Management of Information Security Implementation in Civil Aviation
Description: After completing the course, participants will be able to demonstrate the following competences:
- Ability to develop and endorse ISMS policies, objectives, and resource plans at leadership level,
- Capability to align regulatory obligations with enterprise risk management and performance indicators,
- Skill in overseeing incidents, third-party compliance, and change management from a governance perspective
- Capacity to initiate and evaluate continuous improvement in ISMS maturity and effectiveness,
- Competence in liaising with regulators and external auditors, and reporting on governance activities.
Previous skills/knowledge: Participants are expected to have the following basic knowledge:
- Basic understanding of management system principles and ISMS foundations,
- Familiarity with executive responsibilities in organizational governance,
- Awareness of regulatory compliance and operational accountability in aviation environments.
Authorized Partners:
Teaching requirements: Trainers should meet the following requirements:
- Subject Matter Expertise – strong understanding of EASA PART‑IS.I.OR regulatory requirements (IS.I.OR.100–260) and their practical application within ISMS for the aviation sector
- Certifications – recommended qualifications include ISO/IEC 27001 Lead Auditor/Implementer or formal training in aviation or ISMS governance standards
- Training & Practical Experience – at least 2–3 years’ experience advising or overseeing top-management roles in ISMS establishment, risk management, compliance, incident handling, and continuous improvement
Objectives to achieve: The course aims to achieve the following objectives:
- Understand strategic ISMS obligations of top management under EASA PART‑IS regulations,
- Recognize the leadership role in defining context, setting policies, allocating resources, and establishing operational governance,
- Learn top-management responsibilities in operational oversight, incident handling, third-party supervision, and continuous improvement,
- Link regulatory requirements with business objectives and information security outcomes,
- Enable strategic decisions and proactive engagement in ISMS monitoring, compliance, and governance processes


