Under active development Content is continuously updated and improved

Article 16.1(h)Article 16.1(h)

>Control Description

implement, as appropriate, relevant operational conclusions resulting from the tests referred to in point (g) and from post-incident analysis into the ICT risk assessment process and develop, according to needs and ICT risk profile, ICT security awareness programmes and digital operational resilience training for staff and management.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.