Accessibility & Security
Security that excludes people is security that fails. We help organisations embed accessibility into their security and compliance programmes — using the frameworks from Access Denied, written by our founder.
Accessibility is a security imperative
Most security controls were never designed with diverse users in mind. The result? People bypass them — and your organisation pays the price.
Inaccessible Controls Create Risk
Complex MFA, CAPTCHAs, and rigid timeouts weren't built with diverse users in mind. When people are forced to bypass controls, your organisation becomes more vulnerable.
Compliance Doesn't Mean Inclusive
Meeting WCAG or ISO standards on paper doesn't mean your security works for everyone. Real compliance requires understanding how people actually interact with your systems.
Shadow Systems Emerge From Exclusion
Shared credentials, personal cloud storage, password spreadsheets — these shadow systems exist because official tools don't work for everyone. Each one is an unmanaged risk.
Vendor Claims Don't Hold Up
Most security vendors self-certify accessibility. Independent testing routinely reveals gaps between marketing claims and real-world usability with assistive technology.
Access Denied
The Security Risk of Ignoring Accessibility: Embedding Accessibility into Security and Compliance
Written by Culture Gem founder Jemma Davis, Access Denied exposes the hidden risks of inaccessible security systems and provides 12 practical frameworks for fixing them. The book bridges the gap between security, accessibility, and compliance — offering tools that organisations can apply immediately.
Our consultancy service brings these frameworks to life inside your organisation, with hands-on assessment, strategy, and implementation support.
Buy the book on Amazon →Access Denied
by Jemma Davis
"A book that bridges the technical and the human with clarity and purpose."
— Cyber Security Unity
12 Frameworks From Access Denied
Each framework comes straight from the book and is designed to help organisations cut through performative accessibility and build systems that work for everyone. We apply these as part of our consultancy engagements.
Security-Accessibility Maturity Model
Assess how far your organisation has come in embedding accessibility into culture, design, and risk management. Score across seven domains — authentication, incident response, monitoring, physical security, training, shadow systems, and alternative control pathways.
Accessibility–Security Maturity Model
Evaluate how well accessibility and security are integrated across governance, controls, teams, metrics, and outcomes. Five defined levels from Initial to Optimised, with implementation guidance for each.
The Integrated Security-Accessibility Framework
A five-step governance framework that positions accessibility as a security fundamental. Embed accessibility criteria in risk assessments, integrate into security testing, and elevate to board-level reporting.
The Integrated Policy Framework
Move from prescriptive policies that fail to outcome-based policies that flex. Design equivalent security pathways — multiple methods that achieve the same security goal through different mechanisms.
Shadow System Risk Assessment Framework
Identify, categorise, and prioritise the hidden systems people create when official tools exclude them. Assess organisational need, security impact, and the accessibility barrier that caused each one.
Vendor Accessibility Verification Questionnaire
Ask the right questions before you buy. Expose hidden accessibility risks, weak answers, and vendor lip service — with clear red flag, acceptable, and best practice benchmarks for every response.
Vendor Security Product Accessibility Assessment
Test whether accessibility claims hold up under real use. Systematic assessment across screen reader compatibility, keyboard navigation, visual design, error handling, time constraints, and independent verification.
Security-Accessibility Metrics Framework
Enhance traditional security metrics with accessibility considerations. Identify where exclusion creates risk — from authentication failures by assistive technology to shadow systems with accessibility causes.
The Measure–Improve–Benchmark Framework
A repeatable four-phase cycle for quantifying security accessibility ROI. Baseline measurement, ROI calculation, improvement implementation, and results benchmarking — with clear timelines and ownership.
The Outcome-Based Security Framework
Shift from compliance theatre to measured security outcomes. Replace documentation with verified control effectiveness, policy adherence with actual security outcomes, and certification cycles with continuous monitoring — across a structured four-phase transformation.
The Inclusive Awareness Framework
Security training that actually works. Five pillars: respect-based foundations, universal design, personalised learning pathways, psychologically safe environments, and outcome-based measurement. Designed for diverse minds, not compliance tick-boxes.
Training Trauma Risk Scorecard
Score your programme across 12 risk dimensions — from shaming and psychological pressure to sensory considerations and cultural appropriateness. Any high-risk rating requires immediate remediation. Built to protect neurodivergent and trauma-affected learners.
Built for security leaders who want to do better
Accessibility is security
Security that doesn't work for everyone ultimately fails everyone. Let's fix that together.
