{"id":1309,"date":"2020-12-09T14:24:51","date_gmt":"2020-12-09T13:24:51","guid":{"rendered":"https:\/\/www.cyberinflight.com\/?page_id=1309"},"modified":"2020-12-10T08:59:15","modified_gmt":"2020-12-10T07:59:15","slug":"order-by-chapter","status":"publish","type":"page","link":"https:\/\/www.cyberinflight.com\/?page_id=1309","title":{"rendered":"Order by chapter"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1309\" class=\"elementor elementor-1309\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ce918b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ce918b8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4386d83\" data-id=\"4386d83\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-732383f elementor-widget elementor-widget-heading\" data-id=\"732383f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Order form<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ee42808 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ee42808\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e49d95c\" data-id=\"e49d95c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e4a77e5 elementor-widget elementor-widget-text-editor\" data-id=\"e4a77e5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tYou can order one of CyberInflight&#8217;s market research product by filling the following form. You will then be contacted by CyberInflight by email to proceed further. \nGet in touch with us if you have any question: <br><a href=\"mailto:contact@cyberinflight.com\">contact@cyberinflight.com<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4fa9411\" data-id=\"4fa9411\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-380b0c0 elementor-widget elementor-widget-image\" data-id=\"380b0c0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"167\" src=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/03\/Orange_Blanc-300x167.png\" class=\"attachment-medium size-medium wp-image-345\" alt=\"\" srcset=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/03\/Orange_Blanc-300x167.png 300w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/03\/Orange_Blanc-768x429.png 768w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/03\/Orange_Blanc-1024x571.png 1024w\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cbae97f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cbae97f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-87a09d5\" data-id=\"87a09d5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-117837e elementor-widget elementor-widget-shortcode\" data-id=\"117837e\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-shortcode\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1304-o1\" lang=\"en-US\" dir=\"ltr\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php?rest_route=%2Fwp%2Fv2%2Fpages%2F1309#wpcf7-f1304-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"1304\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"5.7.7\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1304-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/div>\n<p>Please type your email address so we can address you the final estimate:<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email\" id=\"fn\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email address*\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-company\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" id=\"fn\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Company*\" value=\"\" type=\"text\" name=\"your-company\" \/><\/span>\n<\/p>\n<p><label>Choose a product:<\/label><span class=\"wpcf7-form-control-wrap\" data-name=\"menu-product\"><select class=\"wpcf7-form-control wpcf7-select\" id=\"fn\" aria-invalid=\"false\" name=\"menu-product\"><option value=\"Aerospace Cybersecurity Market Intelligence Report, Ed.2020\">Aerospace Cybersecurity Market Intelligence Report, Ed.2020<\/option><option value=\"Quarterly Digest Service\">Quarterly Digest Service<\/option><\/select><\/span>\n<\/p>\n<p><label>Choose a licence agreement <span style=\"font-weight:normal\"><a href=\"https:\/\/www.cyberinflight.com?download=1335\"><i>\n\t\t\t\t\t<font size=\"2\">(download licence agreement)\n\t\t\t\t\t<\/font><\/i><\/a>:<\/span><\/label><span class=\"wpcf7-form-control-wrap\" data-name=\"menu_licence\"><select class=\"wpcf7-form-control wpcf7-select\" id=\"fn\" aria-invalid=\"false\" name=\"menu_licence\"><option value=\"User Licence\">User Licence<\/option><option value=\"Company Licence\">Company Licence<\/option><\/select><\/span>\n<\/p>\n<p>[group QUARTER]<br \/>\n<label>Quarterly Digest Services:<br \/>\n<span style=\"font-weight:normal\">Customers will receive a digest every quarter + the digests which have already been published.<\/span><\/label><br \/>\n[group STANDARD]<br \/>\nUser Licence: &nbsp;&nbsp;&nbsp;&nbsp; \u20ac 800<br \/>\n[\/group]<br \/>\n[group ENTERPRISE]<br \/>\nEnterprise Licence: &nbsp;&nbsp;&nbsp;&nbsp; \u20ac 1,500<br \/>\n[\/group]<br \/>\n[\/group]\n<\/p>\n<p>[group REPORT]<br \/>\n<label>Aerospace Cybersecurity strategic market report:<\/label><span style=\"font-weight:normal\">Would you like the full report or to pick specific chapters:<span class=\"wpcf7-form-control-wrap\" data-name=\"menu_report\"><select class=\"wpcf7-form-control wpcf7-select\" id=\"fn\" aria-invalid=\"false\" name=\"menu_report\"><option value=\"Full\">Full<\/option><option value=\"Chapters\">Chapters<\/option><\/select><\/span><br \/>\n[group FULL]<br \/>\n[group STANDARD]<br \/>\nUser Licence: &nbsp;&nbsp;&nbsp;&nbsp; \u20ac 4,000<br \/>\n[\/group]<br \/>\n[group ENTERPRISE]<br \/>\nEnterprise Licence: &nbsp;&nbsp;&nbsp;&nbsp; \u20ac 7,500<br \/>\n[\/group]<br \/>\n[\/group]<br \/>\n[group CHAPTER]<br \/>\n[group STANDARD]<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"chapt_0\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"chapt_0\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">Executive summary and outlook&nbsp;(240\u20ac) <\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"chapt_1\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"chapt_1\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">Chapter I. Introduction&nbsp;(350\u20ac)<\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"chapt_2\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"chapt_2\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">Chapter II. Cybersecurity overview&nbsp;(240\u20ac)<\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"chapt_3\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"chapt_3\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">Chapter III. Strategic analysis, trends and forecast&nbsp;(1080\u20ac)<\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n<span style=\"font-weight:normal\">Chapter IV. Stakeholders' profile:<br \/>\n&emsp;&emsp;<span class=\"wpcf7-form-control-wrap\" data-name=\"chapt_4\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"chapt_4\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">a. corporate players&nbsp;(850\u20ac)<\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n&emsp;&emsp;<span class=\"wpcf7-form-control-wrap\" data-name=\"chapt_4-1\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"chapt_4-1\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">b. institutional players&nbsp;(500\u20ac)<\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"chapt_5\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"chapt_5\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">Chapter V. Cyberrisk insurance&nbsp;(200\u20ac)<\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"chapt_6\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"chapt_6\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">Chapter VI. Regulations, Standards and methods&nbsp;(310\u20ac)<\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"chapt_7\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"chapt_7\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">Chapter VII. Threat Intelligence Booklet&nbsp;(1160\u20ac)<\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n[\/group]<br \/>\n[group ENTERPRISE]<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"chapt_0\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"chapt_0\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">Executive summary and outlook&nbsp;(430\u20ac) <\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"chapt_1\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"chapt_1\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">Chapter I. Introduction&nbsp;(640\u20ac)<\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"chapt_2\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"chapt_2\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">Chapter II. Cybersecurity overview&nbsp;(430\u20ac)<\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"chapt_3\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"chapt_3\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">Chapter III. Strategic analysis, trends and forecast&nbsp;(1990\u20ac)<\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n<span style=\"font-weight:normal\">Chapter IV. Stakeholders' profile:<br \/>\n&emsp;&emsp;<span class=\"wpcf7-form-control-wrap\" data-name=\"chapt_4\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"chapt_4\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">a. corporate players&nbsp;(1560\u20ac)<\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n&emsp;&emsp;<span class=\"wpcf7-form-control-wrap\" data-name=\"chapt_4-1\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"chapt_4-1\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">b. institutional players&nbsp;(930\u20ac)<\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"chapt_5\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"chapt_5\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">Chapter V. Cyberrisk insurance&nbsp;(360\u20ac)<\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"chapt_6\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"chapt_6\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">Chapter VI. Regulations, Standards and methods&nbsp;(570\u20ac)<\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"chapt_7\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"chapt_7\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">Chapter VII. Threat Intelligence Booklet&nbsp;(2130\u20ac)<\/a><\/span><\/label><\/span><\/span><\/span><br \/>\n[\/group]<br \/>\n[\/group]<br \/>\n[\/group]<br \/>\n<i>\n\t\t\t\t\t<font size=\"2\">Prices are quoted in Euros (\u20ac) and are net of taxes.\nVAT not applicable, art. 293B of the CGI.\n\t\t\t\t\t<\/font><\/i><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"ack_interview\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"ack_interview\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">I would like to participate to the interview (discount for interviewee)<\/a>.<\/span><\/label><\/span><\/span><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"ack_CGV\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"ack_CGV\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">I have read and accept the <\/span><a href=\"https:\/\/www.cyberinflight.com\/?page_id=680\">General Terms and Conditions<\/a>.<\/span><\/label><\/span><\/span><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"ack_pp\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"ack_pp\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><span style=\"font-weight:normal\">I have read and accept the <\/span><a href=\"http:\/\/www.cyberinflight.com\/?page_id=269\">Privacy Policy<\/a>.<\/span><\/label><\/span><\/span><\/span><br \/>\n<div id=\"cf7sr-69e4832c49091\" class=\"cf7sr-g-recaptcha\" data-theme=\"light\" data-type=\"image\" data-size=\"normal\" data-sitekey=\"6LcoB5UUAAAAAJFHbgSyoORY0npmikdG0G420A4W\"><\/div><span class=\"wpcf7-form-control-wrap cf7sr-recaptcha\" data-name=\"cf7sr-recaptcha\"><input type=\"hidden\" name=\"cf7sr-recaptcha\" value=\"\" class=\"wpcf7-form-control\"><\/span><br \/>\n<input class=\"wpcf7-form-control has-spinner wpcf7-submit\" type=\"submit\" value=\"Send\" \/><\/span><\/span><\/span>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b6e9abe\" data-id=\"b6e9abe\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2570ecf elementor-widget elementor-widget-text-editor\" data-id=\"2570ecf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p style=\"text-align: center;\"><strong>Aerospace Cybersecurity Market Intel. Report Ed.2020<\/strong><\/p><p style=\"text-align: center;\"><strong>Table of Content<\/strong><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e19860b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e19860b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8cdc25f\" data-id=\"8cdc25f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-06cf21e elementor-widget elementor-widget-text-editor\" data-id=\"06cf21e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p style=\"font-size: 11px; text-align: start;\">Executive summary (1\/2)<br \/>Executive summary (2\/2)<br \/>Aerospace Cybersecurity Market Outlook<\/p><p style=\"font-size: 11px; text-align: start;\"><span style=\"font-weight: bold;\">CHAPTER I. INTRODUCTION<\/span><br \/>Company\u2019s introduction<br \/>Disclaimer<br \/>Introduction (1\/2)<br \/>Introduction (2\/2)<br \/>Macroeconomic perspective (1\/2)<br \/>Macroeconomic perspective (2\/2)<br \/>The cybercrime economy<br \/>Exponential growth of digital traffic<\/p><p style=\"font-size: 11px; text-align: start;\"><span style=\"font-weight: bold;\">CHAPTER II. CYBERSECURITY OVERVIEW<\/span><br \/>Cybersecurity principles<br \/>Cyberthreat actors<br \/>Index of cyberthreats<br \/>Major security threats on commercial aviation since 2019 (graph)<br \/>Major security threats on commercial aviation since 2019<\/p><p style=\"font-size: 11px; text-align: start;\"><span style=\"font-weight: bold;\">CHAPTER III. STRATEGIC ANALYSIS AND FORECAST<\/span><br \/><span style=\"font-weight: bold;\">SECTION 1. Market Analysis<\/span><br \/>Introduction<br \/>Value chain and attack surface<br \/>Adoption of cybersecurity<br \/>Oligopoly or bicephalous monopoly<br \/>Drivers of cybersecurity investments<br \/>Market analysis: the airline perspective (1\/2)<br \/>Market analysis: the airline perspective (2\/2)<br \/>Market analysis: the airport perspective (1\/2)<br \/>Market analysis: the airport perspective (2\/2)<br \/>Airport cybersecurity issues timeline<br \/>Airline cybersecurity issues timeline<br \/>Mergers and acquisitions<br \/>Darkweb airline account price index<br \/>French cybersecurity market<br \/>Notable cybersecurity initiatives (Incident simulation \/ bug bounty)<\/p><p style=\"font-size: 11px; text-align: start;\"><span style=\"font-weight: bold;\">SECTION 2. Market Forecast<\/span><br \/>Airline budget forecast: top down approach<br \/>Airline budget forecast: split by initiatives<br \/>Airlines: Budget forecast analysis (1\/3)<br \/>Airlines: Budget forecast analysis (2\/3)<br \/>Airlines: Budget forecast graph<br \/>Airlines: Budget forecast analysis (3\/3)<br \/>Airport budget forecast: top down approach<br \/>Airport budget forecast: split by initiatives<br \/>Airport budget forecast analysis<br \/>Three potential scenarios<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d4ef6d7\" data-id=\"d4ef6d7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6bb61a9 elementor-widget elementor-widget-text-editor\" data-id=\"6bb61a9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p style=\"font-size: 11px; text-align: start;\"><span style=\"font-weight: 700;\">CHAPTER IV. STAKEHOLDERS\u2019 PROFILE<\/span><br>Introduction and methodology<br>Airbus Cybersecurity&nbsp;<br>Airbus Cybersecurity portfolio<br>Thales Group<br>SITA<br>APSYS<br>Satcom Direct<br>Gogo Business Aviation \/ Panasonic<br>Razor Secure \/ VT Miltope<br>Sopra Steria<br>CCX Technologies<br>F-Secure \/ Raytheon<br>Honeywell \/ BAE Systems<br>IBM \/ CISCO<br>Miscellaneous: Boost Aerospace<br>Comparative assessment<br>Comparative assessment<br>Comparative assessment<br>Comparative assessment<br>Chapter\u2019s conclusion<\/p><p style=\"font-size: 11px; text-align: start;\"><span style=\"font-weight: 700;\">CHAPTER V. INSTITUTIONAL STAKEHOLDERS<\/span><br>ICAO<br>IATA<br>CANSO<br>CANSO: Cyber Security and Risk Assessment Guide<br>EUROCONTROL<br>EASA (1\/2)<br>EASA (2\/2)<br>A-ISAC<br>FAA<br>ACI \/ Munich Airport<br>Qatar CAA \/ French CCTA<br>National Cybersecurity Agencies \/ CERTs<\/p><p style=\"font-size: 11px; text-align: start;\"><span style=\"font-weight: 700;\">CHAPTER VI. CYBERRISK INSURANCE<\/span><br>Insurance: accessing the cyber-risk<br>Insurance: accessing the cyber-risk<br>Insurance: conventional VS specific cyber-contract<br>Insurance: miscellaneous<\/p><p style=\"font-size: 11px; text-align: start;\"><span style=\"font-weight: 700;\">CHAPTER VII. REGULATIONS, STANDARDS AND METHODS<\/span><br>Introduction to GDPR<br>GDPR implementation in aerospace<br>ISO\/IEC 27001 family standards<br>NIST framework<br>NIS directive<br>DO-178 family of standards<br>Risk assessment methods<\/p><p style=\"font-size: 11px; text-align: start;\"><span style=\"font-weight: 700;\">CHAPTER VIII. THREAT INTELLIGENCE BOOKLET<\/span><br>Introduction<br>Case study \u2013 Airline: Delta Airlines<br>Case study \u2013 Airline: Cathay Pacific<br>Case study \u2013 Airline: British Airways<br>Case study \u2013 Airline<br>Case study \u2013 Airline<br>Case study \u2013 Provider \/ Regulator<br>Case study \u2013 OEM: Airbus<br>Case study \u2013 Provider: Altran<br>Case study \u2013 Provider : Safran<br>Case study \u2013 Miscellaneous : Maersk<br>Case study \u2013 Airport<br>Case study \u2013 Airport<br>Case study \u2013 Airport<br>Miscellaneous &#8211; NASA cybersecurity breach<br>Miscellaneous &#8211; NASA incident list<br>Research study \u2013 IFE hacking<br>Research study \u2013 Threats on inflight Wi-Fi<br>Research study \u2013 Research on IFC<br>Research study \u2013 Research on the 787\u2019s architecture<br>Research study \u2013 Other studies<br>Research study \u2013 Counterfeit boarding pass<br>Research study \u2013 Threats on airport public Wi-Fi<br>Conclusions of case-studies<br>Conclusions of research cases<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Order form You can order one of CyberInflight&#8217;s market research product by filling the following form. You will then be contacted by CyberInflight by email to proceed further. Get in touch with us if you have any question: contact@cyberinflight.com Aerospace Cybersecurity Market Intel. Report Ed.2020 Table of Content Executive summary (1\/2)Executive summary (2\/2)Aerospace Cybersecurity Market &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.cyberinflight.com\/?page_id=1309\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Order by chapter&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1309","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages\/1309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1309"}],"version-history":[{"count":16,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages\/1309\/revisions"}],"predecessor-version":[{"id":1432,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages\/1309\/revisions\/1432"}],"wp:attachment":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}