Cyber Attacks

Further Considerations Related to the Cyber Security Threat to Aviation Systems

read more
Cyber-security-threat-to-aviation-systems

August 14, 2023

sasadmin

Introduction by Sofema Aviation Services (SAS) www.sassofia.com understanding the current cyber security threats to our aviation domains, particularly in the context of European Operations. The possibility for malicious aviation cyber acts continues to threaten the integrity of the aviation system and the potential grows almost daily. A continuing challenge is a task of identifying potential cyber…

Be able to protect your aviation system from Cyber Attacks – A new SAS training dedicated to Aviation Cyber Security is available!

read more
Cyber Security

June 19, 2023

sasadmin

Sofema Aviation Services (SAS) www.sassofia.com is pleased to share that a new course has been added to our training portfolio: EASA Compliant Organizational Cyber Security Responsibilities Available as a Classroom or Webinar training – Register at team@sassofia.com What is the training about? This course is designed to provide participants with a comprehensive understanding of the fundamental concepts and…

Aviation Cyber Security Threat Assessment and Risk Management

read more
Risk

February 02, 2022

sasadmin

Sofema Aviation Services (SAS) www.sassofia.com considers the process to perform a Cyber Risk Assessment. Introduction Role & Purpose of Cybersecurity Risk Assessments Cyber Risk Assessments are integral to information risk management and form a subset of the organization’s high-level overall business risk management strategy. Cybersecurity Risk Assessments are a critical component of risk management strategy…

Considering Threats to Aviation Cyber Security

read more
threats

January 31, 2022

sasadmin

Introduction by Sofema Aviation Services (SAS) www.sassofia.com understanding the current threats to our aviation domains, particularly in the context of European Operations. Introduction An effective Cybersecurity process could be considered as a system of processes and protocols working across your business to protect both your information (Data) as well as your services from any potential…