8.1.2(c)—8.1.2(c)
>Control Description
cover relevant cyber threats, the cybersecurity risk-management measures in place, contact points and resources for additional information and advice on cybersecurity matters, as well as cyber hygiene practices for users.
Ask AI
Configure your API key to use AI features.