Access
Denied.
The Security Risk of Ignoring Accessibility.
A direct, jargon-free guide that exposes the hidden risks of inaccessible systems — and gives leaders the frameworks to fix them.
Buying for a team or event? Bulk orders save 10–20%.

The hidden cost
Inaccessible systems aren't just exclusive.
They're insecure.
of UK working-age adults live with a long-term disability.
of the workforce is neurodivergent — yet most security tools assume they aren't.
employees can't use your security controls as designed, creating shadow systems.
experience a mental health condition each year that affects how they work.
What's inside
A field guide for leaders who want both.
Ten chapters of practical, jargon-free strategy — written from a decade in the trenches of security awareness and inclusive design.
- 01
Security's Dirty Secret
How your inaccessible controls are quietly creating the vulnerabilities you're paying millions to prevent.
- 02
Shadow Systems
The security crisis hidden in plain sight — spreadsheets, shared logins and workarounds your audits never see.
- 03
Cyber Snake Oil
The products you're being sold that make you less secure — and how to spot them before procurement signs.
- 04
Physical Security Theatre
How excluding people creates vulnerabilities, not protection — from biometrics to badge readers.
- 05
Beyond Compliance
Building accessibility into your security architecture instead of bolting it on after the audit.
- 06
Proving the Case
Measuring the security ROI of accessibility in language your CFO and board actually care about.
- 07
Personnel Security Failures
How hiring biases create security blind spots — and the talent you're missing because of them.
- 08
Compliance Theatre
Why your security standards are making you vulnerable, and what to demand instead.
- 09
The Culture Catastrophe
Why your security awareness programme is falling short — and how to fix it for everyone.
- 10
From Access Denied to Security Assured
The revolution your organisation can't afford to miss — a practical roadmap for the next 12 months.
If you think you're secure, but your tools aren't usable by everyone, you're not secure at all. You're just paying for the illusion of protection.
Praise for Access Denied
Readers are calling it a wake-up call.
Reviews from cyber leaders, compliance pros and the people whose jobs this book is built to make safer.
"Jemma Davis brilliantly shows how excluding users — especially those who are neurodivergent or rely on assistive technology — not only creates barriers, but actively increases security risk. Insightful, well-structured, highly actionable and a must-read for CISOs, security leaders, UX designers and anyone serious about building inclusive, resilient and future-proof security programmes."
"Human factors and cyber is part of my speciality, but I had never previously understood in as much detail how careful design drives the success of any such education — or how financially painful it is to skip accessible design. I read the first third in a single sitting. Jemma REALLY knows what she is talking about."
"Cyber security without accessibility is neither inclusive nor secure. If you're in cyber or a compliance leader, you need to read it."
"You know what sucks? Not being seen, heard, or considered. This book needs to be on every leader's bookshelf — actually read, internalised, and acted upon."
Free download
The Frameworks.
Straight from the book.
Twelve tools to assess, plan and strengthen your accessibility and security posture — including the Maturity Model, Vendor Questionnaire, and Integrated Policy Framework. Free PDF downloads, no email required.
Download the frameworks →
Meet the author
Jemma Davis.
Cyber security awareness specialist and founder of Culture Gem. Jemma helps organisations cut through tick-box compliance and embed practical, adaptive training that treats accessibility and security as one problem.
Her career pivoted while running a global OWASP CISO conference in London — the day WannaCry crippled hospitals worldwide. Access Denied is her first book.
Stop ignoring it.
Start fixing it.
Get the book, run the frameworks, and turn accessibility into your strongest security posture.
Buy Access Denied →