Summary of "Re(vivez) le webinaire Partie-IS de la DSAC et OSAC !"

Summary of the Webinar on Part-IS of DSAC and OSAC

This webinar focused on the implementation, compliance, and monitoring of the European aviation cybersecurity regulation known as Part S, which integrates cybersecurity as an evolution of existing aviation management systems. The session brought together key stakeholders from organizations responsible for various aviation approvals including EROPS, aircrew training, CAMO, Part 145 maintenance, and Part 21J production.


Main Ideas and Concepts


Detailed Methodology / Instructions Presented

  1. Organizational Setup and Roles
    • Identify and appoint key personnel:
      • Responsible Manager / Executive
      • Common Responsible Person (for groups)
      • Part S Implementation Manager
      • Compliance Manager (ideally combined with existing roles)
    • Ensure these roles have appropriate authority and independence.
  2. Policy and Commitment
    • Integrate cybersecurity into existing security policies.
    • Obtain formal commitment from top management.
    • Reflect cybersecurity in organizational manuals and management system documents.
  3. Incident Management
    • Set up reporting systems for cybersecurity events and incidents.
    • Integrate incident response into crisis management plans.
    • Define detection, reaction, and recovery procedures.
  4. Risk Management
    • Use established risk management processes adapted for cybersecurity.
    • Focus on likelihood of cyberattacks and system vulnerabilities.
    • Prioritize and treat risks with designated action leaders.
  5. Compliance Monitoring
    • Develop a monitoring plan combining Part S with existing compliance frameworks.
    • Maintain independence of compliance assurance functions.
    • Monitor effectiveness and corrective actions.
  6. Change Management
    • Define changes subject to authority approval and those that are not.
    • Integrate cybersecurity risk analysis into all changes affecting information systems.
    • Capitalize on existing change management procedures.
  7. Exemption Process
    • Use the Cyber Risk Exposure

Category ?

Educational

Share this summary

Video