2. Consumer e-SIM ecosystem
2.1. Definition of consumer e-SIM
2.2. Why has e-SIM still not been democratised?
2.3 Market sizing of the consumer mobile in Europe
2.4. Market sizing of the mobile consumer in North America
2.5. Market sizing of the consumer mobile in Latin America
2.6. Market sizing of the mobile consumer in Asia-Pacific
2.7. Market sizing of the consumer mobile in the MEA region
2.8. Dynamics of the consumer e-SIM market
2.9. Advantages & disadvantages of consumer e-SIM
3. e-SIM M2M / IoT ecosystem
3.1. Definition of M2M / IoT e-SIM
3.2 Market sizing of the M2M mobile in Europe
3.3 Market sizing of the M2M mobile in North America
3.4. Market sizing of the M2M mobile in Latin America
3.5. Market sizing of the M2M mobile in Asia-Pacific
3.6. Market sizing of the M2M mobile in the MEA region
3.7. M2M / IoT e-SIM Market dynamics
3.8. Advantages & disadvantages of M2M e-SIM
4. Telecom operators and e-SIM manufacturers
4.1. Telecom operator use cases
4.2. Telecom operators by revenue
4.3. e-SIM solution providers by revenue
5. e-SIM use cases
5.1. e-SIM use case: Automotive
5.2. e-SIM use case: Item tracking, shipping and logistics
5.3. e-SIM use case: Intelligent energy
5.4. e-SIM use cases: Portable devices
5.5. e-SIM use case: Intelligent agriculture
5.4. e-SIM use case: Smart Home Security
6. I-SIM
6.1. Definition of i-SIM
6.2. Advantages of i-SIM over e-SIM
7. Market sizing
7.1 Global value of the e-SIM market
1. The Stake of Cybercrime
- Number of internet users 2005-2023
- Total number of IoT units worldwide, 2001-2030 (billion units)
- Volume of data created and replicated worldwide, 2010-2025 (Zettabytes)
- Location of storage of breached data, 2023
- Average cost of a data breach, 2017-2023 (million USD)
- Estimated global cost of cybercrime, 2018-2025 (trillion USD)
2. The Importance of Telcos Cybersecurity
- Fixed & Mobile broadband traffic, 2019-2022 (in exabytes)
- Global growth of interconnection bandwidth, 2022-2026 (terabytes per second)
- Breakdown of supply chain risk
- Examples of cyber-attaches against telcos
3. Cryptography and Threat Mitigation
- Different types of encryption
- Main cybersecurity threats for telecommunications
- Methods to reduce the risk of cyber threats
4. Future Challenge in Cybersecurity
- The Internet encryption system
- Quantum computing: main threats
- Transition process to post-Quantum cryptography
- Solution to build a post-Quantum secure system
- International initiatives related to the Quantum challenges
5. The Quantum Computing Race
- Volume of investments mobilized in the year indicated, billion USD
- Public funding for Quantum computing and related technologies to July 2023
- Profiles of Quantum technology start-ups
- National Quantum technology programs
- Telco initiatives in Quantum technologies
6. Post-Quantum Solution Providers
- SandboxAQ activity
- SandboxAQ AQtive Guard Architecture
- Vodafone and SoftBank Case Studies
- IBM activity
- IBM Quantum Safe Technology
- Roadmap of IBM Quantum Safe Technology
- ISARA activity
- ISARA Advance Dashboard
8. Recommendations for Telcos
- Steps to anticipate Quantum risk