JustAppSec
Back to guides

Communicating AppSec Risk to Leadership

Most security findings die in Jira tickets because they are written for engineers, not decision-makers. If you want leadership to fund security work, allocate headcount, or change priorities, you need to frame findings as business risk - not technical debt.

This guide covers practical techniques for translating AppSec findings into language that boards, executives, and CISOs can act on.

Why this matters

The disconnect between security teams and business leadership is well documented. The UK Government's Cyber Growth Action Plan (2025) identifies it as a systemic issue: organisations need "more business leaders with better understanding of cyber" and "more cyber leaders with better understanding of operational risks for business."

When security teams communicate in technical terms alone, two things happen:

  1. Security stays siloed in IT - it is treated as a cost centre, not a business enabler
  2. Investment decisions are uninformed - boards cannot prioritise what they do not understand

Reference: NCSC - Cyber Security Toolkit for Boards

Framing: from vulnerability to business impact

Technical reports describe what is broken. Business reports describe what could happen.

Technical framingBusiness framing
"SQL injection in the search endpoint""An attacker could extract the full customer database, triggering data protection notification obligations"
"Missing rate limiting on login""Credential stuffing could compromise customer accounts, leading to fraud claims and reputational damage"
"Outdated dependency with known CVE""A known exploit exists for a component we use in production. Exploitation could disrupt service to customers"
"No RBAC on admin API""Any authenticated user can access admin functions, including modifying billing and exporting customer data"

The pattern: vulnerability → exploit scenario → business consequence.

The one-page risk summary

For board papers, executive updates, or CISO briefings, use a structured one-page format:

1. What is the risk?

One sentence describing the business impact in plain language. No jargon, no CVE numbers.

"Customer account data could be extracted by an external attacker through a weakness in our search functionality."

2. How likely is it?

Be honest about likelihood. Use a simple scale:

LikelihoodMeaning
Almost certainActive exploitation in the wild, we match the profile
LikelyPublic exploit exists, requires low skill
PossibleVulnerability confirmed, no known exploit yet
UnlikelyTheoretical risk, significant barriers to exploitation

3. What is the impact?

Map to consequences the board cares about:

  • Financial - direct costs (incident response, fines, compensation)
  • Regulatory - notification obligations, enforcement action
  • Reputational - customer trust, media coverage, partner confidence
  • Operational - service downtime, recovery time, lost productivity

4. What are we doing about it?

Concrete actions with owners and timelines:

"Engineering is deploying a fix by end of week. We are also adding automated scanning to prevent similar issues in future."

5. What do we need?

If the fix requires budget, headcount, or a decision, state it clearly:

"We need approval for a £15k dependency scanning tool to prevent this class of vulnerability across all applications."

Using the JustAppSec Scorecard for board reporting

The JustAppSec Scorecard produces a structured assessment of your security fundamentals. Use it to:

  1. Establish a baseline - run the scorecard and export the results
  2. Set targets - agree with leadership on a target maturity level and timeline
  3. Track progress - re-run quarterly and report the delta
  4. Identify investment areas - the "no" answers map directly to capability gaps that need funding

The export includes a plain-text report you can attach to board papers or share with auditors.

Metrics that leadership understands

Avoid: "We closed 47 Jira tickets tagged 'security' this quarter."

Instead, report metrics that connect to business outcomes:

MetricWhy leadership cares
Mean time to patch critical vulnerabilitiesMeasures exposure window - how long are we vulnerable?
Percentage of applications with security gates in CIShows coverage of automated protection
Number of security incidents (by severity)Trend over time - are we getting better or worse?
Scorecard maturity levelSimple benchmark against industry peers
Percentage of supply chain reviewedRegulatory readiness and third-party risk posture

Talking to different audiences

Board members

  • Lead with business impact, not technical detail
  • Use the one-page risk summary format
  • Compare to industry benchmarks or regulatory expectations
  • Be clear about what you need from them (budget, decision, awareness)

CISOs

  • CISOs need both the business framing and the technical depth
  • Provide remediation options with effort/impact trade-offs
  • Map findings to frameworks they report against (Cyber Essentials, ISO 27001, SOC 2)
  • Highlight systemic issues, not just individual bugs

Engineering leadership

  • Frame security work as engineering quality, not overhead
  • Show how security gates reduce production incidents and unplanned work
  • Propose changes that integrate into existing workflows (CI gates, code review checklists)
  • Quantify the cost of not fixing - incident response time, service degradation, customer impact

Common mistakes

Over-classifying everything as critical. If everything is critical, nothing is. Use severity honestly - it builds trust.

Presenting a list of 200 findings. Aggregate and prioritise. Leadership needs the top 5 risks, not a vulnerability scanner dump.

No recommendation. Reporting a problem without a proposed solution and cost estimate is just noise. Always include next steps.

Technical jargon in executive communications. If you say "SSRF" to a board member, you have lost them. Say "a weakness that lets an attacker make our servers access internal systems."

Templates

Quarterly security summary (for board)

AppSec Quarterly Summary - Q1 2026

Maturity: Level 3 (Consistent) - up from Level 2 last quarter
Critical risks: 1 (remediation in progress, ETA: 2 weeks)
Key achievements:
  - Security scanning added to all CI pipelines
  - Mean patch time reduced from 45 days to 12 days
  - Supply chain review completed for top 5 suppliers
Investment needed:
  - £X for [specific tool/headcount] to address [specific gap]

Risk escalation (for CISO)

Risk: [One-sentence business impact]
Severity: [Critical/High/Medium/Low]
Likelihood: [Almost certain/Likely/Possible/Unlikely]
Affected systems: [Service names, customer-facing or internal]
Current status: [Open/In progress/Blocked]
Remediation: [What, who, when]
Decision needed: [Yes/No - if yes, what specifically]

Further reading


Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.