OpenIDEO is an open innovation platform. Join our global community to solve big challenges for social good. Sign Up / Login or Learn more
209 ideas
209 final ideas
25 final ideas
25 final ideas
23 final ideas
Announced!

Refinement

The Refinement Phase has concluded.


Congratulations to the 25 contributors who were invited to further refine their concepts. Browse their submissions below. Or, download this shortlist catalog

During the Refinement Phase, shortlisted visual creators sought feedback, received mentorship from a cybersecurity professional, and iterated on their concepts in prep for final submission.

We're grateful to the shortlist evaluation panel:

  • Charlotte Stanton, Carnegie Endowment for International Peace
  • Eli Sugarman, Hewlett Foundation
  • Mike McNerny, Arbor Networks
  • Philip Reiner, Technology for Global Security
  • Stephanie Sizemore, OpenIDEO


The final submissions of these shortlisted participants are licensed under the most recent version of the Creative Commons attribution license. This means that those materials can be shared, repurposed and used for free, provided you include the correct attribution.

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License

Questions? Email us at cybersecurityvisuals@ideo.com

25 contributions

Sort by

Contribution list

A series of images covering faith, trust and the importance of understanding underlying perceptions.

A series of images covering faith, trust and the importance of understanding underlying perceptions.

Photo of Thomas Grimer
7 6

Cybersecurity is a lot like sex as, generally speaking, it's a bad idea to expose yourself to strangers.

Cybersecurity is a lot like sex as, generally speaking, it's a bad idea to expose yourself to strangers.

Photo of Conor Caplice
6 4

An illustration which imagines an IOT integrated home in the future, visul cybersecurity measures required for the new technology.

An illustration which imagines an IOT integrated home in the future, visul cybersecurity measures required for the new technology.

Photo of Rebecca Wang
24 15