‹ Outsourcing of Functions Containing Customer Information_9 June 2016 Cyber Attacks on Critical IT Systems and Infrastructure_11 May 2016 › Cyber Security Risk Management_1 June 2016 Click here to download the Letter in PDF format. ‹ Outsourcing of Functions Containing Customer Information_9 June 2016 Cyber Attacks on Critical IT Systems and Infrastructure_11 May 2016 ›