obtained . This could be done by analyzing information from the telecommunications provider, including network architecture, equipment and line redundancy, and DR plans. - Cybersecurity Governance 60 Consideration should be given to the establishment of a cybersecurity function independent from IT . The main responsibility of such a function would be to develop and maintain the cybersecurity governance framework and to control cybersecurity processes and systems. This change has several advantages: (i) it implements an independent control layer over security