14.2—14.2
>Control Description
Train workforce members to recognize social engineering attacks, such as phishing, business email compromise (BEC), pretexting, and tailgating.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.