{"id":1240,"date":"2020-10-09T11:33:20","date_gmt":"2020-10-09T09:33:20","guid":{"rendered":"https:\/\/www.cyberinflight.com\/?p=1240"},"modified":"2020-10-09T11:33:20","modified_gmt":"2020-10-09T09:33:20","slug":"cyber-regulatory-landscape","status":"publish","type":"post","link":"https:\/\/www.cyberinflight.com\/?p=1240","title":{"rendered":"Cyber-regulatory landscape"},"content":{"rendered":"\n<p>Understanding the current cybersecurity regulatory landscape is difficult, isn&#8217;t it? \ud83d\ude23 In this mind-map, CyberInflight has selected for you publicly available must-reads.<br>Stay tuned as our coming quarterly digest for Q3 will focus on the topic of cyber-regulations in civil aviation. <\/p>\n\n\n\n<figure class=\"wp-block-gallery columns-1 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/10\/Civil-Aviation-Cybersecurity-Regulatory-landscape-1.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"601\" src=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/10\/Civil-Aviation-Cybersecurity-Regulatory-landscape-1-1024x601.png\" alt=\"\" data-id=\"1243\" data-full-url=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/10\/Civil-Aviation-Cybersecurity-Regulatory-landscape-1.png\" data-link=\"https:\/\/www.cyberinflight.com\/?attachment_id=1243\" class=\"wp-image-1243\" srcset=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/10\/Civil-Aviation-Cybersecurity-Regulatory-landscape-1-1024x601.png 1024w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/10\/Civil-Aviation-Cybersecurity-Regulatory-landscape-1-300x176.png 300w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/10\/Civil-Aviation-Cybersecurity-Regulatory-landscape-1-768x451.png 768w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/10\/Civil-Aviation-Cybersecurity-Regulatory-landscape-1-1536x902.png 1536w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/10\/Civil-Aviation-Cybersecurity-Regulatory-landscape-1-2048x1203.png 2048w\" sizes=\"(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/a><figcaption class=\"blocks-gallery-item__caption\">Current cyber-regulatory landscape for civil aviation<\/figcaption><\/figure><\/li><\/ul><\/figure>\n\n\n\n<p>Note that in this mind-map some branches have been folded. The exhaustive resource will be made available soon to the readers of our quarterly digest\/.<\/p>\n\n\n\n<p>Also, a &#8220;download section&#8221; on our website will soon be available to get access to high-res resources.\ud83d\udc4d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Understanding the current cybersecurity regulatory landscape is difficult, isn&#8217;t it? \ud83d\ude23 In this mind-map, CyberInflight has selected for you publicly available must-reads.Stay tuned as our coming quarterly digest for Q3 will focus on the topic of cyber-regulations in civil aviation. Note that in this mind-map some branches have been folded. The exhaustive resource will be &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.cyberinflight.com\/?p=1240\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Cyber-regulatory landscape&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1240","post","type-post","status-publish","format-standard","hentry","category-non-classe"],"_links":{"self":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/posts\/1240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1240"}],"version-history":[{"count":3,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/posts\/1240\/revisions"}],"predecessor-version":[{"id":1245,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/posts\/1240\/revisions\/1245"}],"wp:attachment":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}