2-10—2-10
>Control Description
To assess and evaluate the efficiency of the organization's IoT cybersecurity defense capabilities through simulated cyber-attacks, in order to discover unknown weaknesses that may lead to a cyber breach.
Ask AI
Configure your API key to use AI features.