{"id":366,"date":"2019-04-06T10:53:12","date_gmt":"2019-04-06T08:53:12","guid":{"rendered":"http:\/\/www.cyberinflight.com\/?page_id=366"},"modified":"2025-05-12T14:17:46","modified_gmt":"2025-05-12T12:17:46","slug":"market-intelligence","status":"publish","type":"page","link":"https:\/\/www.cyberinflight.com\/?page_id=366","title":{"rendered":"Market Intelligence"},"content":{"rendered":"<h1>Market Intelligence<\/h1>\n\n\n<figure><img decoding=\"async\" src=\"http:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/04\/Orange_Blanc-1024x571.png\" alt=\"\" width=\"103\" height=\"57\" \/><\/figure>\n\n\n\n<p>Each year, CyberInflight publishes its \u201c<strong>Aerospace cybersecurity market intelligence report<\/strong>\u201d on the trending topic of aerospace cybersecurity. The report is based on CyberInflight\u2019s experience in both the aerospace and cybersecurity domains. It contains strategic analysis, business insights, a bird\u2019s-eye view of the complete ecosystem and value-chain with specific focus on key aspects, company profiles, market forecast and accurate answers to the questions aerospace decision makers should keep in mind if they wish to keep their business future-proof, such as the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\n<ul class=\"wp-block-list\">\n<li>How can one define a cyber threat? Who are the different threat actors? How do they operate? How does a cyber threat impact the connectivity value chain?<\/li>\n\n\n\n<li>Who are the main cybersecurity players and what is their strategic positioning?<\/li>\n\n\n\n<li>What are the products and solutions available on the market?<\/li>\n\n\n\n<li>What is the history of cyberattacks in the air industry? How has this market evolved in recent years?<\/li>\n\n\n\n<li>Who are the regulatory entities? How does the regulatory environment work? What is GDPR and how does it impact, with other regulations, the air industry?<\/li>\n\n\n\n<li>How much is the aerospace cybersecurity market worth? How much is being invested by air transportation players in cybersecurity?<\/li>\n\n\n\n<li>How will this industry evolve in the next 5 years? What are the different growth rates that can be applied to this industry? What are the drivers and inhibitors of the market growth?<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>The report brings a <strong>fresh perspective on the nascent aerospace cybersecurity ecosystem<\/strong>. CyberInflight\u2019s research program is based on thorough research and <strong>numerous interviews <\/strong>conducted with major market players, such as the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\n<ul class=\"wp-block-list\">\n<li>Airlines,<\/li>\n\n\n\n<li>Airports,<\/li>\n\n\n\n<li>In-flight connectivity providers,<\/li>\n\n\n\n<li>System providers, hardware and software providers,<\/li>\n\n\n\n<li>Pure cybersecurity players,<\/li>\n\n\n\n<li>Industry and subject matter experts,<\/li>\n\n\n\n<li>Ethical hackers,<\/li>\n\n\n\n<li>and relevant players in the connectivity and cybersecurity value chain.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<figure><img decoding=\"async\" src=\"http:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/04\/Pr\u00e9sentation_Cover-10.jpg\" alt=\"\" \/>\n<figcaption>CyberInflight&#8217;s executive research report<\/figcaption>\n<\/figure>\n\n\n\n<p>CyberInflight is running an <strong>continuous<\/strong> <strong>interview campaign <\/strong>along the year in order to feed its knowledge database, to consolidate its undertanding of the market and to identify trends. CyberInflight ambitions to release <strong>top-end products <\/strong>which content will help aerospace and cybersecurity executives to comprehend the cybersecurity phenomenon and get the required information to make long-term decisions. The report favors the use of plain infographics in order to ease its understanding and readability.<\/p>\n\n\n\n<p>If you are interested in the report and would like to be contacted when the report is officially released, or<strong> if you wish to participate in the interview campaign<\/strong>, please get in touch with us by filling out the following form.<\/p>\n\n\n\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f370-o1\" lang=\"en-US\" dir=\"ltr\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php?rest_route=%2Fwp%2Fv2%2Fpages%2F366#wpcf7-f370-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"370\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"5.7.7\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f370-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/div>\n<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-lastname\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Lastname\" value=\"\" type=\"text\" name=\"your-lastname\" \/><\/span>\n<\/p>\n<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-firstname\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Firstname\" value=\"\" type=\"text\" name=\"your-firstname\" \/><\/span>\n<\/p>\n<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-position\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Position\" value=\"\" type=\"text\" name=\"your-position\" \/><\/span>\n<\/p>\n<p><span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email address\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span>\n<\/p>\n<p><span class=\"wpcf7-form-control-wrap\" data-name=\"checkbox-choice\"><span class=\"wpcf7-form-control wpcf7-checkbox\"><span class=\"wpcf7-list-item first\"><input type=\"checkbox\" name=\"checkbox-choice[]\" value=\"Contact me to participate to the interview campaign\" \/><span class=\"wpcf7-list-item-label\">Contact me to participate to the interview campaign<\/span><\/span><span class=\"wpcf7-list-item last\"><input type=\"checkbox\" name=\"checkbox-choice[]\" value=\"Inform me when the report is out\" \/><span class=\"wpcf7-list-item-label\">Inform me when the report is out<\/span><\/span><\/span><\/span>\n<\/p>\n<p><span class=\"wpcf7-form-control-wrap\" data-name=\"Ack_form_Aeronov\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"Ack_form_Aeronov\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\">I have read and I agree with the <a href=\"http:\/\/www.cyberinflight.com\/?page_id=269\">Privacy Policy<\/a>.<\/span><\/label><\/span><\/span><\/span><br \/>\n<div id=\"cf7sr-69f1dbc894a03\" class=\"cf7sr-g-recaptcha\" data-theme=\"light\" data-type=\"image\" data-size=\"normal\" data-sitekey=\"6LcoB5UUAAAAAJFHbgSyoORY0npmikdG0G420A4W\"><\/div><span class=\"wpcf7-form-control-wrap cf7sr-recaptcha\" data-name=\"cf7sr-recaptcha\"><input type=\"hidden\" name=\"cf7sr-recaptcha\" value=\"\" class=\"wpcf7-form-control\"><\/span>\n<\/p>\n<p><input class=\"wpcf7-form-control has-spinner wpcf7-submit\" type=\"submit\" value=\"Send\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Market Intelligence Each year, CyberInflight publishes its \u201cAerospace cybersecurity market intelligence report\u201d on the trending topic of aerospace cybersecurity. The report is based on CyberInflight\u2019s experience in both the aerospace and cybersecurity domains. It contains strategic analysis, business insights, a bird\u2019s-eye view of the complete ecosystem and value-chain with specific focus on key aspects, company &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.cyberinflight.com\/?page_id=366\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Market Intelligence&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-366","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages\/366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=366"}],"version-history":[{"count":96,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages\/366\/revisions"}],"predecessor-version":[{"id":2030,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages\/366\/revisions\/2030"}],"wp:attachment":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}