I co-led a 3-day design workshop for a Swiss SaaS company specializing in cybersecurity management solutions. The company’s current offering—an advanced Excel sheet sold to clients—supported tasks such as risk mitigation, malware prediction, threat detection tracking, incident response planning, and compliance monitoring. The goal of the workshop was to translate this high-value spreadsheet into a scalable online application with improved usability and automation.
High-fidelity Mockups
This mockup presents a clean, modern dashboard for a cybersecurity management platform. The interface uses a left-hand navigation menu for quick access to key modules such as Questionnaire, Assets, Risks, Audit Plan, KPI, Guidelines, and more.
The main dashboard displays four primary widgets:
Risks: A summary panel showing different risk items (e.g., "Business Disruption by Ransomware") with their evaluation statuses (Not evaluated, Accepted, Not accepted).
Treatment Plan: A table listing treatment actions, each with a completion rate and a visible priority label (High, Medium, Low), which aids in task management.
Audit Plan: This section outlines audit actions, their frequency, and current status (Pending, Done), supporting regular compliance checks.
Status: A radar chart visualizes coverage across various cybersecurity management domains (e.g., Governance, Detection, Mitigation, Recovery Planning), delivering a snapshot of organizational maturity.
The design is minimalistic, using clear typographic hierarchy and color-coded tags for statuses and priorities, improving user readability and decision-making. The layout supports transparency and quick navigation over complex cybersecurity tasks.
On-site Workshop
The main goal of the workshop was to define the key features to be implemented in a new desktop platform, determine how these features should be presented and structured, and create a coherent information architecture and service blueprint for the future solution.
One full day was dedicated to in-depth technical discussions with cybersecurity and backend experts, exploring system architecture options, data handling, and predictive analytics capabilities.