{"id":4123,"date":"2025-12-11T00:50:37","date_gmt":"2025-12-11T00:50:37","guid":{"rendered":"https:\/\/phishia.fr\/?p=4123"},"modified":"2025-12-11T00:50:38","modified_gmt":"2025-12-11T00:50:38","slug":"leffetto-domino-del-cyber-perche-leasa-e-part-is-vi-obbligano-a-monitorare-i-vostri-fornitori","status":"publish","type":"post","link":"https:\/\/phishia.fr\/it\/blog\/gestione-della-conformita\/leffetto-domino-del-cyber-perche-leasa-e-part-is-vi-obbligano-a-monitorare-i-vostri-fornitori\/","title":{"rendered":"L'effetto domino del cyber. Perch\u00e9 l'EASA e la Parte IS richiedono il monitoraggio dei fornitori."},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4123\" class=\"elementor elementor-4123\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-13aeb1d e-flex e-con-boxed e-con e-parent\" data-id=\"13aeb1d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-96ee59f elementor-widget elementor-widget-text-editor\" data-id=\"96ee59f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L'industria aeronautica \u00e8 un modello di affidabilit\u00e0, sicurezza e tracciabilit\u00e0. Eppure \u00e8 diventato un obiettivo primario per i criminali informatici, non colpendo le principali compagnie aeree o i produttori, ma prendendo di mira l'anello che si ritiene pi\u00f9 debole: <strong>la catena di fornitura<\/strong>.<\/p><p>Non \u00e8 pi\u00f9 in gioco la vostra sicurezza, ma quella dell'intero sistema, come richiesto dalle nuove direttive europee.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ae70605 e-con-full e-flex e-con e-child\" data-id=\"ae70605\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57e0aad elementor-widget elementor-widget-heading\" data-id=\"57e0aad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Il nuovo perimetro del rischio: dall'interno all'ecosistema<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c12b3a elementor-widget elementor-widget-text-editor\" data-id=\"2c12b3a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Un attacco di <em>Catena di approvvigionamento<\/em> si verifica quando un hacker sfrutta la vulnerabilit\u00e0 di un fornitore, spesso pi\u00f9 piccolo e meno sicuro, per raggiungere il cliente finale (il produttore o l'operatore di aeromobili).<\/p><p><strong>Perch\u00e9 il settore aeronautico \u00e8 cos\u00ec vulnerabile a questo effetto domino?<\/strong><\/p><ol><li><strong>Fiducia privilegiata :<\/strong> I fornitori hanno accesso privilegiato ai sistemi informativi dei clienti (piattaforme per lo scambio di disegni, software di manutenzione, database di parti critiche).<\/li><li><strong>Regolamenti :<\/strong> I nuovi requisiti dell'EASA (Agenzia Europea per la Sicurezza Aerea), in particolare la <strong>Quota IS<\/strong>, Oltre a quanto sopra, gli operatori sono tenuti a garantire la sicurezza delle loro attrezzature. <em>ecosistema<\/em>. La negligenza di un fornitore pu\u00f2 ora comportare sanzioni e la sospensione delle attivit\u00e0 per il cliente finale.<\/li><\/ol><p>Si tratta di un obbligo legale di vigilanza che si estende a tutti gli attori della catena.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8d5c59e e-con-full e-flex e-con e-child\" data-id=\"8d5c59e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ea6b9f elementor-widget elementor-widget-heading\" data-id=\"5ea6b9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">La minaccia dell'intrusione laterale<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-979a5e8 elementor-widget elementor-widget-text-editor\" data-id=\"979a5e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Il rischio non si limita pi\u00f9 al furto di dati (come nel caso della <em><a href=\"https:\/\/phishia.fr\/it\/blog\/sorveglianza\/la-tua-password-vale-10-leconomia-sommersa-dei-registri-dei-ladri\/\"><strong><u>Registri dei rubatori<\/u><\/strong><\/a><\/em><u>)<\/u>. Nella catena di approvvigionamento si tratta di un'intrusione laterale:<\/p><ul><li><strong>Compromesso :<\/strong> Un subappaltatore (ad esempio, l'editore di un software di gestione del parco veicoli) viene violato attraverso un accesso dimenticato o una semplice vulnerabilit\u00e0.<\/li><li><strong>Propagazione :<\/strong> L'hacker utilizza quindi l'accesso legittimo del subappaltatore per iniettare codice nocivo o esfiltrare dati critici da tutti i clienti contemporaneamente.<\/li><li><strong>Conseguenza:<\/strong> Arresto delle linee di produzione, modifica della documentazione tecnica o paralisi di un sistema di navigazione.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77a1af7 elementor-widget elementor-widget-image\" data-id=\"77a1af7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"164\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-3-300x164.png\" class=\"attachment-medium size-medium wp-image-4125\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-3-300x164.png 300w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-3-18x10.png 18w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-3.png 564w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ca262dd e-con-full e-flex e-con e-child\" data-id=\"ca262dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d33dc4 elementor-widget elementor-widget-heading\" data-id=\"6d33dc4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CTI al servizio della resilienza aeronautica<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f7a6db elementor-widget elementor-widget-text-editor\" data-id=\"7f7a6db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Di fronte a questa minaccia sistemica e agli imperativi di conformit\u00e0 (Parte IS), la Cyber Threat Intelligence sta diventando uno strumento essenziale di audit e resilienza.<\/p><p>La <strong>CTI Phishia<\/strong> consente di adottare una strategia di <em>sorveglianza estesa<\/em> :<\/p><ul><li><strong>Monitoraggio da parte di terzi :<\/strong> Non stiamo solo cercando di vedere se <em>il tuo<\/em> identificativi presenti nel Dark Web, ma anche quelli dei vostri fornitori strategici citati nella vostra documentazione.<\/li><li><strong>Diagnosi precoce :<\/strong> Individuare i gruppi di pirati (ad es. <em>Broker ad accesso iniziale<\/em> IAB) che si rivolge ai sistemi IT del settore aerospaziale e industriale.<\/li><li><strong>Conformit\u00e0 proattiva :<\/strong> Fornire la prova di vigilanza necessaria per soddisfare i crescenti requisiti normativi dell'EASA e della Parte IS.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0cfcc0e elementor-widget elementor-widget-image\" data-id=\"0cfcc0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"634\" height=\"272\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-4.png\" class=\"attachment-large size-large wp-image-4126\" alt=\"\" srcset=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-4.png 634w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-4-300x129.png 300w, https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/Sans-titre-4-18x8.png 18w\" sizes=\"(max-width: 634px) 100vw, 634px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-233fb75 e-con-full e-flex e-con e-child\" data-id=\"233fb75\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7bc3a38 elementor-widget elementor-widget-heading\" data-id=\"7bc3a38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Una partnership oltre il perimetro<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5bf8df elementor-widget elementor-widget-text-editor\" data-id=\"a5bf8df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Per gli operatori dell'industria aerospaziale, la CTI non \u00e8 un costo, ma un investimento nel futuro. <em>continuit\u00e0 operativa<\/em> e il <em>conformit\u00e0 normativa<\/em>. Phishia vi offre la visibilit\u00e0 necessaria per identificare e neutralizzare questi rischi prima che paralizzino un intero settore.<\/p><p>Se siete un cliente importante che si preoccupa della conformit\u00e0 <strong>Quota IS<\/strong>, o un fornitore critico che ha bisogno di garantire il massimo livello di sicurezza, il nostro <strong>Offerta classica CTI<\/strong> \u00e8 la garanzia continua dell'integrit\u00e0 del vostro ecosistema.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1da6298 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1da6298\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/phishia.fr\/it\/sorveglianza\/cti\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Garantite la conformit\u00e0 e l'integrit\u00e0 della vostra catena di fornitura con Phishia CTI<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>L'industria aeronautica \u00e8 un modello di affidabilit\u00e0, sicurezza e tracciabilit\u00e0. Eppure \u00e8 diventato un obiettivo primario per i criminali informatici, non colpendo le principali compagnie aeree o i produttori, ma prendendo di mira l'anello pi\u00f9 debole della catena: la catena di approvvigionamento. Non \u00e8 pi\u00f9 la vostra sicurezza a essere [...]<\/p>","protected":false},"author":5,"featured_media":4133,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[22,24],"tags":[26],"class_list":["post-4123","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pilotage-conformite","category-surveillance","tag-aeronautique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>L&#039;Effet Domino de la Cyber. Pourquoi l&#039;EASA et la Part IS vous obligent \u00e0 surveiller vos fournisseurs. - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/it\/blog\/gestione-della-conformita\/leffetto-domino-del-cyber-perche-leasa-e-part-is-vi-obbligano-a-monitorare-i-vostri-fornitori\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L&#039;Effet Domino de la Cyber. Pourquoi l&#039;EASA et la Part IS vous obligent \u00e0 surveiller vos fournisseurs. - Phishia\" \/>\n<meta property=\"og:description\" content=\"L&rsquo;a\u00e9ronautique est un mod\u00e8le de fiabilit\u00e9, de s\u00e9curit\u00e9 et de tra\u00e7abilit\u00e9. Pourtant, elle est devenue une cible de choix pour les cybercriminels, non pas en frappant les grandes compagnies a\u00e9riennes ou les constructeurs, mais en visant le maillon r\u00e9put\u00e9 le plus faible : la cha\u00eene d&rsquo;approvisionnement (Supply Chain). Ce n&rsquo;est plus votre s\u00e9curit\u00e9 qui est [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/it\/blog\/gestione-della-conformita\/leffetto-domino-del-cyber-perche-leasa-e-part-is-vi-obbligano-a-monitorare-i-vostri-fornitori\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-11T00:50:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-11T00:50:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/EASA_Headquarters_-_EASA_Direktion.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1328\" \/>\n\t<meta property=\"og:image:height\" content=\"747\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Erwann Barre\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erwann Barre\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/\"},\"author\":{\"name\":\"Erwann Barre\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/f2ed7a4647e03c3f636ce8145f3d1e5d\"},\"headline\":\"L&rsquo;Effet Domino de la Cyber. Pourquoi l&rsquo;EASA et la Part IS vous obligent \u00e0 surveiller vos fournisseurs.\",\"datePublished\":\"2025-12-11T00:50:37+00:00\",\"dateModified\":\"2025-12-11T00:50:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/\"},\"wordCount\":636,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/EASA_Headquarters_-_EASA_Direktion.jpg\",\"keywords\":[\"A\u00e9ronautique\"],\"articleSection\":[\"Pilotage et conformit\u00e9\",\"Surveillance\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/\",\"name\":\"L'Effet Domino de la Cyber. Pourquoi l'EASA et la Part IS vous obligent \u00e0 surveiller vos fournisseurs. - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/EASA_Headquarters_-_EASA_Direktion.jpg\",\"datePublished\":\"2025-12-11T00:50:37+00:00\",\"dateModified\":\"2025-12-11T00:50:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/EASA_Headquarters_-_EASA_Direktion.jpg\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/EASA_Headquarters_-_EASA_Direktion.jpg\",\"width\":1328,\"height\":747},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pilotage et conformit\u00e9\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/pilotage-conformite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"L&rsquo;Effet Domino de la Cyber. Pourquoi l&rsquo;EASA et la Part IS vous obligent \u00e0 surveiller vos fournisseurs.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/f2ed7a4647e03c3f636ce8145f3d1e5d\",\"name\":\"Erwann Barre\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L'effetto domino del cyber. Perch\u00e9 l'EASA e la Parte IS richiedono il monitoraggio dei fornitori. - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/it\/blog\/gestione-della-conformita\/leffetto-domino-del-cyber-perche-leasa-e-part-is-vi-obbligano-a-monitorare-i-vostri-fornitori\/","og_locale":"it_IT","og_type":"article","og_title":"L'Effet Domino de la Cyber. Pourquoi l'EASA et la Part IS vous obligent \u00e0 surveiller vos fournisseurs. - Phishia","og_description":"L&rsquo;a\u00e9ronautique est un mod\u00e8le de fiabilit\u00e9, de s\u00e9curit\u00e9 et de tra\u00e7abilit\u00e9. Pourtant, elle est devenue une cible de choix pour les cybercriminels, non pas en frappant les grandes compagnies a\u00e9riennes ou les constructeurs, mais en visant le maillon r\u00e9put\u00e9 le plus faible : la cha\u00eene d&rsquo;approvisionnement (Supply Chain). Ce n&rsquo;est plus votre s\u00e9curit\u00e9 qui est [&hellip;]","og_url":"https:\/\/phishia.fr\/it\/blog\/gestione-della-conformita\/leffetto-domino-del-cyber-perche-leasa-e-part-is-vi-obbligano-a-monitorare-i-vostri-fornitori\/","og_site_name":"Phishia","article_published_time":"2025-12-11T00:50:37+00:00","article_modified_time":"2025-12-11T00:50:38+00:00","og_image":[{"width":1328,"height":747,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/EASA_Headquarters_-_EASA_Direktion.jpg","type":"image\/jpeg"}],"author":"Erwann Barre","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Erwann Barre","Tempo di lettura stimato":"4 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/"},"author":{"name":"Erwann Barre","@id":"https:\/\/phishia.fr\/#\/schema\/person\/f2ed7a4647e03c3f636ce8145f3d1e5d"},"headline":"L&rsquo;Effet Domino de la Cyber. Pourquoi l&rsquo;EASA et la Part IS vous obligent \u00e0 surveiller vos fournisseurs.","datePublished":"2025-12-11T00:50:37+00:00","dateModified":"2025-12-11T00:50:38+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/"},"wordCount":636,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/EASA_Headquarters_-_EASA_Direktion.jpg","keywords":["A\u00e9ronautique"],"articleSection":["Pilotage et conformit\u00e9","Surveillance"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/","url":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/","name":"L'effetto domino del cyber. Perch\u00e9 l'EASA e la Parte IS richiedono il monitoraggio dei fornitori. - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/EASA_Headquarters_-_EASA_Direktion.jpg","datePublished":"2025-12-11T00:50:37+00:00","dateModified":"2025-12-11T00:50:38+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/EASA_Headquarters_-_EASA_Direktion.jpg","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/EASA_Headquarters_-_EASA_Direktion.jpg","width":1328,"height":747},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/leffet-domino-de-la-cyber-pourquoi-leasa-et-la-part-is-vous-obligent-a-surveiller-vos-fournisseurs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Pilotage et conformit\u00e9","item":"https:\/\/phishia.fr\/blog\/category\/pilotage-conformite\/"},{"@type":"ListItem","position":3,"name":"L&rsquo;Effet Domino de la Cyber. Pourquoi l&rsquo;EASA et la Part IS vous obligent \u00e0 surveiller vos fournisseurs."}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"Consulenza informatica, sicurezza informatica, sostenibilit\u00e0","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/f2ed7a4647e03c3f636ce8145f3d1e5d","name":"Erwann Barre"}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts\/4123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/comments?post=4123"}],"version-history":[{"count":7,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts\/4123\/revisions"}],"predecessor-version":[{"id":4132,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts\/4123\/revisions\/4132"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/media\/4133"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/media?parent=4123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/categories?post=4123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/tags?post=4123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}