GDPR

Cyber Integration into an EASA Part 145 Organization – Risk Management Framework

read more
A digital image featuring a business professional interacting with a risk management dashboard, highlighting key cybersecurity elements such as data protection, analytics, and compliance. The Sofema Aviation Services (SAS) logo appears in the top left corner, with the text: "Cyber Integration into an EASA Part 145 Organization Risk Management Framework." The image represents the importance of cyber risk management in aviation maintenance organizations under EASA regulations.

February 07, 2025

Steven Bentley

Sofema Aviation Services (SAS) considers the challenges related to phishing, ransomware, data breaches, and insider threat exposures (both intentional and accidental) within the framework of an EASA Part 145 organization. Challenges in Cybersecurity for Part 145 Organizations EASA Part 145 organizations, as integral components of the aviation safety chain, face distinct challenges in managing information…

EASA Cyber Security – Addressing Stakeholder Needs

read more
Business professional holding a holographic airplane, symbolizing EASA cyber security addressing aviation stakeholder needs

January 29, 2025

Steven Bentley

Sofema Aviation Services (SAS) takes a view on the role of the EASA Cyber Security Framework to address Stakeholder Needs, Legal Basis, and Policies for Collaboration and Information Sharing. Introduction – Stakeholder Needs Stakeholders in the aviation ecosystem include airlines, airports, air navigation service providers (ANSPs), manufacturers, maintenance organizations, and authorities. Their needs within the EASA Cyber Security focus on: Risk Management Identifying Threats: Stakeholders…

Aviation Cyber Security Domain Specific Consideration

read more
Aviation-Cyber- Security

July 14, 2023

Steven Bentley

Sofema Aviation Services (SAS) www.sassofia.com – considers potential exposures across Multiple Aviation Cyber Security Domains Best Practice Considerations Conduct regular risk assessments to identify vulnerabilities and assess potential impacts. Implement a risk management framework that addresses both technical and operational risks specific to the Domain operation. Implement a layered security approach that combines multiple security measures,…