Tag: incident response

27 Apr 2026
Featured image for Data Breach Communication: How to Present a Security Incident to Your Board

Data Breach Communication: How to Present a Security Incident to Your Board

Quick answer: A data breach presentation to your board should open with the scope and severity of the incident, move into a clear timeline of what happened and when it was detected, outline the immediate containment measures already taken, and close with the remediation plan and regulatory obligations. Your board does not need technical forensics — they need governance-level clarity that enables decisive action within the first 72 hours.

Katarina Novak had spent eleven years building her reputation as a meticulous CISO. She had overseen penetration testing schedules, led compliance audits, and negotiated cyber insurance renewals without a single material incident on her record. Then, on a Tuesday afternoon in February, her security operations team flagged unusual data exfiltration patterns across three customer-facing databases.

Within four hours, the scope became clear: approximately 140,000 customer records had been exposed, including names, email addresses, and partial financial data. The regulatory clock was already ticking. Katarina had 72 hours to notify the ICO under UK GDPR, and her CEO had called an emergency board meeting for the following morning.

She sat at her desk at 9 PM, staring at a blank slide deck. She had every technical detail memorised. What she did not have was a structure that would give her board — five non-technical directors with fiduciary responsibilities and personal liability concerns — the clarity they needed to make decisions rather than spiral into recrimination.

Her challenge was not knowledge. It was translation. And that gap between technical mastery and boardroom communication is where most breach presentations fall apart.

If you need a structured approach to crisis board presentations, the Executive Slide System gives you ready-made templates for exactly this kind of high-pressure scenario.

Explore the System →

Why Most Board Breach Briefings Fail

The typical board breach briefing fails for a specific and predictable reason: the presenter structures it as a technical post-mortem rather than a governance decision document. CISOs and IT directors default to what they know — forensic timelines, attack vectors, system architecture diagrams — because that is the world they operate in daily. But a board meeting after a data breach is not a technical review. It is a governance session where directors need to discharge their fiduciary duties, assess organisational risk, and authorise specific actions.

When you present 40 slides of network topology to a room of non-executive directors, you are not being thorough. You are being unclear. The board’s primary concerns are legal exposure, financial impact, reputational damage, and regulatory compliance — in roughly that order. Every slide that does not address one of those four concerns is a slide that wastes the limited attention your board will give you under crisis conditions.

This is the same communication challenge that surfaces when presenting bad news to senior leadership in any context — the instinct to over-explain creates distance rather than clarity. A breach briefing compounds this problem because time pressure is extreme and the emotional stakes for individual directors are high. Non-executive directors carry personal liability under certain regulatory frameworks. They are not sitting in that room with academic curiosity.

The fix is structural, not rhetorical. You do not need to become a better public speaker to deliver an effective breach briefing. You need a framework that translates technical incident data into governance-level decision points — one that your board can follow even when anxiety is running high and trust is under strain.

Structure Your Crisis Board Briefing in 30 Minutes

The Executive Slide System includes 22 templates, 51 AI prompts, and 15 scenario playbooks — including crisis and incident response scenarios. Stop building breach presentations from scratch under time pressure.

£39 — instant access. Designed for high-stakes executive crisis presentations.

Get the Executive Slide System →

The Five-Section Framework for a Data Breach Board Briefing

An effective data breach presentation follows five sections, each designed to answer a specific governance question. This is not a suggestion — it is the logical sequence that allows your board to process the situation, assess risk, and authorise next steps without backtracking or circular discussion.

Section 1: Incident Summary (1-2 slides). What happened, when it was detected, and what data was affected. Use plain language. “Unauthorised access to customer database” is clearer than “threat actor exploited CVE-2026-XXXX via lateral movement from compromised endpoint.” Your board needs to understand the nature and scope of the incident, not the attack methodology.

Section 2: Current Status and Containment (1-2 slides). What has already been done to stop the breach, isolate affected systems, and prevent further data loss. This section is psychologically critical — it demonstrates that the organisation is already acting, which reduces the board’s anxiety and prevents the meeting from becoming a blame session.

Section 3: Regulatory and Legal Obligations (2 slides). Which regulators must be notified, by when, and what has already been filed. If you are presenting to a UK-regulated organisation, ICO notification under UK GDPR is mandatory within 72 hours where the breach poses a risk to individuals’ rights and freedoms. Your board needs to know whether you are within that window and what the notification will say. This connects directly to the kind of compliance presentation structure that boards expect in regulated environments.

Section 4: Impact Assessment (2-3 slides). Financial exposure, reputational risk, customer impact, and insurance coverage. Be specific where you can and honest about what remains uncertain. “We estimate direct costs between £200,000 and £500,000 based on comparable incidents, but this will refine as the forensic investigation concludes” is far more useful than either a precise figure you cannot defend or a vague “significant financial impact.”

Section 5: Remediation Plan and Decision Points (2-3 slides). What the organisation will do next, what resources are required, and what decisions the board needs to make today. This is where many breach briefings fall short — they describe the problem exhaustively but leave the board with no clear actions. Your final slides should include specific asks: approve the forensic investigation budget, authorise customer notification, confirm the external communications strategy.


Five-section framework for data breach board briefing showing incident summary, containment status, regulatory obligations, impact assessment, and remediation plan with decision points

How to Structure Your Opening Slide for Maximum Clarity

Your opening slide sets the cognitive frame for the entire meeting. Get it wrong, and you will spend the next 45 minutes fielding anxious, unfocused questions from directors who are still trying to understand the basics. Get it right, and your board enters the discussion with the mental model they need to engage with your recommendations rather than your forensic data.

The opening slide should contain exactly four elements:

  • Nature of the incident — one sentence. “Unauthorised access to customer records database via compromised vendor credentials.”
  • Scale — number of records, customers, or systems affected. Use ranges if the investigation is ongoing.
  • Detection and containment timeline — when the breach occurred, when it was detected, and when containment was achieved.
  • Current status — a single line: “Contained / Under investigation / Ongoing.” This immediately tells your board whether the building is still on fire.

Notice what is not on this slide: attribution, root cause analysis, system architecture, or vendor blame. Those details belong in the appendix for directors who want to review them after the meeting. Your opening slide is a governance summary, not an incident report.

If structuring crisis slides feels overwhelming, the Executive Slide System provides 22 ready-made templates designed for exactly this kind of high-stakes board scenario.

Presenting the Regulatory Timeline Without Creating Panic

Regulatory deadlines after a data breach are non-negotiable, and your board knows this. What they may not know is how to interpret those deadlines in context — and if you present them without context, you risk triggering panic rather than structured decision-making.

The most effective approach is to present regulatory obligations as a visual timeline rather than a bullet list. Show the 72-hour ICO notification window, the customer notification requirements, any sector-specific obligations (FCA for financial services, NHS Digital for healthcare), and — critically — mark which deadlines have already been met and which are pending. This shifts the board’s mental model from “we are in trouble” to “we are managing a process.”

One question boards frequently ask is: what happens if we miss a regulatory deadline? Prepare for this. Under UK GDPR, late notification can result in administrative fines up to £8.7 million or 2% of annual worldwide turnover, whichever is higher — though in practice, the ICO considers the circumstances and the organisation’s cooperation. Your slide should acknowledge the risk proportionally: serious enough to warrant urgency, not so catastrophic that the board loses confidence in your ability to manage it.

This is also the section where cross-border considerations surface. If affected customers are in multiple jurisdictions, you may have parallel notification obligations. A table showing jurisdiction, regulator, deadline, and status is the clearest format — and it demonstrates to your board that you have mapped the full regulatory landscape rather than focusing only on domestic requirements.

The psychological principle at work here mirrors what applies when presenting change to stakeholders: people accept difficult realities more readily when they can see a clear process for managing them. Your regulatory timeline slide is not just informational — it is a confidence-building tool.

Board-Ready Crisis Slides Without Starting From Scratch

When the clock is ticking and the board is waiting, you need structure, not a blank screen. The Executive Slide System gives you 15 scenario playbooks and 51 AI prompts to build your breach briefing in minutes.

£39 — instant access.

Get the Executive Slide System →

Building a Remediation Slide That Drives Board Confidence

Your remediation slide is where the meeting turns from backward-looking analysis to forward-looking action. This is the slide that determines whether your board leaves the room feeling that the organisation is in control or feeling that it is in freefall.

Structure your remediation plan around three time horizons:

Immediate (0-72 hours): System isolation, credential rotation, forensic investigation initiation, legal counsel engagement, regulatory notification. Most of these should already be in progress or complete by the time you present. Showing completed items demonstrates competence.

Short-term (1-4 weeks): Full forensic report, customer notification execution, external communications rollout, insurance claim filing, vulnerability remediation. Each item should have an owner and a target date.

Medium-term (1-6 months): Security architecture review, vendor risk reassessment, updated incident response procedures, board reporting cadence for ongoing updates. This section signals to your board that you are not just fighting the current fire — you are preventing the next one.

Another common board question: how do we know this will not happen again? The honest answer is that no organisation can guarantee zero risk. But you can demonstrate that the remediation plan addresses the specific vulnerability exploited in this incident and strengthens the broader security posture. Frame it as risk reduction, not risk elimination — your board will respect the honesty and trust your judgment more than if you offer unrealistic assurances.

End your remediation section with explicit decision points. “The board is asked to approve the following: (1) £150,000 budget for third-party forensic investigation, (2) customer notification strategy as outlined, (3) appointment of external crisis communications firm.” Give your board something concrete to vote on. Decision points convert anxiety into agency.


Remediation timeline showing three time horizons for post-breach recovery: immediate actions at 0-72 hours, short-term steps at 1-4 weeks, and medium-term security improvements at 1-6 months

Preparing for the Hardest Board Questions After a Breach

The presentation itself is only half the battle. The Q&A session that follows is where board confidence is truly won or lost. Directors under pressure ask pointed, sometimes adversarial questions — not because they are hostile, but because they are processing personal liability risk in real time.

Prepare for these five questions specifically:

  1. “Were we warned about this risk?” — Have your risk register entries and previous board reporting ready. If cybersecurity risks were flagged in prior meetings, reference those discussions to show continuity of governance.
  2. “What is our personal exposure?” — Non-executive directors carry personal liability under certain frameworks. Have your legal counsel’s assessment of director liability ready, even if it is preliminary.
  3. “Why did it take so long to detect?” — Be factual about dwell time. If detection took days or weeks, explain what detection capabilities were in place and what has changed since.
  4. “Should we disclose publicly before we are required to?” — This is a strategic decision, not a technical one. Present the arguments for early voluntary disclosure (trust, narrative control) alongside the arguments for regulatory-timeline disclosure (completeness, legal protection).
  5. “How much will this cost us?” — Provide a range with clear assumptions. Include direct costs (forensics, notification, remediation), potential regulatory fines, litigation exposure, and customer churn estimates. Be transparent about uncertainty.

The ability to handle hostile questions under pressure is a skill that extends well beyond breach presentations. If you are also preparing for competitive win-back presentations or any high-stakes board scenario, the same principle applies: anticipate the three hardest questions and prepare structured responses before you enter the room.

What should you include in a data breach presentation appendix? Keep the appendix technical and detailed — it is for directors who want deeper information after the meeting. Include the full forensic timeline, system architecture diagrams, vendor assessment reports, and the complete regulatory notification text. Label it clearly as supplementary material so that the board understands it is available but not required reading for the governance decisions at hand.

Frequently Asked Questions

How long should a data breach board presentation be?

Aim for 10 to 15 slides in the main presentation, with a technical appendix available for directors who want additional detail. Under crisis conditions, board attention is compressed — you have approximately 20 minutes before anxiety-driven questions begin to dominate. Structure your core briefing to fit within that window, and allocate the remaining meeting time for discussion and decision-making. Shorter is almost always better in a breach context; every unnecessary slide dilutes the urgency and clarity of your core message.

Should the CISO or the CEO deliver the breach briefing to the board?

In most organisations, the CISO should present the technical incident details and remediation plan, while the CEO or a senior executive should frame the strategic and reputational implications. Co-presenting demonstrates organisational alignment — the board sees that the security team and executive leadership are working from the same information and the same priorities. If your organisation does not have a CISO, the CTO or head of IT should lead the technical sections, with the CEO anchoring the governance narrative and decision points.

What is the biggest mistake executives make in a cybersecurity board briefing?

The most common mistake is presenting the breach as a purely technical event rather than a business risk event. Boards govern risk, not infrastructure. When you spend 80% of your slides on attack vectors, log analysis, and network diagrams, you force non-technical directors to translate that information into governance terms themselves — and most cannot. The second most common mistake is failing to include clear decision points. A briefing that ends with “any questions?” instead of “the board is asked to approve the following three actions” wastes the meeting’s decision-making authority and leaves the organisation in limbo during a period when speed matters.

Join The Winning Edge

Free weekly newsletter for executives who present at board level. Practical frameworks, crisis communication strategies, and slide structure guidance — delivered every Thursday.

Subscribe Free →

Not ready for the full system? Start here instead: download the free Executive Presentation Checklist — a quick-reference guide for structuring any high-stakes board presentation.

Mary Beth Hazeldine is the Owner & Managing Director of Winning Presentations. With 25 years of corporate banking experience at JPMorgan Chase, PwC, Royal Bank of Scotland, and Commerzbank, she advises executives across financial services, healthcare, technology, and government on structuring presentations for high-stakes funding rounds and approvals.

29 Mar 2026
Crisis boardroom briefing setting with urgent presentation slides on screen during a data breach response

The Data Breach Presentation: How to Brief the Board When Security Has Failed

A data breach presentation to the board must prioritise transparency, containment status, and remediation roadmap. Structure your briefing with immediate facts first, then severity assessment, affected parties, response measures, and governance improvements—delivered with composure and accountability, not excuses.

I remember sitting with the CRO of a mid-sized fintech company the morning their payment processing systems were compromised. His instinct was to minimise the incident, talk about their strong security posture, and focus on the rapid remediation. But the board didn’t need reassurance—they needed truth. When he pivoted to a clear, facts-first briefing that acknowledged the breach severity, explained exactly how it happened, and outlined the decisive steps already underway, the room shifted. The board moved from alarm to alignment. That presentation became the template I’ve now refined across banking, healthcare, and technology firms facing their own security crises. The lesson: transparency and accountability rebuild trust faster than any defensive narrative.

The Challenge

You’re in crisis mode. Incident response teams are working round the clock, legal and compliance are engaged, but now you face the board. This presentation sets the tone for the organisation’s response and determines whether leadership retains stakeholder confidence. Get it wrong, and you compound the crisis. Get it right, and you lead recovery.

How to Structure a Data Breach Presentation

The moment you call a data breach presentation, the board expects a specific framework. This isn’t the place for storytelling or gradual reveals. Your structure must signal control, transparency, and a clear remediation path.

Begin with what happened: the discovery method, date detected, and date of incident. Follow with scope: how many records, which systems, which customer populations. Then move to response: what’s been done since discovery, what’s in progress, what external parties have been engaged. Finally, present governance: the investigation findings, root cause, and prevention measures being implemented.

Each section must answer the question the board is actually asking: Is this controlled? Do we understand it? Are we managing the fallout? What have we learned?

Your slides should be clean, data-heavy, and devoid of jargon. Board members want to understand the incident without needing a security degree. If you can’t explain your response in plain English, you haven’t thought it through well enough.

Master Board Presentations Under Pressure

The Executive Slide System gives you frameworks for every high-stakes conversation—including crisis management. Slide templates, speaker notes, and board communication protocols designed for banking, healthcare, and regulated industries.

Executive Slide System — £39

Includes crisis communication templates

Opening with the Facts: What Happened and When

Your opening slide should contain three elements: the discovery date, the incident date, and the notification status. Don’t bury these. Put them at the top in large text. Boards appreciate efficiency.

For example: “Breach discovered 14 March 2026. Incident occurred 7–12 March 2026. Regulatory notification completed 15 March. Customer notifications in progress.” That’s it. One slide. One minute of your time.

Then explain how you discovered the breach. Was it a third-party security researcher? Your own monitoring systems? A customer report? An attack pattern? The method matters because it tells the board whether your detection capabilities are strong or weak. Be honest. If you relied on external discovery, acknowledge it and explain what’s being upgraded in your monitoring infrastructure.

Next, outline the attack vector. How did they get in? Vulnerable plugin? Credential compromise? Supply chain weakness? Social engineering? Don’t speculate. Present only what your forensic investigation has confirmed. If the root cause isn’t yet clear, say so. Speculating damages credibility more than admitting you’re still investigating.

Finally, confirm whether the breach has been contained. Is the attack surface still open, or has it been sealed? Are you confident the attacker no longer has access? This single answer determines whether the board moves to the next question or stops you with follow-ups. If containment is partial or uncertain, be explicit about it and explain the timeline to full containment.

Scope and Impact: Who and What Was Affected

After establishing what happened, the board needs to understand the size of the problem. This section requires precision. Vague numbers erode trust faster than difficult truths.

Present the affected data categories clearly: customer names and email addresses (number of records), payment card information (last four digits only, ideally), NHS numbers, employee data, or proprietary information. Be specific about each category. A breach affecting customer emails is materially different from one affecting payment cards, and the board needs to distinguish.

If the breach is geographically dispersed, break it down by region. GDPR-regulated data? HIPAA-covered records? Payment Card Industry data? This determines your notification and regulatory burden, and the board needs to see that you’ve already mapped these obligations.

Include a timeline slide showing the discovery window and remediation milestones. Boards want to see momentum. If your timeline shows discovery on day one and containment on day two, that’s strong positioning. If it shows a month-long gap between incident and discovery, the board will ask harder questions about your monitoring.

Data breach board briefing dashboard showing four critical elements: core slides, update cycle, decision ask, and stakeholder groups

Don’t speculate about impact. If you don’t know whether customers have suffered fraud, say so. If no fraudulent transactions have been reported yet, that’s worth noting, but don’t claim it as evidence of safety. Fraudsters often sit on stolen data for months before monetising it. Responsible communication means saying what you know and don’t know, and explaining your monitoring for future misuse.

Close this section by explicitly confirming whether this is your organisation’s first breach, or whether there are previous incidents in your history. Boards need to see whether this is an isolated incident or a pattern of security weaknesses. If it’s your second breach in three years, that changes the narrative significantly, and the board will expect more aggressive remediation and governance changes.

Immediate Response and Containment Measures

This is where you demonstrate leadership. The board is watching to see whether your organisation has a rehearsed, competent response or whether you’re improvising under pressure.

List the actions taken immediately upon discovery: isolation of affected systems, engagement of external forensic investigators, notification of your insurer, engagement of breach counsel, and escalation to the board and audit committee. If you’ve already done these things, say so with dates. If you’re still in the process, say that too.

Introduce your response team: Who is the incident commander? Who is leading the forensic investigation? (Name the external firm if you’ve engaged one—it signals seriousness.) Who is managing regulatory notification? Who is handling customer communications? Boards trust clarity. If the response is fragmented or unclear, confidence drops.

Then outline the ongoing remediation: system hardening, patching, access reviews, enhanced monitoring, infrastructure changes. Give timeline estimates for each. Be realistic. If you’re six weeks into a twelve-week remediation, say so. Overpromising fixes erodes trust.

Close by addressing cyber insurance. Have you made a claim? What is your coverage limit? What portion of costs will be covered? Boards care deeply about financial impact, and insurance is often the most material mitigation. If your coverage is inadequate for this incident, the board needs to know now and understand why you’ll be proposing coverage increases before the next renewal.

Present with Executive Clarity

The difference between a crisis that destroys confidence and one that proves your leadership is how you present it. The Executive Slide System includes dark mode templates, data visualisation examples, and voice patterns for high-stress briefings—tested with C-suite executives and board chairs across banking and healthcare.

Executive Slide System — £39 →

External Communication and Regulatory Reporting

The board must understand your communication obligations and strategy before the breach becomes public. Present your notification timeline, template letters (redacted for the board), and the sequence in which stakeholder groups will be informed.

In the UK, GDPR requires notification to the Information Commissioner’s Office within 72 hours if there is high risk to individuals. Are you meeting this deadline? If not, explain why not and when you will. If the breach isn’t reportable to the ICO, explain that too—it shows you’ve done a legal assessment rather than over-reporting.

For payment card data, PCI-DSS requires notification to card networks and potentially customers. Are you engaging payment processors and card schemes? Have you involved your acquiring bank? The board needs to see that you understand your contractual and regulatory obligations.

Present your customer communication strategy. Will you email, phone, or offer a portal where customers can check whether their data was involved? Will you offer free credit monitoring? The board will want to know your cost estimate for this. If you’re committing to paid identity protection for affected customers, that’s a material expense and requires board visibility.

Also address media strategy. Have you engaged a PR agency? What is your public statement? Will the CEO do interviews, or will you refer all inquiries to a designated spokesperson? The board will want to know whether you’re being transparent with the press or defending the breach defensively. Transparency usually plays better with media and the public.

Finally, address staff communication. Employees often hear about breaches through news first, which damages morale. Have you prepared an all-hands briefing explaining what happened, whether employee data was involved, and what the organisation is doing to prevent recurrence? This matters more than many executives realise. Your people need to believe you’re taking this seriously.

Recovery and Prevention: The Path Forward

The final section is the pivot from crisis to leadership. Boards remember organisations that not only survive breaches but demonstrate they’ve learned from them and made meaningful improvements.

Present your investigation findings: the root cause, the failure points, and the systemic weaknesses this breach has exposed. Don’t soft-pedal this. If your monitoring was inadequate, say so. If your patch management was slack, admit it. If you had a known vulnerability that wasn’t prioritised, own it. Boards respect organisations that face difficult truths rather than make excuses.

Then outline your remediation roadmap. What specific changes are being made to prevent recurrence? Upgraded security monitoring? Enhanced access controls? Penetration testing? A new Chief Information Security Officer? Updated incident response playbooks? Each item should have a owner, a timeline, and a success metric.

Address governance improvements. Will the board now receive monthly cyber updates rather than quarterly? Will you establish a board-level cyber committee? Will CISO reporting change? These changes signal that leadership takes the risk seriously and is willing to restructure governance to match.

Also present your cyber insurance and risk transfer strategy going forward. Are you increasing coverage? Changing providers? Adding additional coverage for extortion or reputation damage? Regulatory and compliance presentations often gloss over insurance, but the board will expect a clear strategy here.

Four-stage breach response roadmap: contain, assess, communicate, and recover

Finally, present your communication plan for this conversation. How will you communicate the board’s confidence in the response to employees, customers, and investors? If the board passes a resolution affirming management’s handling of the incident, that’s a signal to the market that governance is strong. Include this in your planning.

Close this section—and the core content—with a personal commitment from the executive leading the response. The board needs to hear that someone is personally accountable and will see this recovery through. Not a vague “the team is committed” statement, but a clear “I am leading this and I will report monthly on our progress” commitment. This transforms the conversation from a crisis briefing to a leadership moment.

If you’re preparing for a board briefing after a breach and need to sharpen your messaging, the Executive Slide System includes crisis communication templates and speaker notes tested in actual board rooms.

Frequently Asked Questions

How much detail should you provide about the attack vector?

Provide enough detail so the board understands the risk, but not so much that you’re revealing operational security information. Say “a vulnerability in our third-party email plugin” rather than the specific CVE number or patch details. The board needs to know the category of failure (third-party risk, credential compromise, supply chain) so they can understand your remediation approach. Your detailed forensic report goes to audit committee members with restricted distribution, not the full board.

What if the breach is ongoing and you haven’t yet achieved full containment?

Be transparent about the containment status and timeline. “We have contained the payment processing vulnerability as of this morning. We are still monitoring the attacker’s activity on one legacy system, which we expect to fully isolate by end of week.” Boards understand that some breaches take time to fully contain. What they won’t tolerate is discovering later that you misrepresented the containment status in this briefing. Err toward transparency every time.

Should you recommend board-level changes to cyber governance, or wait for the board to ask?

Recommend them proactively. You have the information; the board is responding to you. If you believe monthly cyber updates are warranted, propose them. If your CISO should report directly to the board rather than the CIO, recommend it. This positions you as forward-thinking and accountable, not defensive. The board may reject your proposals, but they’ll respect that you thought through the governance implications of this breach rather than hoping they won’t notice the gaps.

Strengthen Your Board Communication

Subscribe to The Winning Edge for frameworks on high-stakes presentations, board confidence, and executive communication under pressure.

Join the Newsletter

Get the Executive Presentation Checklist free—15-point quality control framework for any board presentation.

More in This Series

Today’s articles cover governance updates, revenue forecasts, and managing presentation anxiety for challenging audiences. All part of the crisis and difficult presentation cluster.

A data breach presentation is not the moment to defend your past decisions. It is the moment to prove you can lead through a crisis with transparency, accountability, and strategic vision. Get those three elements right, and the board will support your recovery.

Mary Beth Hazeldine is Owner & Managing Director of Winning Presentations. With 24 years of corporate banking experience at JPMorgan Chase, PwC, Royal Bank of Scotland, and Commerzbank, she advises executives across financial services, healthcare, technology, and government on structuring presentations for high-stakes funding rounds and approvals.