Quick answer: The credibility-attack question — “why should I believe your numbers?” — is not a request for data. It is a test of composure and source transparency. The response that works has three moves in 30 seconds: name the specific source, surface the one limitation the questioner has not yet seen, and invite them to a deeper follow-up. Attempting to defend the numbers on their merits loses the moment. Attempting to counter-challenge the questioner loses the room.
Jump to
Ines was presenting a market analysis to the investment committee at a mid-size asset manager. She had been at the firm eight months. Her analysis recommended reducing exposure to a specific sector by four percent. The work was careful. The sources were solid. The conclusion was defensible.
Partway through, the senior partner — who had championed the sector for twenty years — put down his pen. “Ines. Why should I believe your numbers?” Not “where did you get that figure” or “how did you account for the recent regulatory change.” The broader challenge. To her analysis, her judgement, and by implication her presence on the committee.
She had thirty seconds. What she did in those thirty seconds decided not just whether the recommendation got approved that day but whether she would be invited to present to the committee again. She chose the response that held. The sector reduction was not approved, but Ines was asked to lead the follow-on analysis the same afternoon. The senior partner later told her manager, “She handled the challenge well.”
Want a structured approach to handling tough executive questions?
The Executive Q&A Handling System covers the frameworks for predicting, preparing, and delivering composed responses to executive challenges — including the credibility-attack pattern described in this article.
Why this question is never really about the numbers
Senior executives who ask “why should I believe your numbers?” are almost never asking you to walk them through the data. They have been in rooms with data their whole career. They know what careful analysis looks like. The question is a different kind of probe.
It is a composure test. The question is deliberately broader than it needs to be. It forces the presenter to choose between defending the data in detail — which reads as not quite understanding the question — and responding at a higher level, which reads as confident. Most presenters reach for the detail, because the detail is comfortable ground. Reaching for the detail is exactly what the questioner is watching for.
It is also a source transparency check. Part of what the executive wants to see is whether you know, at a speaking-level fluency, where your numbers came from. Not the page number. The underlying dataset, the methodology, and the known limitations. If you have to pause to look these up, the executive has their answer — your ownership of the analysis is not as deep as it needs to be.
And it is sometimes a signalling move to the rest of the room. A senior executive who questions a junior presenter’s numbers in front of the committee is reminding everyone who holds the final judgement on analysis. This is not malicious. It is an organisational norm in many firms. The presenter’s job is not to resent it. The presenter’s job is to pass the test cleanly.
The three-move response that holds
The response needs to happen inside 30 seconds. Not because speed is impressive, but because a longer response extends the zone in which the presenter can make a mistake. The shorter, cleaner response closes the moment and returns control to the meeting.
Move one: name the source precisely. Not “the data came from our market team.” Specific. “The underlying data is from the MSCI sector attribution series, February 2026 release, cross-referenced against the Bloomberg consensus forecast for the same period. I pulled the cuts myself on the 28th.” That sentence does three things. It signals specific source knowledge. It signals recency. It signals personal ownership of the analysis. A presenter who says “I pulled the cuts myself” is not outsourcing the defence.
Move two: name the limitation before they do. “The piece I would flag is that the MSCI series does not yet reflect the March regulatory change. For the sector we are discussing, that adjustment would move the estimate by roughly 1 to 1.5 percentage points in the same direction.” This is the move that separates strong presenters from everyone else. Surfacing your own analytical limitation, unprompted, is the fastest way to restore credibility under a credibility attack. It tells the executive you have thought about what could be wrong, not just what is right.
Move three: invite the deeper follow-up. “I can walk through the full source methodology and sensitivity analysis in a separate 30-minute session if that would be useful, or I can return with a written note by end of day.” Now the decision of how much further to probe sits with the executive. You have offered both a rapid deliverable and a deeper one. Most executives will accept one or the other, or ask one tightened follow-up question. The credibility-attack pattern has ended.

Four failure modes (and why each one loses the room)
The credibility attack generates predictable failure modes. Knowing them by name helps you catch yourself in the moment.
Failure mode 1: the data defence. The presenter reaches for specific numbers and starts walking through methodology. “Well, the four percent comes from taking the MSCI data on slide 14 and adjusting for…” This extends the moment and signals that the presenter has not understood the question. The room reads defensiveness. The executive’s concern is confirmed rather than answered.
Failure mode 2: the appeal to authority. The presenter cites who approved the analysis — “this was reviewed by the quant team and signed off by head of research last week.” This deflects responsibility away from the presenter and onto an absent third party. Executives read this as unwillingness to own the analysis. The sign-off may have happened. The presenter’s name is still on the work.
Failure mode 3: the counter-challenge. The presenter pushes back — “what specifically are you concerned about?” — or worse, questions the questioner’s assumptions. In some rooms this works. In most executive settings it reads as lack of composure. The credibility attack is social, not analytical, and responding with a social counter-attack escalates rather than de-escalates.
Failure mode 4: the apology. The presenter says some variant of “I understand if the analysis is not where you want it to be.” This concedes the attack on the presenter’s behalf. Executives rarely expect the presenter to concede. They expect a composed defence. The apology forfeits the ground the presenter was standing on.
The three-move response is designed to avoid all four failure modes. It does not defend the data, appeal to authority, counter-challenge, or apologise. It owns the source, names the known limitation, and offers a deeper session. That is the exit the room is looking for.
Preparing the response before the meeting
You cannot compose the three-move response live, under pressure, in front of a senior executive. The response has to be drafted before the meeting, for the two or three pieces of analysis most likely to be challenged.
Step one is to identify the attackable numbers. Usually three or four in any deck. They tend to cluster around one of three things: a central recommendation figure (the percentage change, the revenue estimate, the risk-adjusted return), a comparative benchmark (how the proposed option stacks up against the status quo), or a forward-looking projection (any number with a future date attached). For each attackable number, assume a credibility attack will come. If no attack comes, you have wasted thirty minutes of preparation. If an attack comes and you have not prepared, you have lost thirty minutes of meeting time and an unknowable amount of credibility.
Step two is to write the three moves for each attackable number. Specifically. With the exact phrasing you will use. “The underlying data is from the MSCI sector attribution series…” is a line you rehearse, not improvise. Read it aloud three times. Make sure the sentence is delivered as a single unit — if you have to pause mid-sentence to remember the next word, the pause itself reads as hesitation. Keep the sentences short enough to survive being spoken under pressure.
Step three is the limitation. Most presenters find this step uncomfortable. They are trained to present strength, and surfacing limitations feels like conceding ground. In the credibility-attack context, the opposite is true. The limitation is the strongest move you have. For each attackable number, identify one real, material, currently unresolved limitation. Not a trivial caveat. A real one. Write the limitation in the form you will say it. Practise saying it without apologising. “The piece I would flag…” is the opener that works. “I have to be honest with you…” is the opener that does not.
The Executive Q&A Handling System covers the structured preparation process for these responses in more detail, including the scenario playbooks for different executive meeting types.
Harder variants and how they shift the response
The pure “why should I believe your numbers?” is the standard form. Several variants are harder and require response adjustments.
Variant 1: “I have seen this analysis before, and I did not believe it then either.” This adds a historical layer. The response has to acknowledge the earlier context without litigating it. “That is useful context — I was not involved in the earlier piece, and my version uses the February MSCI release rather than the previous year’s. The piece I would flag…” Then continue into the three-move structure. Do not ask about the earlier work. Do not defend the earlier work. Acknowledge and redirect.

Variant 2: “Your analysis assumes something I do not think is true.” This is sharper because it names a specific assumption. The response is adjusted. Move one becomes the assumption you used, specifically, and the reason you chose it. Move two becomes what happens to the conclusion if the assumption is wrong — you have already done the sensitivity analysis, haven’t you? Move three stays the same: offer the deeper session.
Variant 3: “What would change your mind about this?” This is actually the most respectful variant, and the easiest to underestimate. It sounds like an attack but it is an invitation. The response is direct. Name two or three specific pieces of evidence that would update your analysis. “Three things would move me. A regulatory development in the opposite direction. A change in the baseline rate assumption above 250 basis points. Or confirmation that the MSCI methodology revision, expected in Q3, materially changes the sector attribution.” Presenters who cannot answer this question usually have not done the full analysis.
The full system for handling executive Q&A
The Executive Q&A Handling System — £39, instant access — gives you the frameworks for predicting, preparing, and delivering composed responses to executive challenges. Covers the credibility-attack pattern, the detailed technical question, the hostile challenge, and the ambiguous meta-question. Designed for senior professionals presenting to boards, investment committees, and executive sponsors.
- Response frameworks for the most common executive challenge patterns
- Preparation protocols for predictable question types
- Scenario playbooks covering boardroom, investment committee, and executive sponsor settings
- Master checklist and framework reference materials
- Instant download, lifetime access, no subscription
Get the Executive Q&A Handling System →
Designed for senior professionals facing structured executive questioning.
When the follow-up session matters more than the original meeting
If you offer the deeper 30-minute follow-up session and the executive accepts, the follow-up matters more than the original meeting. It is the moment you demonstrate, on your own terms, that the credibility concern was unfounded.
Prepare the follow-up differently from the original presentation. Strip the slides to two or three, at most. Bring the source files, the sensitivity analysis, and the specific methodology documentation. Open the session by naming the question that triggered the follow-up. “We are here because you raised a credibility question on the sector attribution. I want to address that directly.” Then walk through the three elements: exact source, specific methodology steps, complete sensitivity analysis.
The executive’s behaviour in this session tells you which of two things is happening. If they engage deeply with the detail, they were genuinely interested in the analysis and will likely update their view. If they engage lightly and move quickly to other topics, the original question was primarily a composure test and you have now passed it. Either outcome is good. Both require the same preparation.
Need the slide layouts that support defensible analysis?
The Executive Slide System — £39 — includes 26 templates, 93 AI prompts, and 16 scenario playbooks, including layouts for source-transparent analysis slides that make the three-move response easier to execute.
FAQ
What if I genuinely do not know the exact source of a number in my deck?
Do not guess. Do not improvise a source. Say so, honestly: “I can confirm the exact source and methodology within the next two hours — let me come back with a precise answer rather than approximate it now.” This preserves credibility. Approximating a source that turns out to be wrong loses it permanently. Executives do not expect presenters to know every detail live. They expect presenters to know what they do and do not know.
Is it ever correct to push back on the question itself?
Occasionally, and only with a specific form. If the question contains a factual error — for example, the executive has misremembered which dataset you used — a brief, neutral correction is appropriate. “Just to clarify, the data is from MSCI not FactSet — and the February release, not the December one.” Delivered flat, without defensiveness. This is a correction, not a counter-challenge. It protects the accuracy of the exchange without escalating the social dynamic.
How do I prepare if I do not know which numbers will be attacked?
Attackable numbers cluster predictably around the recommendation, comparative benchmarks, and forward-looking projections. For a deck of any length, there are usually three to five such numbers. Prepare the three-move response for each. Yes, you will not use most of them. That is the point. Having the response ready for numbers you were not attacked on is the price of being ready for the one that matters.
What if the credibility attack comes from someone other than the most senior person in the room?
The three-move response is the same. What changes is whether the senior person interjects. Sometimes a chair will step in to redirect after a junior committee member has pushed a credibility attack too hard. If that happens, accept the redirect and continue. Do not return to the earlier question unless directly invited. The chair has already signalled that the moment is over.
The Winning Edge — Thursday newsletter
The Winning Edge covers one specific technique per Thursday — Q&A handling, slide structure, executive communication, and delivery under pressure. Subscribe to The Winning Edge →
Want a simpler place to start? Download the free 7 Presentation Frameworks Quick Reference Card — useful for matching the right structure to the right kind of executive meeting before the Q&A preparation begins.
Next step: take the next deck you are preparing, identify the three most attackable numbers, and draft the three-move response for each one. Thirty minutes of preparation you may not use. The one time you do use it is the one time it matters.
Related reading: How to preempt objections in executive Q&A before they are raised.
About the author. Mary Beth Hazeldine is Owner & Managing Director of Winning Presentations Ltd, founded in 1990. With 24 years of corporate banking experience at JPMorgan Chase, PwC, Royal Bank of Scotland, and Commerzbank, she advises executives across financial services, healthcare, technology, and government on structuring presentations for high-stakes funding rounds, approvals, and board-level decisions.