Skip to main content

Access
Denied.

The Security Risk of Ignoring Accessibility.

A direct, jargon-free guide that exposes the hidden risks of inaccessible systems — and gives leaders the frameworks to fix them.

Buying for a team or event? Bulk orders save 10–20%.

Access Denied book cover — comic-style illustration with the title in a yellow badge over a purple halftone background

The hidden cost

Inaccessible systems aren't just exclusive.
They're insecure.

24%

of UK working-age adults live with a long-term disability.

15–20%

of the workforce is neurodivergent — yet most security tools assume they aren't.

1 in 5

employees can't use your security controls as designed, creating shadow systems.

25%

experience a mental health condition each year that affects how they work.

What's inside

A field guide for leaders who want both.

Ten chapters of practical, jargon-free strategy — written from a decade in the trenches of security awareness and inclusive design.

Read the full table of contents →
  1. 01

    Security's Dirty Secret

    How your inaccessible controls are quietly creating the vulnerabilities you're paying millions to prevent.

  2. 02

    Shadow Systems

    The security crisis hidden in plain sight — spreadsheets, shared logins and workarounds your audits never see.

  3. 03

    Cyber Snake Oil

    The products you're being sold that make you less secure — and how to spot them before procurement signs.

  4. 04

    Physical Security Theatre

    How excluding people creates vulnerabilities, not protection — from biometrics to badge readers.

  5. 05

    Beyond Compliance

    Building accessibility into your security architecture instead of bolting it on after the audit.

  6. 06

    Proving the Case

    Measuring the security ROI of accessibility in language your CFO and board actually care about.

  7. 07

    Personnel Security Failures

    How hiring biases create security blind spots — and the talent you're missing because of them.

  8. 08

    Compliance Theatre

    Why your security standards are making you vulnerable, and what to demand instead.

  9. 09

    The Culture Catastrophe

    Why your security awareness programme is falling short — and how to fix it for everyone.

  10. 10

    From Access Denied to Security Assured

    The revolution your organisation can't afford to miss — a practical roadmap for the next 12 months.

If you think you're secure, but your tools aren't usable by everyone, you're not secure at all. You're just paying for the illusion of protection.

Jemma Davis · Access Denied

Praise for Access Denied

Readers are calling it a wake-up call.

Reviews from cyber leaders, compliance pros and the people whose jobs this book is built to make safer.

  • "Jemma Davis brilliantly shows how excluding users — especially those who are neurodivergent or rely on assistive technology — not only creates barriers, but actively increases security risk. Insightful, well-structured, highly actionable and a must-read for CISOs, security leaders, UX designers and anyone serious about building inclusive, resilient and future-proof security programmes."
    Lisa Ventura MBE FCIIS
    Cyber security leader · Amazon review
  • "Human factors and cyber is part of my speciality, but I had never previously understood in as much detail how careful design drives the success of any such education — or how financially painful it is to skip accessible design. I read the first third in a single sitting. Jemma REALLY knows what she is talking about."
    Kassandra
    Verified Amazon reviewer
  • "Cyber security without accessibility is neither inclusive nor secure. If you're in cyber or a compliance leader, you need to read it."
    Rachel Sosin
    Compliance leader
  • "You know what sucks? Not being seen, heard, or considered. This book needs to be on every leader's bookshelf — actually read, internalised, and acted upon."
    Matthew Hotchkiss
    Security practitioner

Free download

The Frameworks.
Straight from the book.

Twelve tools to assess, plan and strengthen your accessibility and security posture — including the Maturity Model, Vendor Questionnaire, and Integrated Policy Framework. Free PDF downloads, no email required.

Download the frameworks →
Framework #1
Maturity Model
Framework #2
Vendor Questionnaire
Framework #3
Shadow System Risk
Framework #4
Metrics Framework
Framework #5
Policy Framework
Framework #6
Awareness Framework
Portrait of Jemma Davis, author of Access Denied

Meet the author

Jemma Davis.

Cyber security awareness specialist and founder of Culture Gem. Jemma helps organisations cut through tick-box compliance and embed practical, adaptive training that treats accessibility and security as one problem.

Her career pivoted while running a global OWASP CISO conference in London — the day WannaCry crippled hospitals worldwide. Access Denied is her first book.

Stop ignoring it.
Start fixing it.

Get the book, run the frameworks, and turn accessibility into your strongest security posture.

Buy Access Denied →