Cybersecurity as a Design Discipline: Creating User-Aware Security Awareness Campaigns

By Ramyar Daneshgar
Security Engineer | USC Viterbi School of Engineering

Looking for a security engineer? Visit SecurityEngineer.com

Disclaimer: This article is for educational purposes only and does not constitute legal advice.


Executive Summary

Security awareness programs often fail—not because users don’t care, but because the training wasn't designed for how people actually learn, behave, or interact with risk. Treating cybersecurity awareness as a design discipline allows organizations to create education campaigns that are contextual, intuitive, and behaviorally effective. This article breaks down how to apply design thinking, communications strategy, and user-centered design principles to build security awareness programs that resonate with employees and stand up to legal scrutiny.


1. The Problem with Most Security Awareness Programs

Many security awareness campaigns rely on stale content: generic phishing templates, annual compliance videos, and punitive quiz scoring. While they may technically “check the box,” they fail to:

  • Change user behavior over time
  • Generate internal buy-in
  • Build resilience against evolving threats

In high-performing organizations—especially those dealing with sensitive client data, intellectual property, or cross-border operations—this approach is no longer sufficient. The legal, financial, and reputational stakes are too high.

To create measurable change, cybersecurity awareness must be reframed as a design challenge, not a technical afterthought.


2. Why Security Awareness Must Be Designed—Not Just Deployed

Traditional training models assume employees are blank slates who will follow rules once told. In reality:

  • Employees bring different risk profiles based on their roles, incentives, and digital habits
  • Generic messaging fails to connect with specific job functions
  • Repetitive, fear-based content leads to message fatigue and disengagement

Design thinking flips the model. It asks:

How can we build training for the user, not just at the user?

That means applying core design principles:

  • Empathy – Understand employee pain points with security
  • Context – Deliver training at the point of need, not months later
  • Clarity – Strip away jargon; use clean, relatable language
  • Feedback Loops – Offer two-way communication and visible outcomes
  • Visual Communication – Emphasize clarity, brand alignment, and digestibility

3. Collaborating with Communications: Security x Storytelling

One of the most overlooked assets in cybersecurity awareness is the internal communications or marketing team.

These professionals already understand how to:

  • Build brand-consistent narratives
  • Craft emotionally resonant messages
  • Segment audiences for relevance
  • Drive internal engagement

Case Study Example: Security & Communications Collaboration

When launching a new phishing simulation program, we co-designed the campaign with communications leads to:

  • Use internal tone-of-voice guidelines instead of generic training language
  • Customize visuals to match internal tools (e.g., SharePoint, Slack, Google Drive)
  • A/B test different campaign taglines and calls to action
  • Insert humor, empathy, and storytelling into policy reminders

The result: higher engagement, less backlash, and a measurable reduction in repeated phishing clicks.


4. Designing Behaviorally Intelligent Phishing Simulations

Most phishing simulations fail because they feel artificial, irrelevant, or patronizing. A better approach uses real user context, iterative design, and behavioral reinforcement.

Design Process for Phishing Simulations:

  1. User Research
    • Interview users across departments about daily email habits
    • Observe workflows where phishing risk is highest (e.g., finance, legal, vendor management)
  2. Realistic Threat Modeling
    • Create scenarios mimicking actual workflows: invoice requests, project file links, urgent HR messages
    • Localize content to regional teams and communication styles
  3. Post-Click Training Redesign
    • Instead of “you failed,” deliver an interactive explainer showing:
      • Clues that could’ve tipped them off
      • What could’ve happened in a real attack
      • What to do next time
  4. Feedback Channel
    • Offer employees the chance to rate phishing emails or suggest scenarios
    • Normalize vulnerability reporting over punishment

5. Building Security Personas to Tailor Campaigns

Employees aren't a monolith. They have different levels of technical fluency, risk exposure, and motivators.

Creating security personas allows you to map training to their needs:

Persona Traits & Tools Used Risks Ideal Approach
Creative Professionals Mobile-first, external-facing Oversharing, file mishandling Visual storytelling, just-in-time nudges
Finance Staff Workflow-driven, inbox-heavy BEC, invoice fraud Scenario-based simulations
Executives High-trust, low-time availability Whaling, travel-based phishing Concise, narrative-based training
IT Staff Technically fluent, tool-heavy Privileged access abuse Technical breach walk-throughs

This personalization leads to significantly better knowledge retention and behavioral outcomes.


Metrics That Prove Real Impact (Beyond Quiz Scores)

Metric What It Measures Why It Matters
First-Time Click Rate vs. Repeat Click Rate Frequency of users clicking phishing simulations Differentiates between unaware users and persistent risk takers
Time to Report Phishing Simulations Speed of user response after receiving a phish Measures reflexes and internalized vigilance
Voluntary Reporting of Real Threats Proactive submissions outside of simulations Indicates real-world engagement and cultural maturity
Participation in Opt-In Campaigns or Discussion Channels Involvement in optional training or Slack forums Reflects intrinsic motivation, not compliance pressure
Engagement Heatmaps Scroll depth, time on page, link clicks Reveals how deeply users engage with training content

From a regulatory and legal standpoint, awareness training must not only exist—it must be:

  • Targeted
  • Ongoing
  • Responsive to threats
  • Documented

This aligns with:

  • GDPR Art. 32: “Training of personnel as part of organizational security measures”
  • CCPA/CPRA: “Reasonable security procedures appropriate to the nature of the information”
  • NIST CSF: “PR.AT – Awareness and Training domain”
  • FTC Safeguards Rule for financial institutions

When your awareness training is designed with intention, documented with data, and adapted to user roles, it strengthens your legal posture in breach response, audits, and litigation.


8. Cultural Wins: Security as a Shared Value

When done well, awareness training transcends compliance and becomes cultural:

  • Employees forward suspected phishing to security before it’s simulated
  • Design teams request security reviews of new software integrations
  • Policy updates are actually read and shared—without mandate

This shift is critical. Culture is the control that can’t be bypassed, exploited, or misconfigured.


Final Takeaway: You’re Not Just Training Users - You’re Designing Experiences

If you're still running awareness like a checklist, you're leaving risk on the table. The future of cybersecurity training lies in design-led awareness, not top-down enforcement.

To build resilient organizations, security leaders must:

  • Design like a marketer
  • Communicate like a storyteller
  • Think like a behavioral psychologist
  • Measure like a data scientist
  • Act like a partner—not a policeman

Security awareness isn’t an email. It’s a relationship.


Need help crafting security awareness campaigns that actually change behavior—and stand up to legal scrutiny?

Our team builds culture-first training programs, legally defensible simulations, and compliance strategies that go far beyond the checkbox. Designed in collaboration with the experts behind CybersecurityAttorney.com.

Start your tailored security awareness program at SecurityEngineer.com.


Need a Cybersecurity Attorney?
Get top legal guidance in breach response, data privacy, and cybersecurity compliance. Connect with attorneys who know how to defend against audits, investigations, and liability.
👉 Hire a Cybersecurity Attorney

Read more