 5 6 7 8 Hostility towards user experience Teams designing for themselves Small skunk work projects Dedicated UX budget Managed UX team Systematic UCD process Integrated UX & design process User driven organization With executive alignment… Adapted from UX Maturity Model by Nielsen Norman Group
  • 8. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 8 Tips & Tricks Check out: John Whalen, Brilliant Experience: “Building Buy-In: Internally Positioning UX for Executive Impact” Speak their language. Communicate how design metrics will map to business goals. Be a champion for both your team and the business.
  • 9. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 9 CHARTER PEOPLE
  • 10. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 10 Scenario Design Hire specialists, Or generalists?
  • 11. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 11 Product Family Product Family Product Family Product Family Product designers embedded in teams with product and engineering leads
  • 12. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 12 Tips & Tricks Invest in your network. Go beyond portfolio – look for process and soft skills. Host an intern program.
  • 13. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 13 CHARTER PEOPLE PROCESS
  • 14. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 14 Research Prototype Design Develop Release Iterative Cross-Functional Design Process Check out: “Articulating Design Decisions” by Tom Greever
  • 15. Copyright 2018 Virtru Corporation Iterative Cross-Functional Design Process Sometimes we sprint... Sometimes we sprint ahead... And sometimes we work on larger design problems or concepts outside of the Agile process, and bring it back into sprints later when solutions are better understood
  • 16. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 16 Tips & Tricks Share early and often. Create opportunities to collaborate. Demonstrate the value of UX quickly. Check out: “Articulating Design Decisions” by Tom Greever
  • 17. Copyright 2018 Virtru Corporation 17 heuristic evaluation noun A usability inspection method for computer software that helps to identify usability problems in the user interface (UI) design. Heuristics -> Observations -> Severity -> Frequency -> Scope -> Prioritization
  • 18. Copyright 2018 Virtru Corporation 18 The system should: 1. provide appropriate feedback 2. act in a way the user expects 3. provide the user control and freedom 4. provide consistency and follows standards 5. not require users to remember information from one part of the interface to another 6. provide flexibility and efficiency of use 7. provide an aesthetic and simple-as-applicable design 8. help users recognize, diagnose, and recover from errors 9. prevent user error in the first place 10. provide appropriate help and documentation Nielsen Norman Group https://www.nngroup.com/articles/ten-usability-heuristics/
  • 19. Copyright 2018 Virtru Corporation 19 The cryptographic API should: 1. Integrate crypto functionality into standard APIs 2. Sufficiently powerful to satisfy both security and non-security requirements 3. Easy to learn, even without cryptographic expertise 4. Don’t break the developer’s paradigm 5. Easy to use, even without documentation 6. Hard to misuse. Incorrect use should lead to visible errors. 7. Defaults should be safe and never ambiguous 8. Provide a testing mode 9. Easy to read and maintain code that uses it/updatability 10. Assist with/handle end-user interaction Adapted from “Developers Are Not The Enemy! The Need for Usable Security APIs” Green & Smith (2016)
  • 20. Copyright 2018 Virtru Corporation 20 Personas Customer Journeys Service Blueprints User Testing
  • 21. Copyright 2018 Virtru Corporation 21 Personas Customer Journeys Service Blueprints User Testing
  • 22. Copyright 2018 Virtru Corporation 22 Personas Customer Journeys Service Blueprints User Testing
  • 23. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 23 CHARTER PEOPLE PROCESS TOOLS
  • 24. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 24 + + = Sketch Project Files, Symbol Libraries Abstract Version Control Storybook Javascript UI Components Design System Componentized Prod Design & Dev Virtuoso Design System
  • 25. Copyright 2019 Virtru Corporation Product Design Plug-ins Secure Reader Dashboard Authentication Marketing Headers Footers Navigation Forms Menus Tables Layouts ... 25 Virtuoso Design System Color Shape Typography Icons Buttons Fields Checkboxes Radio Buttons ... Atoms Molecules Organisms
  • 26. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 26 Tips & Tricks Choose tools that will help your team collaborate, prototype, scale, and pivot quickly. Handoff to engineers is critical!
  • 27. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 27 CHARTER PEOPLE PROCESS TOOLS STRATEGY
  • 28. Copyright 2018 Virtru Corporation 28 Why Do Customers Protect Data? Use cases: Protect intellectual property from intentional or unintentional misuse Share data securely within an organization, and with partners and service providers Comply with regulations such as HIPAA, CFPB, GLBA Protect data shared outside of the organization Allow migration to Cloud platforms without sacrificing security - back to encryption
  • 29. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 29 1. Persistent: Protect the data wherever it goes. 2. Share with Anyone: No prior trust relationship/key exchange required. 3. Positive Control: Control who can access data, from where, and for how long. 4. Visibility and Audit: Track and audit where data is shared and accessed. What is Usable Encryption?
  • 30. Copyright 2018 Virtru CorporationCopyright 2019 Virtru Corporation 30 Basic Usability Control & Visibility Scalability Value Can I collaborate successfully, securely, end-to-end, with anyone? Is security there when I need it? Does it grow with my experience & needs? Are my company and I secure? Designing Usable Experiences
  • 31. Copyright 2019 Virtru CorporationCopyright 2019 Virtru Corporation We help organizations worldwide protect data wherever it’s created or shared so they can collaborate with confidence. In so doing, we foster trust and unlock the power of data. Virtru’s Mission
  • 32. Copyright 2018 Virtru Corporation Thank you! Jim Lane Vice President of User Experience jlane@virtru.com @jimlanenova /in/jimlane