{"id":542,"date":"2019-09-18T10:45:17","date_gmt":"2019-09-18T08:45:17","guid":{"rendered":"https:\/\/www.cyberinflight.com\/?page_id=542"},"modified":"2025-05-19T15:29:21","modified_gmt":"2025-05-19T13:29:21","slug":"products","status":"publish","type":"page","link":"https:\/\/www.cyberinflight.com\/?page_id=542","title":{"rendered":"Aerospace Cybersecurity Market Intelligence report"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"542\" class=\"elementor elementor-542\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-438cd255 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"438cd255\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-63e53089\" data-id=\"63e53089\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-13b14809 elementor-widget elementor-widget-heading\" data-id=\"13b14809\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Aerospace Cybersecurity Market Intelligence Report\n<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-5fb2bb0f\" data-id=\"5fb2bb0f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-588da417 elementor-align-right elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"588da417\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"https:\/\/www.cyberinflight.com\/?page_id=1309\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Order<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2021ddd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2021ddd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-20bac4c\" data-id=\"20bac4c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-252da04 elementor-widget elementor-widget-text-editor\" data-id=\"252da04\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p style=\"text-align: center;\">Order the full report or a specific chapter according to your needs.\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-be4b628 elementor-section-content-middle elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"be4b628\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-7d42016\" data-id=\"7d42016\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71f5bb6 elementor-widget elementor-widget-heading\" data-id=\"71f5bb6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">A strategic decision resource<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b9b002 elementor-widget elementor-widget-text-editor\" data-id=\"1b9b002\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>CyberInflight has released the first edition of its flagship product the &#8220;<strong>Aerospace Cybersecurity Market Intelligence Report<\/strong>&#8221; in<strong> January 2020<\/strong>.\u00a0<\/p><p>This research report brings a <b>fresh perspective on aerospace cybersecurity <\/b>and gathers the information within a single document that aerospace decision-makers can consult any time a specific question arises. The soaring number of attacks requires constant market monitoring. CyberInflight strives to provide the highest-quality deliverables. The use of infographics allows us to show the information in an informative and reader-friendly way for quick referral.<\/p><p>CyberInflight anticipates the profound change happening in the aerospace world. As often stated, aircraft have become nodes of a wider network. Offering more connectivity opens doors to more complexity and potential flaws. After being connected, aircraft now need to be protected. CyberInflight aims to seize this increasing level of complexity and <b>provide aerospace stakeholders a thorough analysis for better decision-making<\/b>.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-afe7758\" data-id=\"afe7758\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ed77eab elementor-widget elementor-widget-image\" data-id=\"ed77eab\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1185\" height=\"666\" src=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/01\/Page-de-garde.png\" class=\"attachment-full size-full wp-image-794\" alt=\"\" srcset=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/01\/Page-de-garde.png 1185w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/01\/Page-de-garde-300x169.png 300w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/01\/Page-de-garde-1024x576.png 1024w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/01\/Page-de-garde-768x432.png 768w\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ebecc45 elementor-section-content-middle elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ebecc45\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-eb86030\" data-id=\"eb86030\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9f15913 elementor-widget elementor-widget-heading\" data-id=\"9f15913\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Order the report<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1267f2 elementor-widget elementor-widget-text-editor\" data-id=\"e1267f2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Aerospace Cybersecurity Market Intelligence Report (Ref. AC2020)<br \/>Publication date: January 2020<br \/>Public price:<br \/>\u00a0 \u00a0User licence: \u20ac4,000*<br \/>\u00a0 \u00a0Enterprise licence: \u20ac7,500*<br \/>Report in PDF format with supporting databases<br \/>Date of publication: January 2020<\/p><p>* Prices are quoted in euros<br \/>* VAT not applicable, art. 293B of the CGI<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-1ea592c\" data-id=\"1ea592c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-03b53ff elementor-widget elementor-widget-image\" data-id=\"03b53ff\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1836\" height=\"716\" src=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/09\/Thumbnails-pic.png\" class=\"attachment-full size-full wp-image-552\" alt=\"\" srcset=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/09\/Thumbnails-pic.png 1836w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/09\/Thumbnails-pic-300x117.png 300w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/09\/Thumbnails-pic-768x300.png 768w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/09\/Thumbnails-pic-1024x399.png 1024w\" sizes=\"100vw\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f989f78 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f989f78\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-0d89eaf\" data-id=\"0d89eaf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c1ffa3b elementor-widget elementor-widget-heading\" data-id=\"c1ffa3b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">   Table of content<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-6f4e2f3\" data-id=\"6f4e2f3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-19d0ebc elementor-widget elementor-widget-text-editor\" data-id=\"19d0ebc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Executive summary (1\/2)<br \/>Executive summary (2\/2)<br \/>Aerospace Cybersecurity Market Outlook<\/p><p><strong>CHAPTER I. INTRODUCTION<\/strong><br \/>Company\u2019s introduction<br \/>Disclaimer<br \/>Introduction (1\/2)<br \/>Introduction (2\/2)<br \/>Macroeconomic perspective (1\/2)<br \/>Macroeconomic perspective (2\/2)<br \/>The cybercrime economy<br \/>Exponential growth of digital traffic<\/p><p><strong>CHAPTER II. CYBERSECURITY OVERVIEW<\/strong><br \/>Cybersecurity principles<br \/>Cyberthreat actors<br \/>Index of cyberthreats<br \/>Major security threats on commercial aviation since 2019 (graph)<br \/>Major security threats on commercial aviation since 2019<\/p><p><strong>CHAPTER III. STRATEGIC ANALYSIS AND FORECAST<\/strong><br \/><strong>SECTION 1. Market Analysis<\/strong><br \/>Introduction<br \/>Value chain and attack surface<br \/>Adoption of cybersecurity<br \/>Oligopoly or bicephalous monopoly<br \/>Drivers of cybersecurity investments<br \/>Market analysis: the airline perspective (1\/2)<br \/>Market analysis: the airline perspective (2\/2)<br \/>Market analysis: the airport perspective (1\/2)<br \/>Market analysis: the airport perspective (2\/2)<br \/>Airport cybersecurity issues timeline<br \/>Airline cybersecurity issues timeline<br \/>Mergers and acquisitions<br \/>Darkweb airline account price index<br \/>French cybersecurity market<br \/>Notable cybersecurity initiatives (Incident simulation \/ bug bounty)<\/p><p><strong>SECTION 2. Market Forecast<\/strong><br \/>Airline budget forecast: top down approach<br \/>Airline budget forecast: split by initiatives<br \/>Airlines: Budget forecast analysis (1\/3)<br \/>Airlines: Budget forecast analysis (2\/3)<br \/>Airlines: Budget forecast graph<br \/>Airlines: Budget forecast analysis (3\/3)<br \/>Airport budget forecast: top down approach<br \/>Airport budget forecast: split by initiatives<br \/>Airport budget forecast analysis<br \/>Three potential scenarios<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-198252f\" data-id=\"198252f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0821ed7 elementor-widget elementor-widget-text-editor\" data-id=\"0821ed7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>CHAPTER IV. STAKEHOLDERS\u2019 PROFILE<\/strong><br \/>Introduction and methodology<br \/>Airbus Cybersecurity <br \/>Airbus Cybersecurity portfolio<br \/>Thales Group<br \/>SITA<br \/>APSYS<br \/>Satcom Direct<br \/>Gogo Business Aviation \/ Panasonic<br \/>Razor Secure \/ VT Miltope<br \/>Sopra Steria<br \/>CCX Technologies<br \/>F-Secure \/ Raytheon<br \/>Honeywell \/ BAE Systems<br \/>IBM \/ CISCO<br \/>Miscellaneous: Boost Aerospace<br \/>Comparative assessment<br \/>Comparative assessment<br \/>Comparative assessment<br \/>Comparative assessment<br \/>Chapter\u2019s conclusion<\/p><p><strong>CHAPTER V. INSTITUTIONAL STAKEHOLDERS<\/strong><br \/>ICAO<br \/>IATA<br \/>CANSO<br \/>CANSO: Cyber Security and Risk Assessment Guide<br \/>EUROCONTROL<br \/>EASA (1\/2)<br \/>EASA (2\/2)<br \/>A-ISAC<br \/>FAA<br \/>ACI \/ Munich Airport<br \/>Qatar CAA \/ French CCTA<br \/>National Cybersecurity Agencies \/ CERTs<\/p><p><strong>CHAPTER VI. CYBERRISK INSURANCE<\/strong><br \/>Insurance: accessing the cyber-risk<br \/>Insurance: accessing the cyber-risk<br \/>Insurance: conventional VS specific cyber-contract<br \/>Insurance: miscellaneous<\/p><p><strong>CHAPTER VII. REGULATIONS, STANDARDS AND METHODS<\/strong><br \/>Introduction to GDPR<br \/>GDPR implementation in aerospace<br \/>ISO\/IEC 27001 family standards<br \/>NIST framework<br \/>NIS directive<br \/>DO-178 family of standards<br \/>Risk assessment methods<\/p><p><strong>CHAPTER VIII. THREAT INTELLIGENCE BOOKLET<\/strong><br \/>Introduction<br \/>Case study \u2013 Airline: Delta Airlines<br \/>Case study \u2013 Airline: Cathay Pacific<br \/>Case study \u2013 Airline: British Airways<br \/>Case study \u2013 Airline<br \/>Case study \u2013 Airline<br \/>Case study \u2013 Provider \/ Regulator<br \/>Case study \u2013 OEM: Airbus<br \/>Case study \u2013 Provider: Altran<br \/>Case study \u2013 Provider : Safran<br \/>Case study \u2013 Miscellaneous : Maersk<br \/>Case study \u2013 Airport<br \/>Case study \u2013 Airport<br \/>Case study \u2013 Airport<br \/>Miscellaneous &#8211; NASA cybersecurity breach<br \/>Miscellaneous &#8211; NASA incident list<br \/>Research study \u2013 IFE hacking<br \/>Research study \u2013 Threats on inflight Wi-Fi<br \/>Research study \u2013 Research on IFC<br \/>Research study \u2013 Research on the 787\u2019s architecture<br \/>Research study \u2013 Other studies<br \/>Research study \u2013 Counterfeit boarding pass<br \/>Research study \u2013 Threats on airport public Wi-Fi<br \/>Conclusions of case-studies<br \/>Conclusions of research cases<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-279063c elementor-section-content-middle elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"279063c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-aff9fca\" data-id=\"aff9fca\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f89beae elementor-widget elementor-widget-heading\" data-id=\"f89beae\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Excerpt available<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0195d4 elementor-widget elementor-widget-text-editor\" data-id=\"f0195d4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Download an extract of the &#8220;Aerospace Cybersecurity Market Intelligence Report&#8221;.<br \/>Click here: <a href=\"https:\/\/www.cyberinflight.com?download=859\" data-wplink-url-error=\"true\">Aerospace Cybersecurity Market Intelligence report Excerpt<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-f55afdf\" data-id=\"f55afdf\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf37e71 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf37e71\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-bf6df9f\" data-id=\"bf6df9f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cf99817 elementor-widget elementor-widget-heading\" data-id=\"cf99817\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Aerospace Cybersecurity Market Intelligence Report\n<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-f58e530\" data-id=\"f58e530\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fb5aa18 elementor-align-right elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"fb5aa18\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"https:\/\/www.cyberinflight.com\/?page_id=1309\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-right\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-angle-double-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Order<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e745606 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e745606\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;shape_divider_bottom&quot;:&quot;arrow&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 700 10\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M360 0L350 9.9 340 0 0 0 0 10 700 10 700 0\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2fbccf4\" data-id=\"2fbccf4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f0d0247 elementor-widget elementor-widget-heading\" data-id=\"f0d0247\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">A unique analytical resource on aerospace cybersecurity<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29b973e elementor-widget elementor-widget-testimonial\" data-id=\"29b973e\" data-element_type=\"widget\" data-widget_type=\"testimonial.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-testimonial-wrapper\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-content\">\"CyberInflight believes that this document is a hands-on and a to-the-point intelligence document meant to be practical and more industry-oriented than any other existing resource.\"<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-testimonial-meta elementor-has-image elementor-testimonial-image-position-top\">\n\t\t\t\t<div class=\"elementor-testimonial-meta-inner\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-image\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"616\" height=\"528\" src=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/09\/temp.jpg\" class=\"attachment-full size-full wp-image-551\" alt=\"\" srcset=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/09\/temp.jpg 616w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2019\/09\/temp-300x257.jpg 300w\" sizes=\"(max-width: 616px) 100vw, 616px\" \/>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-details\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-name\">Florent RIZZO<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial-job\">Founder and CEO of CyberInflight<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Aerospace Cybersecurity Market Intelligence Report Order Order the full report or a specific chapter according to your needs.\u00a0 A strategic decision resource CyberInflight has released the first edition of its flagship product the &#8220;Aerospace Cybersecurity Market Intelligence Report&#8221; in January 2020.\u00a0 This research report brings a fresh perspective on aerospace cybersecurity and gathers the information &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.cyberinflight.com\/?page_id=542\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Aerospace Cybersecurity Market Intelligence report&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-542","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages\/542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=542"}],"version-history":[{"count":145,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages\/542\/revisions"}],"predecessor-version":[{"id":3803,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/pages\/542\/revisions\/3803"}],"wp:attachment":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}