{"id":4123,"date":"2025-12-11T00:50:37","date_gmt":"2025-12-11T00:50:37","guid":{"rendered":"https:\/\/phishia.fr\/?p=4123"},"modified":"2025-12-11T00:50:38","modified_gmt":"2025-12-11T00:50:38","slug":"the-domino-effect-of-cyber-why-leasa-and-part-is-force-you-to-monitor-your-suppliers","status":"publish","type":"post","link":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/the-domino-effect-of-cyber-why-leasa-and-part-is-force-you-to-monitor-your-suppliers\/","title":{"rendered":"The Domino Effect of Cyber. Why EASA and Part IS require you to monitor your suppliers."},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4123\" class=\"elementor elementor-4123\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-13aeb1d e-flex e-con-boxed e-con e-parent\" data-id=\"13aeb1d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-96ee59f elementor-widget elementor-widget-text-editor\" data-id=\"96ee59f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Aeronautics is a model of reliability, security and traceability. Yet it has become a prime target for cybercriminals, not by striking at the major airlines or manufacturers, but by targeting the link reputed to be the weakest: <strong>supply chain<\/strong>.<\/p><p>It's no longer your safety that's at stake, but that of the entire system, as required by the new European directives.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ae70605 e-con-full e-flex e-con e-child\" data-id=\"ae70605\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57e0aad elementor-widget elementor-widget-heading\" data-id=\"57e0aad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The new risk perimeter: From internal to ecosystem<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c12b3a elementor-widget elementor-widget-text-editor\" data-id=\"2c12b3a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An attack by <em>Supply Chain<\/em> occurs when a hacker exploits the vulnerability of a supplier, often smaller and less secure, to reach the final customer (aircraft manufacturer or operator).<\/p><p><strong>Why is the Aero sector so vulnerable to this domino effect?<\/strong><\/p><ol><li><strong>Privileged trust :<\/strong> Suppliers have privileged access to customer information systems (drawing exchange platforms, maintenance software, critical parts databases).<\/li><li><strong>Regulations :<\/strong> The new requirements of the European Aviation Safety Agency (EASA), notably the <strong>IS share<\/strong>, require operators to ensure the safety of their products. <em>ecosystem<\/em>. A supplier's negligence can now result in sanctions and suspension of operations for the end customer.<\/li><\/ol><p>This is a legal obligation of vigilance that extends to all players in the chain.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8d5c59e e-con-full e-flex e-con e-child\" data-id=\"8d5c59e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ea6b9f elementor-widget elementor-widget-heading\" data-id=\"5ea6b9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The threat of Lateral Intrusion<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-979a5e8 elementor-widget elementor-widget-text-editor\" data-id=\"979a5e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The risk is no longer limited to data theft (as was the case with the <em><a href=\"https:\/\/phishia.fr\/en\/blog\/monitoring\/your-password-is-worth-10-the-underground-economy-of-stealer-logs\/\"><strong><u>Stealer Logs<\/u><\/strong><\/a><\/em><u>)<\/u>. In the supply chain, it's a lateral intrusion :<\/p><ul><li><strong>Compromise:<\/strong> A subcontractor (e.g. a fleet management software publisher) is hacked via a forgotten access or a simple vulnerability.<\/li><li><strong>Propagation :<\/strong> The hacker then uses the subcontractor's legitimate access to inject malicious code or exfiltrate critical data from all its customers simultaneously.<\/li><li><strong>Consequence:<\/strong> Stopping production lines, modifying technical documentation, or paralyzing a navigation system.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77a1af7 elementor-widget elementor-widget-image\" data-id=\"77a1af7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"164\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-3-300x164.png\" class=\"attachment-medium size-medium wp-image-4125\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-3-300x164.png 300w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-3-18x10.png 18w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-3.png 564w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ca262dd e-con-full e-flex e-con e-child\" data-id=\"ca262dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d33dc4 elementor-widget elementor-widget-heading\" data-id=\"6d33dc4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CTI at the service of aeronautical resilience<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f7a6db elementor-widget elementor-widget-text-editor\" data-id=\"7f7a6db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Faced with this systemic threat and the imperatives of compliance (Part IS), Cyber Threat Intelligence is becoming an indispensable audit and resilience tool.<\/p><p>Visit <strong>CTI Phishia<\/strong> allows you to adopt a strategy of <em>extended surveillance<\/em> :<\/p><ul><li><strong>Third-party monitoring :<\/strong> We're not just looking to see if <em>your<\/em> identifiers are on the Dark Web, but also those of your strategic suppliers mentioned in your documentation.<\/li><li><strong>Early detection :<\/strong> Locate groups of pirates (e.g. <em>Initial Access Brokers<\/em> IAB) which target IT systems in aeronautics and industry.<\/li><li><strong>Proactive Compliance :<\/strong> Provide the proof of vigilance needed to meet the increased regulatory requirements of EASA and Part IS.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0cfcc0e elementor-widget elementor-widget-image\" data-id=\"0cfcc0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"634\" height=\"272\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-4.png\" class=\"attachment-large size-large wp-image-4126\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-4.png 634w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-4-300x129.png 300w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-4-18x8.png 18w\" sizes=\"(max-width: 634px) 100vw, 634px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-233fb75 e-con-full e-flex e-con e-child\" data-id=\"233fb75\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7bc3a38 elementor-widget elementor-widget-heading\" data-id=\"7bc3a38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Partnership beyond the perimeter<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5bf8df elementor-widget elementor-widget-text-editor\" data-id=\"a5bf8df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For players in the aeronautics industry, CTI is not a cost, but an investment in the future. <em>operational continuity<\/em> and the <em>regulatory compliance<\/em>. Phishia gives you the visibility you need to identify and neutralize these risks before they paralyze an entire industry.<\/p><p>Whether you're a major client concerned with compliance <strong>IS share<\/strong>, or a critical supplier who must guarantee the highest level of safety, our <strong>CTI Classic offer<\/strong> is your ongoing assurance of the integrity of your ecosystem.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1da6298 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1da6298\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/phishia.fr\/en\/monitoring\/cti\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Guarantee the compliance and integrity of your supply chain with Phishia CTI<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Aeronautics is a model of reliability, security and traceability. Yet it has become a prime target for cybercriminals, not by striking at major airlines or manufacturers, but by targeting the link reputed to be the weakest: the supply chain. It's no longer your security that's [...]<\/p>","protected":false},"author":5,"featured_media":4133,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[22,24],"tags":[26],"class_list":["post-4123","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pilotage-conformite","category-surveillance","tag-aeronautique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>L&#039;Effet Domino de la Cyber. Pourquoi l&#039;EASA et la Part IS vous obligent \u00e0 surveiller vos fournisseurs. - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/the-domino-effect-of-cyber-why-leasa-and-part-is-force-you-to-monitor-your-suppliers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L&#039;Effet Domino de la Cyber. Pourquoi l&#039;EASA et la Part IS vous obligent \u00e0 surveiller vos fournisseurs. - Phishia\" \/>\n<meta property=\"og:description\" content=\"L&rsquo;a\u00e9ronautique est un mod\u00e8le de fiabilit\u00e9, de s\u00e9curit\u00e9 et de tra\u00e7abilit\u00e9. Pourtant, elle est devenue une cible de choix pour les cybercriminels, non pas en frappant les grandes compagnies a\u00e9riennes ou les constructeurs, mais en visant le maillon r\u00e9put\u00e9 le plus faible : la cha\u00eene d&rsquo;approvisionnement (Supply Chain). Ce n&rsquo;est plus votre s\u00e9curit\u00e9 qui est [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/en\/blog\/compliance-management\/the-domino-effect-of-cyber-why-leasa-and-part-is-force-you-to-monitor-your-suppliers\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-11T00:50:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-11T00:50:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/EASA_Headquarters_-_EASA_Direktion.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1328\" \/>\n\t<meta property=\"og:image:height\" content=\"747\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Erwann Barre\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erwann Barre\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/\"},\"author\":{\"name\":\"Erwann Barre\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/f2ed7a4647e03c3f636ce8145f3d1e5d\"},\"headline\":\"L&rsquo;Effet Domino de la Cyber. Pourquoi l&rsquo;EASA et la Part IS vous obligent \u00e0 surveiller vos fournisseurs.\",\"datePublished\":\"2025-12-11T00:50:37+00:00\",\"dateModified\":\"2025-12-11T00:50:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/\"},\"wordCount\":636,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/EASA_Headquarters_-_EASA_Direktion.jpg\",\"keywords\":[\"A\u00e9ronautique\"],\"articleSection\":[\"Pilotage et conformit\u00e9\",\"Surveillance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/\",\"name\":\"L'Effet Domino de la Cyber. Pourquoi l'EASA et la Part IS vous obligent \u00e0 surveiller vos fournisseurs. - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/EASA_Headquarters_-_EASA_Direktion.jpg\",\"datePublished\":\"2025-12-11T00:50:37+00:00\",\"dateModified\":\"2025-12-11T00:50:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/EASA_Headquarters_-_EASA_Direktion.jpg\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/EASA_Headquarters_-_EASA_Direktion.jpg\",\"width\":1328,\"height\":747},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pilotage et conformit\u00e9\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/pilotage-conformite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"L&rsquo;Effet Domino de la Cyber. Pourquoi l&rsquo;EASA et la Part IS vous obligent \u00e0 surveiller vos fournisseurs.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/f2ed7a4647e03c3f636ce8145f3d1e5d\",\"name\":\"Erwann Barre\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Domino Effect of Cyber. Why EASA and Part IS require you to monitor your suppliers. - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/the-domino-effect-of-cyber-why-leasa-and-part-is-force-you-to-monitor-your-suppliers\/","og_locale":"en_US","og_type":"article","og_title":"L'Effet Domino de la Cyber. Pourquoi l'EASA et la Part IS vous obligent \u00e0 surveiller vos fournisseurs. - Phishia","og_description":"L&rsquo;a\u00e9ronautique est un mod\u00e8le de fiabilit\u00e9, de s\u00e9curit\u00e9 et de tra\u00e7abilit\u00e9. Pourtant, elle est devenue une cible de choix pour les cybercriminels, non pas en frappant les grandes compagnies a\u00e9riennes ou les constructeurs, mais en visant le maillon r\u00e9put\u00e9 le plus faible : la cha\u00eene d&rsquo;approvisionnement (Supply Chain). Ce n&rsquo;est plus votre s\u00e9curit\u00e9 qui est [&hellip;]","og_url":"https:\/\/phishia.fr\/en\/blog\/compliance-management\/the-domino-effect-of-cyber-why-leasa-and-part-is-force-you-to-monitor-your-suppliers\/","og_site_name":"Phishia","article_published_time":"2025-12-11T00:50:37+00:00","article_modified_time":"2025-12-11T00:50:38+00:00","og_image":[{"width":1328,"height":747,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/EASA_Headquarters_-_EASA_Direktion.jpg","type":"image\/jpeg"}],"author":"Erwann Barre","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Erwann Barre","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/"},"author":{"name":"Erwann Barre","@id":"https:\/\/phishia.fr\/#\/schema\/person\/f2ed7a4647e03c3f636ce8145f3d1e5d"},"headline":"L&rsquo;Effet Domino de la Cyber. Pourquoi l&rsquo;EASA et la Part IS vous obligent \u00e0 surveiller vos fournisseurs.","datePublished":"2025-12-11T00:50:37+00:00","dateModified":"2025-12-11T00:50:38+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/"},"wordCount":636,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/EASA_Headquarters_-_EASA_Direktion.jpg","keywords":["A\u00e9ronautique"],"articleSection":["Pilotage et conformit\u00e9","Surveillance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/","url":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/","name":"The Domino Effect of Cyber. Why EASA and Part IS require you to monitor your suppliers. - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/EASA_Headquarters_-_EASA_Direktion.jpg","datePublished":"2025-12-11T00:50:37+00:00","dateModified":"2025-12-11T00:50:38+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/EASA_Headquarters_-_EASA_Direktion.jpg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/EASA_Headquarters_-_EASA_Direktion.jpg","width":1328,"height":747},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Pilotage et conformit\u00e9","item":"https:\/\/phishia.fr\/blog\/category\/pilotage-conformite\/"},{"@type":"ListItem","position":3,"name":"L&rsquo;Effet Domino de la Cyber. Pourquoi l&rsquo;EASA et la Part IS vous obligent \u00e0 surveiller vos fournisseurs."}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT Consulting, Cybersecurity, Sustainability","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/f2ed7a4647e03c3f636ce8145f3d1e5d","name":"Erwann Barre"}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/4123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/comments?post=4123"}],"version-history":[{"count":7,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/4123\/revisions"}],"predecessor-version":[{"id":4132,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/posts\/4123\/revisions\/4132"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media\/4133"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/media?parent=4123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/categories?post=4123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/en\/wp-json\/wp\/v2\/tags?post=4123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}