advanced-menu-icon

Cybersecurity: Building a Cyber Security Incident Response Team

For organizations of all sizes, cyber attacks are not a matter of if, but when. Given that an organization is going to experience security incidents, attacks and even breaches, a cyber incident response team and plan is critical. 

Read the blog

Cybersecurity: Profile, Roles & Competencies for the CSIRT Team Leader

As the cyber-threat landscape evolves and data breaches become more common, incident response becomes more critical than ever for any company. A CSIRT (Computer Security Incident Response Team) is a body of people assigned with the responsibility of responding to and minimizing the impact of any incidents that affect the organization. This team requires a strong and versatile leader.

Read the blog

Cybersecurity: Setting up an Incident Response Team And Selecting the Team Leader

When it comes to incident response, the quicker a business deals with the threat, the better. It’s not just about being able to respond in a timely manner, it’s also about having the right persons and plan in place to deal with the event effectively.

Read the blog

Evolving Cybersecurity Landscape in ATM: From Infrastructure to Human-Centric Focus

This article explores the general transformation of cybersecurity, shifting from conventional infrastructure to a human-centric approach. Applied to Air Traffic Management these new trends are catering to ATM and the role of Air Traffic Safety Electronic Personnel (ATSEP).

Read the blog

Integrating CSIRT into ATSEP Structure: Achieving Optimal Incident Response for ANSPs

As Air Navigation Service Providers (ANSPs) and regulators seek to bolster their cybersecurity defenses, the debate over whether to include a Computer Security Incident Response Team (CSIRT) within the Air Traffic Safety Electronics Personnel (ATSEP) structure or as part of an IT team remains ongoing.

Read the blog

Introducing The ‘Cyber Security For Airworthiness (CSA) Regulation’ For Military Air Systems

To combat the threats of cyber attacks on military air systems, the British Ministry of Defence has introduced a new regulation to assess and mitigate possible impacts on air safety. This regulation can prove to be a valuable guideline for the assessment and improvement of cyber-resilience of military air-systems, extending its significance not only within the UK but also across international borders.

Read the blog

Cyber-Security in Air Traffic Management: Understanding the Power of the Cyber-Security Stack

In the rapidly evolving landscape of cybersecurity, Air Navigation Service Providers and Airports face an ongoing battle against sophisticated threats. To safeguard sensitive data and ensure business continuity, an effective security strategy is important. At the heart of this strategy lies the security stack, a layered approach that fortifies the digital infrastructure against a wide array of cyber threats. In this article, we embark on a journey to explore the intricacies of the security stack, its components, and their vital role in investigating cyber incidents.

Read the blog

ATSEP, Hosting and Schrems II: Ensuring Data Protection in Remote Air Traffic Control and Virtualization

In the context of remote air traffic control operations and service virtualization, legal considerations regarding data sovereignty and data regionality come into play.

Read the blog

EUROCONTROL’s Website Attack And Ongoing Cybersecurity Implications

A distributed denial-of-service (DDoS) attack on Eurocontrol's website has serious consequences, with the potential to disrupt air traffic control across Europe.

Read the blog