Sunday Security

CISO Dashboard
Senior Product Designer (2021 - 2023)
Project Overview
As the lead product designer, I conceptualized and developed an exclusive CISO dashboard, meticulously tailored to offer comprehensive oversight of security-related matters specifically for CISOs. This dashboard delivers an invaluable, panoramic view of their executives cybersecurity landscape.
My Contributions
Designed the Web platform and APP from scratch, as well as a design system. A Customer Journey Map was created to visualize the interaction between the product and its users. Structured and organized content using an Information Architecture. Created User Flows to ensure a smooth and intuitive user experience. Closely collaborated with the development, marketing, and product teams.

Case study

Objective
Sunday's CISO dashboard
The goal was to create an exclusive CISO dashboard designed to offer a holistic view of an individual's cybersecurity landscape. This dashboard was envisioned to empower CISOs with real-time insights, analytics, and actionable data to make informed decisions and effectively manage their personal digital security.
Dashboard CISO
Goals
The primary goal was to empower users to take proactive steps in resolving security issues.
While users recognized the problem, they lacked guidance on the necessary actions.
The aim was to create a framework that not only highlighted
1. Comprehensive Oversight: The primary goal was to create a dashboard that offers a comprehensive view of an individual's cybersecurity landscape, enabling CISOs to monitor, analyze, and respond to execs potential threats effectively.
2. Real-time Insights: To provide real-time insights into security threats, device statuses, network activities, and compliance adherence, empowering proactive decision-making.
3. Usability and Accessibility: Designing an intuitive and user-friendly interface that ensures ease of navigation and accessibility for CISOs with varying technical expertise.
security concerns but also guided users through the remediation process, drawing an analogy to interpreting medical test results.
Solution
1. Research-Driven Approach: Extensive research was conducted to understand the unique challenges faced by CISOs managing personal cybersecurity.
This guided the development process to create tailored solutions for their needs.
2. Iterative Design Process: Collaboration among cross-functional teams allowed for an iterative design process that incorporated continuous feedback loops, ensuring the dashboard's features aligned closely with user requirements.
3. Integration and Compatibility: Prioritizing seamless integration with various cybersecurity tools and systems, ensuring the dashboard could aggregate data from multiple sources for a comprehensive view.

Implementation

1. Development Stages: The implementation involved several stages, including conceptualization, wireframing, prototyping, design, development, integration, and rigorous testing at each step.
2. Collaboration and Feedback: Constant collaboration among designers, developers, cybersecurity experts, and stakeholders ensured that the dashboard met both functional and security requirements.
3. Deployment and Training: Post-development, a structured deployment plan was executed, accompanied by training sessions for CISOs and their teams to ensure they could maximize the dashboard's potential effectively.
Implementation
1. User-Centric Approach:
Conducted user research to understand their pain points and expectations.
Utilized Customer Journey Mapping to visualize the interaction between users and the app.
Created User Flows to ensure a seamless and intuitive user experience.

2. Design System and Information Architecture:
Developed a design system to maintain consistency across the web platform and app.
Structured and organized content using an Information Architecture to enhance accessibility and user understanding.

3. Collaboration and Integration:
Worked closely with development, marketing, and product teams to align design with functionality and business objectives.
Ensured a cohesive and integrated approach to enhance the overall user experience.
Lessons Learned
1. User-Centric Approach: Prioritizing user needs through thorough research and continuous feedback loops is crucial for creating effective cybersecurity solutions.

2. Adaptability and Scalability: Building flexibility into the design and development process is essential to accommodate evolving cybersecurity threats and technological advancements.

3. Clear Communication: Ensuring clear communication among team members and stakeholders throughout the development process avoids misunderstandings and aligns everyone towards shared goals.

4. Security and Compliance: Continuous vigilance in ensuring the highest security standards and compliance with regulations is non-negotiable, especially in cybersecurity solutions.

5. Feedback Integration: Incorporating feedback during and after deployment is crucial for ongoing improvements, ensuring that the dashboard remains relevant and effective in the dynamic cybersecurity landscape.
Future Directions
In conclusion, the journey of developing the Personal Cybersecurity CISO Dashboard involved meticulous planning, collaboration, and a keen focus on user needs, resulting in a robust tool that empowers CISOs to safeguard personal digital assets effectively.
The lessons learned from this project serve as invaluable insights for future endeavors in cybersecurity product development and design.