Culture Eats UX Strategy for Breakfast
The article summarizes 8 key programs that UX leaders employ in order to build and sustain strong UX cultures within their companies. These programs can be viewed as a “UX culture palette”. Each program in the palette is composed of activities which UX leaders can use to engage with the various stakeholders, teams, and business functions at their companies. The palette is a tool for thinking more broadly and systematically about practicing UX at scale within a business organization.
Culture Eats UX Strategy for Breakfast
The article summarizes 8 key programs that UX leaders employ in order to build and sustain strong UX cultures within their companies. These programs can be viewed as a “UX culture palette”. Each program in the palette is composed of activities which UX leaders can use to engage with the various stakeholders, teams, and business functions at their companies. The palette is a tool for thinking more broadly and systematically about practicing UX at scale within a business organization.
As companies and IT organizations are bombarded daily by an ever-growing number of cybersecurity threats and attacks, they struggle mightily to keep pace. The Respond Analyst solves this problem by automating deep analytical and probabalistic reasoning across massive security event feeds.
Operating at machine scale the Analyst is able to identify, correlate, and escalate security-related events in a fraction of the time required by human beings.
Security teams can now offload the boring, repetitive, mind-numbing tasks of security monitoring and triage to
a highly scalable, accurate, and effective decision engine.
![22-Dashboard + SOC wall.png](https://static.wixstatic.com/media/e6f14f_cb9eeb0c68624611b8884df0c403ef45~mv2_d_2980_1638_s_2.png/v1/crop/x_404,y_149,w_2136,h_1379/fill/w_814,h_518,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/22-Dashboard%20%2B%20SOC%20wall.png)
Personas
![02-Persona 1.png](https://static.wixstatic.com/media/e6f14f_f21a3b8d46524cf3b76a4000f64bc515~mv2_d_3060_1684_s_2.png/v1/crop/x_59,y_339,w_1427,h_956/fill/w_576,h_386,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/02-Persona%201.png)
![02-Persona 1.png](https://static.wixstatic.com/media/e6f14f_f21a3b8d46524cf3b76a4000f64bc515~mv2_d_3060_1684_s_2.png/v1/crop/x_1557,y_333,w_1430,h_963/fill/w_575,h_387,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/02-Persona%201.png)
![03-Persona 2.png](https://static.wixstatic.com/media/e6f14f_33617e532b87456c8e1da17409689429~mv2_d_2722_1498_s_2.png/v1/crop/x_55,y_299,w_1263,h_851/fill/w_570,h_384,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/03-Persona%202.png)
Journey Map
The end to end security operations journey. The green border rectangle indicates the use case for Respond Analyst.
![04-Storymap.png](https://static.wixstatic.com/media/e6f14f_421a799eee2544c5ab7744a7c08d5dea~mv2_d_2796_1574_s_2.png/v1/crop/x_0,y_39,w_2796,h_1535/fill/w_855,h_469,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/04-Storymap.png)
Security Triage Journey: Large Enterprise
Large security operations have a wide degree of role specialization with tiered levels of responsibilities.
Event triage is usually assigned to the least experienced people, and eventually leads to job burnout.
![05-Journey 1.png](https://static.wixstatic.com/media/e6f14f_8bca08a24e4e41c3b4c29c42ab9734bd~mv2_d_3060_1688_s_2.png/v1/crop/x_0,y_155,w_3060,h_1413/fill/w_790,h_365,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/05-Journey%201.png)
Security Triage Journey: Mid-Size Company
Mid-sized companies typically have a few security people covering all security-related activities. Sometimes these folks have both IT and Security responsibilities. Security event triage often gets neglected due to general task overload.
![06-Journey 2.png](https://static.wixstatic.com/media/e6f14f_02a9104623024c0cb3f537501ea1cd6b~mv2_d_3060_1686_s_2.png/v1/crop/x_0,y_233,w_3060,h_1243/fill/w_787,h_320,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/06-Journey%202.png)
Product
Just a couple of clicks to a powerful security incident report...
![10-Screens 1.png](https://static.wixstatic.com/media/e6f14f_791b414976d3428f87842f89734a70c0~mv2_d_3058_1684_s_2.png/v1/crop/x_49,y_456,w_2950,h_788/fill/w_918,h_245,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/10-Screens%201.png)
A dark themed experience for typical low-light security environments...
![11-Screens 2.png](https://static.wixstatic.com/media/e6f14f_c7dce745a08d485ba39676ea13623cfc~mv2_d_3060_1686_s_2.png/v1/crop/x_44,y_461,w_2947,h_777/fill/w_930,h_245,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/11-Screens%202.png)
NOTE: Only showing limited product examples in this public venue
Recognition
![Gartner.png](https://static.wixstatic.com/media/e6f14f_0154e9348d384377b639345c3d3eabef~mv2.png/v1/crop/x_0,y_0,w_765,h_679/fill/w_123,h_109,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/Gartner.png)
Gartner names Respond Software as a 2018 Cool Vendor for Security Operations and Vulnerability Management
![Amoroso.jpg](https://static.wixstatic.com/media/e6f14f_c40eef0b80964fa3998a8177a3ad54bc~mv2.jpg/v1/fill/w_117,h_117,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/Amoroso.jpg)
“It’s not often that I say, ‘Wow,’ but that is what I said when I learned about the Respond Analyst.”
Ed Amoroso
CEO, TAG Cyber
Global cybersecurity consultant
Thought-leader