Agree & Join LinkedIn

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Skip to main content
LinkedIn
  • Articles
  • People
  • Learning
  • Jobs
  • Games
Join now Sign in
Last updated on Mar 20, 2025
  1. All
  2. IT Services
  3. Information Security

You need security feedback from non-technical teams. How do you make it actionable?

Getting actionable security feedback from non-technical teams can be challenging, but it's essential for holistic protection.

To make security feedback from non-technical teams actionable, focus on clear communication and practical solutions. Here's how:

  • Simplify the language: Use plain language and avoid technical jargon to ensure everyone understands the security issues.

  • Provide context: Explain why their feedback is crucial and how it impacts overall security measures.

  • Create structured feedback forms: Design forms that guide non-technical teams to provide specific, relevant information.

How do you gather and use security feedback from non-technical teams? Share your strategies.

Information Security Information Security

Information Security

+ Follow
Last updated on Mar 20, 2025
  1. All
  2. IT Services
  3. Information Security

You need security feedback from non-technical teams. How do you make it actionable?

Getting actionable security feedback from non-technical teams can be challenging, but it's essential for holistic protection.

To make security feedback from non-technical teams actionable, focus on clear communication and practical solutions. Here's how:

  • Simplify the language: Use plain language and avoid technical jargon to ensure everyone understands the security issues.

  • Provide context: Explain why their feedback is crucial and how it impacts overall security measures.

  • Create structured feedback forms: Design forms that guide non-technical teams to provide specific, relevant information.

How do you gather and use security feedback from non-technical teams? Share your strategies.

Add your perspective
Help others by sharing more (125 characters min.)
23 answers
  • Contributor profile photo
    Contributor profile photo
    Alexia Wong

    Tuition teacher. Earned Community Top Voice Badge in Teaching in '23 and Community Top Voice Badge in Cybersecurity in '24.

    • Report contribution

    To make it actionable, you need to first make sure that the feedback obtained from these non-technical team is clear and precised. This is so that you would know what it is that they mean. You need to then ask them to describe about what they feel should be enhanced and improved on in terms of how secure they feel. This is so that you would know how non-technical users would think. You need to make sure that when you're asking them for their feedback, you should explain the whole situation to them in layman terms. This is so that they would understand what you need to know from them.

    Like
    5
  • Contributor profile photo
    Contributor profile photo
    Muhammad Danyal Khan

    Author | AI | CyS | GRC | DevOps | FOSS | DevRel | Educator | Audio Engineer | Musician | Naval Officer | Hypnocounselor | Rhetorician

    • Report contribution

    Establish accessible channels like anonymous surveys or dedicated communication platforms to encourage honest input. Conduct interactive training sessions using relatable examples to enhance security awareness. Utilize feedback tools with features such as surveys and 360-degree feedback to gain diverse insights. Encourage cross-departmental collaboration to bridge knowledge gaps and foster comprehensive security strategies. Ensure security policies are written in clear, non-technical language and gather direct feedback to improve comprehension. Maintain a continuous feedback loop by regularly soliciting input and demonstrating that contributions lead to tangible improvements, promoting a proactive security environment.

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    Robert Deck

    President At Engage Partners Inc. | Need to hire? We can help! | Recruiting | Helping SMB Use Automation to Boost Productivity, Generate Leads, and Streamline Operations | AI Consultant | Making AI Easy And Impactful

    • Report contribution

    Gathering actionable security feedback from non-technical teams is indeed a vital component of our overall security strategy at Engage Partners. One effective approach I've found is to establish regular cross-departmental workshops where team members can voice their concerns in an open environment. For instance, during our last session, the marketing team raised issues about data handling practices that weren't on my radar. We then developed a simple guide tailored for them to implement secure data management practices without needing deep technical knowledge. This not only enhanced our security posture but also empowered non-technical staff by making them active participants in our security framework.

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    Ronald Barroeta
    • Report contribution

    🗣️ Simplify the Language Avoid jargon; use real-world scenarios to explain security concerns. Provide clear examples of risks and their potential impact. ✅ Make Feedback Structured & Relevant Use simple surveys, checklists, or guided questions to gather focused input. Ask about day-to-day challenges rather than technical specifics. 🔄 Turn Insights into Action Categorize feedback by urgency and impact to prioritize improvements. Create bite-sized training or FAQs to address recurring concerns.

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    ☁ Scott Parry 📚

    🔹 Cloud Security Architect | Cybersecurity Consultant | IAM & GRC Specialist 🦑 Multi-Armed Defender in the Digital Deep | Making Compliance Practical, Not Painful

    • Report contribution

    The only way to do this is relate it back to business drivers. What is stopping them from doing their work? Do they think the latest project to roll out MFA what part of the process is difficult? Where are they having access issues? Why are they scared about the enxt security project? You need to get into the trenches and work directly with the business teams. You MUST be available, approachable and be able to communicate to users at whatever level they are comfortable. Once they tell you what they need or need to avoid it is your job to view those ideas from a technical lens and figure out how to make it happen. They wont wrap the answer up for you, its not their job to understand, it is yours!

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    SALMAN HUSSAIN

    🚀 Senior Tech Lead at Sinch | Java & Microservices Specialist | Architecting Scalable Software Solutions

    (edited)
    • Report contribution

    -Use simple language – Avoid technical jargon and keep explanations clear. -Give real-world context – Show how security issues affect daily operations. -Create structured feedback forms – Use checkboxes and simple prompts for clarity. -Offer examples – Provide clear, relatable security scenarios. -Encourage open discussions – Host informal Q&A sessions for input. -Acknowledge and act on feedback – Show results to build trust. -Assign a security liaison – Have a point of contact for non-technical teams. -Use anonymous reporting – Make it easy to report concerns without fear. -Integrate feedback into workflows – Ensure security becomes part of daily work.

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    Jim Katzaman

    Tealfeed Creators' Program '22

    • Report contribution

    To get actionable security feedback from non-technical teams, simplify the conversation. Use clear, relatable language—avoid jargon—and frame security in terms of real-world impact on their work. Provide specific scenarios or structured questions to guide their input. Encourage them to report unusual activities or pain points without fear of blame. Once feedback is gathered, categorize it by urgency and feasibility. Then communicate back on actions taken. By making security a shared responsibility and showing responsiveness, you create a culture where non-technical teams feel valued and engaged in safeguarding the business.

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    Angel Suliveres

    Change agent. Learning, growing and evolving daily.

    • Report contribution

    To gather actionable security feedback from non-technical teams, reframe your approach creatively: Focus Groups: Host casual focus group sessions where employees share insights through guided discussions, fostering a relaxed and open exchange. Feedback Challenges: Run contests to encourage teams to identify potential security gaps, rewarding the most impactful suggestions. Custom Scenarios: Present relatable, role-specific scenarios to prompt focused feedback tailored to their daily experiences. These strategies, alongside structured tools, training, and open communication, empower teams to provide clear, actionable input for improved security.

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    Rex Orokumue

    Digital Enthusiast with expertise in content creation and social media management

    • Report contribution

    The most important thing here is to use simple and plain language to help them understand the security issues on ground and how valuable their feedback is in solving the issue on ground. They should also be able to express their opinions in simple and plain way

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    Sankhadeep Majumder

    Transforming Business Growth with Data-Driven Insights 📈 | Business Development & Analytics Expert 📊 | Certified in Generative AI and Data Analysis by Microsoft 💻 |

    • Report contribution

    To make security feedback from non-technical teams actionable, I first ensure the feedback is clear by asking for specific examples and avoiding technical jargon. I translate their input into practical security concerns and prioritize them based on impact. Then, I work with technical teams to create simple solutions or processes that address the issues. Finally, I communicate back to the non-technical teams, explaining how their feedback was implemented, ensuring they feel heard and valued in the process.

    Like
    1
View more answers
Information Security Information Security

Information Security

+ Follow

Rate this article

We created this article with the help of AI. What do you think of it?
It’s great It’s not so great

Thanks for your feedback

Your feedback is private. Like or react to bring the conversation to your network.

Tell us more

Report this article

More articles on Information Security

No more previous content
  • You're facing evolving cyber threats. How will you adapt your access controls to stay ahead?

  • You're facing a security incident with your team. How do you maintain transparency?

    15 contributions

  • You're trying to balance security and usability in authentication. Are your current methods effective?

    7 contributions

  • You need to explain multi-factor authentication to a non-technical team. How do you make it clear?

    9 contributions

  • You're faced with multiple critical system vulnerabilities. How do you determine which one to patch first?

    3 contributions

  • Facing a data breach incident, how can you collaborate seamlessly with external cybersecurity experts?

    8 contributions

  • You're facing a data breach crisis. How do you maintain speed without compromising precision?

No more next content
See all

More relevant reading

  • Operating Systems
    You're overwhelmed with system updates and tight deadlines. How do you decide which ones to prioritize?
  • Information Technology
    How do you troubleshoot and solve IT issues with non-technical users?
  • System Architecture
    How can you secure systems during evolution and maintenance?
  • Systems Engineering
    What steps can you take to ensure system logs are accurate and useful for troubleshooting?

Explore Other Skills

  • IT Strategy
  • System Administration
  • Technical Support
  • Cybersecurity
  • IT Management
  • Software Project Management
  • IT Consulting
  • IT Operations
  • Data Management
  • Information Technology

Are you sure you want to delete your contribution?

Are you sure you want to delete your reply?

  • LinkedIn © 2025
  • About
  • Accessibility
  • User Agreement
  • Privacy Policy
  • Cookie Policy
  • Copyright Policy
  • Brand Policy
  • Guest Controls
  • Community Guidelines
Like
1
23 Contributions