(4) respond to identified or detected Cybersecurity Events to mitigate any negative effects;
(3) requirements describing how identified risks will be mitigated or accepted based on the Risk Assessment and how the cybersecurity program will address the risks.