Fig. 2From: Mapping the coverage of security controls in cyber insurance proposal formsShowing the total number of sub-controls mentioned in the forms per controlBack to article page