Loading...
Management of Information Security Implementation in Civil Aviation
Description: After completing the course, participants will be able to demonstrate the following competences:
 
  • Ability to develop and endorse ISMS policies, objectives, and resource plans at leadership level,
  • Capability to align regulatory obligations with enterprise risk management and performance indicators,
  • Skill in overseeing incidents, third-party compliance, and change management from a governance perspective
  • Capacity to initiate and evaluate continuous improvement in ISMS maturity and effectiveness,
  • Competence in liaising with regulators and external auditors, and reporting on governance activities.
Previous skills/knowledge: Participants are expected to have the following basic knowledge:
  • Basic understanding of management system principles and ISMS foundations,
  • Familiarity with executive responsibilities in organizational governance,
  • Awareness of regulatory compliance and operational accountability in aviation environments.
Authorized Partners:

Teaching requirements: Trainers should meet the following requirements:
  • Subject Matter Expertise – strong understanding of EASA PART‑IS.I.OR regulatory requirements (IS.I.OR.100–260) and their practical application within ISMS for the aviation sector
  • Certifications – recommended qualifications include ISO/IEC 27001 Lead Auditor/Implementer or formal training in aviation or ISMS governance standards
  • Training & Practical Experience – at least 2–3 years’ experience advising or overseeing top-management roles in ISMS establishment, risk management, compliance, incident handling, and continuous improvement
Objectives to achieve: The course aims to achieve the following objectives:
  • Understand strategic ISMS obligations of top management under EASA PART‑IS regulations,  
  • Recognize the leadership role in defining context, setting policies, allocating resources, and  establishing operational governance,
  • Learn top-management responsibilities in operational oversight, incident handling, third-party supervision, and continuous improvement,
  • Link regulatory requirements with business objectives and information security outcomes,
  • Enable strategic decisions and proactive engagement in ISMS monitoring, compliance, and  governance processes
Authorized Partners: