From Desire Paths to Security Highways: Lessons from Disney's Approach to User-Centric Design



Desire Paths to Security HighwaysWhen Walt Disney first unveiled the Magic Kingdom, he made a decision that would revolutionize theme park design - and inadvertently offer a valuable lesson for cybersecurity professionals.

Instead of pre-determining where visitors should walk, Disney let guests create their own paths. Only after observing these "desire paths" did Disney pave the official walkways. This approach, seemingly simple, carries profound implications for how we should approach security in our organizations.

The Problem with Top-Down Security

Too often, security teams operate from their metaphorical ivory towers, implementing controls and policies without truly understanding how people work. It's like building a maze and expecting everyone to follow it perfectly, regardless of whether it's the most efficient or intuitive route.

The result? Friction, frustration, and ultimately, workarounds that can compromise security. We've all seen it - the sticky note with passwords, the shared login, the unsanctioned cloud service. These aren't acts of malice; they're desire paths created by users trying to get their jobs done efficiently. 

Learning from Disney's Wisdom 

What if we took a page from Disney's playbook? Instead of dictating security measures from the top, we could:

  • Observe: Watch how people actually work. What tools do they use? How do they share information? Where do they struggle with existing security measures?
  • Analyze: Look for patterns in behavior. Where are the common "desire paths" in your organization's workflows?
  • Adapt: Design security controls that align with these natural workflows, rather than fighting against them.
  • Iterate: Continuously monitor and adjust. Just as paths might change with seasons or new attractions, your security approach should evolve with your organization.

Security as an Enabler, Not a Barrier

By aligning security measures with how people actually work, we can transform security from a perceived hindrance into a genuine enabler. Imagine security tools that feel so intuitive and aligned with workflows that employees actively seek them out, rather than trying to circumvent them.

This approach doesn't mean compromising on security. On the contrary, by reducing friction, we can actually improve overall security posture. When security aligns with natural behavior, compliance increases, and the risk of dangerous workarounds decreases. 

Practical Steps Towards User-Centric Security 

  • Shadow different departments: Spend time understanding the day-to-day realities of various roles in your organization.
  • Conduct usability testing: Before rolling out new security measures, test them with actual users and gather feedback.
  • Create feedback loops: Establish easy ways for employees to report security friction points. Or build a security champions programme that can enable this across larger organizations more effectively.
  • Embrace flexibility: Be willing to adapt security measures to fit different workflows across the organization.
  • Educate and communicate: Help employees understand the 'why' behind security measures, fostering a culture of security awareness.

The Path Forward

Just as Disney's approach created a more intuitive and enjoyable experience for park visitors, user-centric security design can lead to a more secure and productive organization. Similarly, by understanding user journeys, security teams can design security controls that feel less like barriers and more like well-paved paths to success.

The most effective security measures aren't always the most rigid or complex. Sometimes, the best approach is to observe, understand, and then gently guide users down the safest path - a path they've helped create themselves.


The world's largest library of security awareness training content is now just a click away!

In your fight against phishing and social engineering you can now deploy the best-in-class simulated phishing platform combined with the world's largest library of security awareness training content; including 1000+ interactive modules, videos, games, posters and newsletters.

You can now get access to our new ModStore Preview Portal to see our full library of security awareness content; you can browse, search by title, category, language or content topics.

ModStore01-1The ModStore Preview includes:

  • Interactive training modules
  • Videos
  • Trivia Games
  • Posters and Artwork
  • Newsletters and more!

Start Your Preview

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/training-preview



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews