SlideShare a Scribd company logo
1 of 82
Download to read offline
USABLE SECURITY
RACHEL SIMPSON (@RILAN) & GUY PODJARNY (@GUYPOD)
DO YOU REMEMBER…
Usable security
0 0 0 3 4 1
HIT COUNTER
Usable security
Usable security
Usable security
Usable security
FOR DIGITAL SECURITY, THE STAKES
HAVE NEVER BEEN HIGHER.
Usable security
ARE USERS REALLY THE
WEAKEST LINK?
RACHEL SIMPSON
@RILAN
RACHEL SIMPSON
@RILAN
GUY PODJARNY
@GUYPOD
USABLE SECURITY
WHAT’S ON THE AGENDA?
▸ Why do people do what they do?
▸ Passwords
▸ HTTPS errors
▸ SSL Interstitials
▸ Phishing
▸ Takeways
ARE USERS REALLY THE
WEAKEST LINK?
WE’RE ONLY HUMAN.
USABLE SECURITY
HUMAN FACTORS
▸ Memory
USABLE SECURITY
HUMAN FACTORS
▸ Memory
▸ Attention
USABLE SECURITY
HUMAN FACTORS
▸ Memory
▸ Attention
▸ Cognitive load
USABLE SECURITY
HUMAN FACTORS
▸ Memory
▸ Attention
▸ Cognitive load
▸ Previous context
PASSWORDS
WHY ARE PASSWORDS
HARD?
Usable security
Usable security
Usable security
Usable security
130 ACCOUNTS PER
AMERICAN USER
BLOG.DASHLANE.COM
Usable security
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
….
MEMORY IS A LIMITED
RESOURCE
WE USE PASSWORDS THAT ARE HARD
FOR HUMANS TO REMEMBER, 

BUT EASY FOR COMPUTERS TO GUESS
XKCD
WWW.XKCD.COM/936
P@$$w0rd
FROM SPLASH DATA’S WORST PASSWORDS OF 2015
ATTACKERS ENUMERATE USERNAMES WITH COMMON PASSWORDS
▸ 123456
▸ password
▸ 12345
▸ 12345678
▸ qwerty
▸ 123456789
▸ 1234
▸ baseball
▸ dragon
▸ football
Usable security
WHAT CAN WE DO?
Usable security
Usable security
Photo by Mateusz Adamowski
Usable security
BE MORE FLEXIBLE
TAKEAWAY #1
(BUT NOT TOO FLEXIBLE)
TAKEAWAY #1
SPOT THE SECURITY
INFO
Usable security
Usable security
Usable security
Usable security
ATTENTION IS FOCUSED
ON THE TASK AT HAND
Usable security
Usable security
BE TIMELY & MEANINGFUL
TAKEAWAY #2
INTERSTITIALS
Usable security
63% CONTINUED
THROUGH THE WARNING
EXPERIMENTING AT SCALE WITH GOOGLE CHROME’S SSL WARNING
Usable security
Usable security
Usable security
38% CONTINUED
THROUGH THE WARNING
EXPERIMENTING AT SCALE WITH GOOGLE CHROME’S SSL WARNING
MAKING DECISIONS
HAS A COST
OFFER AN OPINION
TAKEAWAY #3
PHISHING
HELENONLINE
HELENONLINE
THERE’S NO PATCH FOR HUMAN
STUPIDITY
Trolls
GENERAL INTERNET WISDOM
23% AVERAGE OPEN
RATE
THREATSIM STATE OF THE PHISH STUDY
11% AVERAGE CLICK
THROUGH RATE
THREATSIM STATE OF THE PHISH STUDY
YOU DON’T KNOW WHAT
YOU DON’T KNOW.
USERS DO NOT GENERALLY PERCEIVE
THE ABSENCE OF A WARNING SIGN.
Chrome Security Team
MARKING HTTP AS NON-SECURE
Usable security
HOW BAD IS PHISHING
REALLY?
LABS.FT.COM/2013/05/A-SOBERING-DAY/
LABS.FT.COM/2013/05/A-SOBERING-DAY/
LABS.FT.COM/2013/05/A-SOBERING-DAY/
OUR LAST PHISHING
EXAMPLE
GUY GETS PHISHED
WHAT CAN WE DO?
INFO.BANKOFAMERICA.COM/NEW-SIGN-IN/
Usable security
KNOW YOUR AUDIENCE
BE MORE FLEXIBLE
BE TIMELY & MEANINGFUL
OFFER AN OPINION
USABLE SECURITY
BE MORE FLEXIBLE
BE TIMELY & MEANINGFUL
USABLE SECURITY
BE MORE FLEXIBLE
BE TIMELY & MEANINGFUL
OFFER AN OPINION
USABLE SECURITY
WE’RE HIRING!
RACHEL SIMPSON
@RILAN
GUY PODJARNY
@GUYPOD
USABLE SECURITY
RESOURCES
▸ Transforming the ‘weakest link’ – a human/computer interaction approach to usable and effective
security (M A Sasse, S Brushoff, D Weirich)
▸ Learning from “Shadow Security” (Iacovos Kirlappos, Simon Parkin, M. Angela Sasse)
▸ Users are not the enemy (Anne Adams, Martina Angela Sasse)
▸ Experimenting at scale with Google Chrome’s SSL Warning (Adrienne Porter Felt, Hazim Almuhimedi,
Sunny Consolvo)
▸ Improving SSL Warnings: Comprehension & Adherence (Adrienne Porter Felt, Alex Ainslie, Robert W.
Reeder, Sunny Consolvo, Somas Thyagaraja, Alan Bettes, Helen Harris, Jeff Grimes)
▸ The Emperor’s New Security Indicators (Stuart E. Schechter, Rachna Dhamija, Andy Ozment, Ian
Fischer)

More Related Content

Viewers also liked

Usable security it isn't secure if people can't use it mwux 2 jun2012
Usable security   it isn't secure if people can't use it mwux 2 jun2012Usable security   it isn't secure if people can't use it mwux 2 jun2012
Usable security it isn't secure if people can't use it mwux 2 jun2012Darren Kall
 
(Un)usable Security
(Un)usable Security(Un)usable Security
(Un)usable SecurityStefan
 
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...United Security Providers AG
 
Usable security- It isn't secure if people can't use it. O-ISC conference 14m...
Usable security- It isn't secure if people can't use it. O-ISC conference 14m...Usable security- It isn't secure if people can't use it. O-ISC conference 14m...
Usable security- It isn't secure if people can't use it. O-ISC conference 14m...Darren Kall
 
ATUS - A Toolkit for Usable Security
ATUS - A Toolkit for Usable SecurityATUS - A Toolkit for Usable Security
ATUS - A Toolkit for Usable SecuritySven Wohlgemuth
 
Ctf online idsecconf2012 walkthrough
Ctf online idsecconf2012 walkthroughCtf online idsecconf2012 walkthrough
Ctf online idsecconf2012 walkthroughidsecconf
 
Usability and security in future voting systems
Usability and security in future voting systemsUsability and security in future voting systems
Usability and security in future voting systemsDana Chisnell
 
Workshop: Gathering User Insight
Workshop: Gathering User InsightWorkshop: Gathering User Insight
Workshop: Gathering User InsightDarren Kall
 
Lorrie Cranor - Usable Privacy & Security
Lorrie Cranor - Usable Privacy & SecurityLorrie Cranor - Usable Privacy & Security
Lorrie Cranor - Usable Privacy & SecurityAmy Lenzo
 
Usability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsUsability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsJosiah Renaudin
 
2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...
2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...
2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...Laura Albert
 
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001Laura Albert
 
Usable Security: When Security Meets Usability
Usable Security: When Security Meets UsabilityUsable Security: When Security Meets Usability
Usable Security: When Security Meets UsabilityShujun Li
 
[Webinar Slides] Flexibility vs. Control: How to Work Beyond Corporate Firewa...
[Webinar Slides] Flexibility vs. Control: How to Work Beyond Corporate Firewa...[Webinar Slides] Flexibility vs. Control: How to Work Beyond Corporate Firewa...
[Webinar Slides] Flexibility vs. Control: How to Work Beyond Corporate Firewa...AIIM International
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hackingchakrekevin
 
Cloud Security & Real World Threats
Cloud Security & Real World ThreatsCloud Security & Real World Threats
Cloud Security & Real World ThreatsRob Witoff
 

Viewers also liked (16)

Usable security it isn't secure if people can't use it mwux 2 jun2012
Usable security   it isn't secure if people can't use it mwux 2 jun2012Usable security   it isn't secure if people can't use it mwux 2 jun2012
Usable security it isn't secure if people can't use it mwux 2 jun2012
 
(Un)usable Security
(Un)usable Security(Un)usable Security
(Un)usable Security
 
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
 
Usable security- It isn't secure if people can't use it. O-ISC conference 14m...
Usable security- It isn't secure if people can't use it. O-ISC conference 14m...Usable security- It isn't secure if people can't use it. O-ISC conference 14m...
Usable security- It isn't secure if people can't use it. O-ISC conference 14m...
 
ATUS - A Toolkit for Usable Security
ATUS - A Toolkit for Usable SecurityATUS - A Toolkit for Usable Security
ATUS - A Toolkit for Usable Security
 
Ctf online idsecconf2012 walkthrough
Ctf online idsecconf2012 walkthroughCtf online idsecconf2012 walkthrough
Ctf online idsecconf2012 walkthrough
 
Usability and security in future voting systems
Usability and security in future voting systemsUsability and security in future voting systems
Usability and security in future voting systems
 
Workshop: Gathering User Insight
Workshop: Gathering User InsightWorkshop: Gathering User Insight
Workshop: Gathering User Insight
 
Lorrie Cranor - Usable Privacy & Security
Lorrie Cranor - Usable Privacy & SecurityLorrie Cranor - Usable Privacy & Security
Lorrie Cranor - Usable Privacy & Security
 
Usability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile AppsUsability vs. Security: Find the Right Balance in Mobile Apps
Usability vs. Security: Find the Right Balance in Mobile Apps
 
2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...
2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...
2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...
 
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001
 
Usable Security: When Security Meets Usability
Usable Security: When Security Meets UsabilityUsable Security: When Security Meets Usability
Usable Security: When Security Meets Usability
 
[Webinar Slides] Flexibility vs. Control: How to Work Beyond Corporate Firewa...
[Webinar Slides] Flexibility vs. Control: How to Work Beyond Corporate Firewa...[Webinar Slides] Flexibility vs. Control: How to Work Beyond Corporate Firewa...
[Webinar Slides] Flexibility vs. Control: How to Work Beyond Corporate Firewa...
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Cloud Security & Real World Threats
Cloud Security & Real World ThreatsCloud Security & Real World Threats
Cloud Security & Real World Threats
 

Similar to Usable security

Pros And Cons Of Technology Based Society
Pros And Cons Of Technology Based SocietyPros And Cons Of Technology Based Society
Pros And Cons Of Technology Based SocietyHeather Freek
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
 
Internet Safety & Security
Internet Safety & Security Internet Safety & Security
Internet Safety & Security Austin Stroud
 
The Mobile Tribe
The Mobile TribeThe Mobile Tribe
The Mobile TribeDan Keldsen
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebJamie Reffell
 
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...Santhosh Tuppad
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017NRC
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial IntegrityFraudBusters
 
Disadvantages Of Hacking
Disadvantages Of HackingDisadvantages Of Hacking
Disadvantages Of HackingNavy Savchenko
 
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...ConorGilsenan1
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskRob Ragan
 
Don't be a trojan - Java2Days 2018
Don't be a trojan - Java2Days 2018Don't be a trojan - Java2Days 2018
Don't be a trojan - Java2Days 2018Brian Vermeer
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCBIZ, Inc.
 
Suffocation In Into The Wild
Suffocation In Into The WildSuffocation In Into The Wild
Suffocation In Into The WildAnn Garcia
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereBlake Carver
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishingecarrow
 

Similar to Usable security (20)

Pros And Cons Of Technology Based Society
Pros And Cons Of Technology Based SocietyPros And Cons Of Technology Based Society
Pros And Cons Of Technology Based Society
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Internet Safety & Security
Internet Safety & Security Internet Safety & Security
Internet Safety & Security
 
The Mobile Tribe
The Mobile TribeThe Mobile Tribe
The Mobile Tribe
 
sanfranAIG3
sanfranAIG3sanfranAIG3
sanfranAIG3
 
Pragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the WebPragmatic Designer's Guide to Identity on the Web
Pragmatic Designer's Guide to Identity on the Web
 
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
 
Bad Credit
Bad CreditBad Credit
Bad Credit
 
Unmasking You
Unmasking YouUnmasking You
Unmasking You
 
Disadvantages Of Hacking
Disadvantages Of HackingDisadvantages Of Hacking
Disadvantages Of Hacking
 
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
 
Don't be a trojan - Java2Days 2018
Don't be a trojan - Java2Days 2018Don't be a trojan - Java2Days 2018
Don't be a trojan - Java2Days 2018
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
 
Suffocation In Into The Wild
Suffocation In Into The WildSuffocation In Into The Wild
Suffocation In Into The Wild
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 

Recently uploaded

Production of Erythromycin microbiology.pptx
Production of Erythromycin microbiology.pptxProduction of Erythromycin microbiology.pptx
Production of Erythromycin microbiology.pptxb2kshani34
 
High-Quality Faux Embroidery Services | Cre8iveSkill
High-Quality Faux Embroidery Services | Cre8iveSkillHigh-Quality Faux Embroidery Services | Cre8iveSkill
High-Quality Faux Embroidery Services | Cre8iveSkillCre8iveskill
 
Central-Visayas-1.pdf reporting purposes
Central-Visayas-1.pdf reporting purposesCentral-Visayas-1.pdf reporting purposes
Central-Visayas-1.pdf reporting purposesmilalabial
 
Designing for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsDesigning for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsBlock Party
 
Design mental models for managing large-scale dbt projects. March 21, 2024 in...
Design mental models for managing large-scale dbt projects. March 21, 2024 in...Design mental models for managing large-scale dbt projects. March 21, 2024 in...
Design mental models for managing large-scale dbt projects. March 21, 2024 in...Ed Orozco
 
TIMBRE: HOW MIGHT WE REMEDY MUSIC DESERTS AND FACILITATE GROWTH OF A MUSICAL ...
TIMBRE: HOW MIGHT WE REMEDY MUSIC DESERTS AND FACILITATE GROWTH OF A MUSICAL ...TIMBRE: HOW MIGHT WE REMEDY MUSIC DESERTS AND FACILITATE GROWTH OF A MUSICAL ...
TIMBRE: HOW MIGHT WE REMEDY MUSIC DESERTS AND FACILITATE GROWTH OF A MUSICAL ...Pranav Subramanian
 
Mike Tyson Sign The Contract Big Boy Shirt
Mike Tyson Sign The Contract Big Boy ShirtMike Tyson Sign The Contract Big Boy Shirt
Mike Tyson Sign The Contract Big Boy ShirtTeeFusion
 
WCM Branding Agency | 210519 - Portfolio Review (F&B) -s.pptx
WCM Branding Agency | 210519 - Portfolio Review (F&B) -s.pptxWCM Branding Agency | 210519 - Portfolio Review (F&B) -s.pptx
WCM Branding Agency | 210519 - Portfolio Review (F&B) -s.pptxHasan S
 
Best-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakis...
Best-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakis...Best-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakis...
Best-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakis...Amil baba
 
LRFD Bridge Design Specifications-AASHTO (2014).pdf
LRFD Bridge Design Specifications-AASHTO (2014).pdfLRFD Bridge Design Specifications-AASHTO (2014).pdf
LRFD Bridge Design Specifications-AASHTO (2014).pdfHctorFranciscoSnchez1
 
Materi dasar prototype dan figma .pdf
Materi dasar prototype dan figma    .pdfMateri dasar prototype dan figma    .pdf
Materi dasar prototype dan figma .pdfardanaadam1
 
Building+your+Data+Project+on+AWS+-+Luke+Anderson.pdf
Building+your+Data+Project+on+AWS+-+Luke+Anderson.pdfBuilding+your+Data+Project+on+AWS+-+Luke+Anderson.pdf
Building+your+Data+Project+on+AWS+-+Luke+Anderson.pdfsaidbilgen
 
Embroidery design from embroidery magazine
Embroidery design from embroidery magazineEmbroidery design from embroidery magazine
Embroidery design from embroidery magazineRivanEleraki
 
Introduce Trauma-Informed Design to Your Organization - CSUN ATC 2024
Introduce Trauma-Informed Design to Your Organization - CSUN ATC 2024Introduce Trauma-Informed Design to Your Organization - CSUN ATC 2024
Introduce Trauma-Informed Design to Your Organization - CSUN ATC 2024Ted Drake
 
UX Conference on UX Research Trends in 2024
UX Conference on UX Research Trends in 2024UX Conference on UX Research Trends in 2024
UX Conference on UX Research Trends in 2024mikailaoh
 
Math Group 3 Presentation OLOLOLOLILOOLLOLOL
Math Group 3 Presentation OLOLOLOLILOOLLOLOLMath Group 3 Presentation OLOLOLOLILOOLLOLOL
Math Group 3 Presentation OLOLOLOLILOOLLOLOLkenzukiri
 
INTRODUCTION TO UI/UX DESIGN BEGINNERS.pdf
INTRODUCTION TO UI/UX DESIGN BEGINNERS.pdfINTRODUCTION TO UI/UX DESIGN BEGINNERS.pdf
INTRODUCTION TO UI/UX DESIGN BEGINNERS.pdfphriedaoyigada
 
Exploring Futuristic Factory Designs: A 3D Interior Rendering Studio's Perspe...
Exploring Futuristic Factory Designs: A 3D Interior Rendering Studio's Perspe...Exploring Futuristic Factory Designs: A 3D Interior Rendering Studio's Perspe...
Exploring Futuristic Factory Designs: A 3D Interior Rendering Studio's Perspe...Yantram Animation Studio Corporation
 
Cold War Tensions Increase - 1945-1952.pptx
Cold War Tensions Increase - 1945-1952.pptxCold War Tensions Increase - 1945-1952.pptx
Cold War Tensions Increase - 1945-1952.pptxSamKuruvilla5
 
The future of UX design support tools - talk Paris March 2024
The future of UX design support tools - talk Paris March 2024The future of UX design support tools - talk Paris March 2024
The future of UX design support tools - talk Paris March 2024Alan Dix
 

Recently uploaded (20)

Production of Erythromycin microbiology.pptx
Production of Erythromycin microbiology.pptxProduction of Erythromycin microbiology.pptx
Production of Erythromycin microbiology.pptx
 
High-Quality Faux Embroidery Services | Cre8iveSkill
High-Quality Faux Embroidery Services | Cre8iveSkillHigh-Quality Faux Embroidery Services | Cre8iveSkill
High-Quality Faux Embroidery Services | Cre8iveSkill
 
Central-Visayas-1.pdf reporting purposes
Central-Visayas-1.pdf reporting purposesCentral-Visayas-1.pdf reporting purposes
Central-Visayas-1.pdf reporting purposes
 
Designing for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsDesigning for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teams
 
Design mental models for managing large-scale dbt projects. March 21, 2024 in...
Design mental models for managing large-scale dbt projects. March 21, 2024 in...Design mental models for managing large-scale dbt projects. March 21, 2024 in...
Design mental models for managing large-scale dbt projects. March 21, 2024 in...
 
TIMBRE: HOW MIGHT WE REMEDY MUSIC DESERTS AND FACILITATE GROWTH OF A MUSICAL ...
TIMBRE: HOW MIGHT WE REMEDY MUSIC DESERTS AND FACILITATE GROWTH OF A MUSICAL ...TIMBRE: HOW MIGHT WE REMEDY MUSIC DESERTS AND FACILITATE GROWTH OF A MUSICAL ...
TIMBRE: HOW MIGHT WE REMEDY MUSIC DESERTS AND FACILITATE GROWTH OF A MUSICAL ...
 
Mike Tyson Sign The Contract Big Boy Shirt
Mike Tyson Sign The Contract Big Boy ShirtMike Tyson Sign The Contract Big Boy Shirt
Mike Tyson Sign The Contract Big Boy Shirt
 
WCM Branding Agency | 210519 - Portfolio Review (F&B) -s.pptx
WCM Branding Agency | 210519 - Portfolio Review (F&B) -s.pptxWCM Branding Agency | 210519 - Portfolio Review (F&B) -s.pptx
WCM Branding Agency | 210519 - Portfolio Review (F&B) -s.pptx
 
Best-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakis...
Best-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakis...Best-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakis...
Best-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakis...
 
LRFD Bridge Design Specifications-AASHTO (2014).pdf
LRFD Bridge Design Specifications-AASHTO (2014).pdfLRFD Bridge Design Specifications-AASHTO (2014).pdf
LRFD Bridge Design Specifications-AASHTO (2014).pdf
 
Materi dasar prototype dan figma .pdf
Materi dasar prototype dan figma    .pdfMateri dasar prototype dan figma    .pdf
Materi dasar prototype dan figma .pdf
 
Building+your+Data+Project+on+AWS+-+Luke+Anderson.pdf
Building+your+Data+Project+on+AWS+-+Luke+Anderson.pdfBuilding+your+Data+Project+on+AWS+-+Luke+Anderson.pdf
Building+your+Data+Project+on+AWS+-+Luke+Anderson.pdf
 
Embroidery design from embroidery magazine
Embroidery design from embroidery magazineEmbroidery design from embroidery magazine
Embroidery design from embroidery magazine
 
Introduce Trauma-Informed Design to Your Organization - CSUN ATC 2024
Introduce Trauma-Informed Design to Your Organization - CSUN ATC 2024Introduce Trauma-Informed Design to Your Organization - CSUN ATC 2024
Introduce Trauma-Informed Design to Your Organization - CSUN ATC 2024
 
UX Conference on UX Research Trends in 2024
UX Conference on UX Research Trends in 2024UX Conference on UX Research Trends in 2024
UX Conference on UX Research Trends in 2024
 
Math Group 3 Presentation OLOLOLOLILOOLLOLOL
Math Group 3 Presentation OLOLOLOLILOOLLOLOLMath Group 3 Presentation OLOLOLOLILOOLLOLOL
Math Group 3 Presentation OLOLOLOLILOOLLOLOL
 
INTRODUCTION TO UI/UX DESIGN BEGINNERS.pdf
INTRODUCTION TO UI/UX DESIGN BEGINNERS.pdfINTRODUCTION TO UI/UX DESIGN BEGINNERS.pdf
INTRODUCTION TO UI/UX DESIGN BEGINNERS.pdf
 
Exploring Futuristic Factory Designs: A 3D Interior Rendering Studio's Perspe...
Exploring Futuristic Factory Designs: A 3D Interior Rendering Studio's Perspe...Exploring Futuristic Factory Designs: A 3D Interior Rendering Studio's Perspe...
Exploring Futuristic Factory Designs: A 3D Interior Rendering Studio's Perspe...
 
Cold War Tensions Increase - 1945-1952.pptx
Cold War Tensions Increase - 1945-1952.pptxCold War Tensions Increase - 1945-1952.pptx
Cold War Tensions Increase - 1945-1952.pptx
 
The future of UX design support tools - talk Paris March 2024
The future of UX design support tools - talk Paris March 2024The future of UX design support tools - talk Paris March 2024
The future of UX design support tools - talk Paris March 2024
 

Usable security