Global Cybersecurity Outlook 2026 Regional Analysis East Asia and Pacific

Page 3 of 3 · WEF_Global_Cybersecurity_Outlook_2026_Regional_Analysis_East_Asia_and_Pacific.pdf

Cyber skills –44% of businesses in East Asia and Pacific report they lack the workforce skills required to meet their current cybersecurity objectives (globally 50%). –Threat intelligence analyst is the most critical missing cybersecurity role in the region, as identified by 27% of organizations. How does your organization address supply chain cyber risk?Does your organization’s workforce have the skills needed to achieve its current cybersecurity objectives? 27%We assess the security maturity of our suppliers34%We map our ecosystem in detail to understand where we or our partners are exposed to cyber threats41%We align our cyber resilience strategy among our ecosystem partnersWe involve our security function in the procurement process 60%67%We simulate cyber incidents and/or plan recovery exercises with our ecosystem partners We share information on threats with partners in our ecosystem (customers, suppliers, partners) 42% East Asia and PacificYes, we have the people and skills we need today No, we are missing critical people and skillsSouth Asia 57% 43% Europe and Central Asia 57% 43% East Asia and Pacific 56% 44% Middle East and North Africa 53% 47% North America 52% 48% Latin America and the Caribbean 35% 65%Sub-Saharan Africa 37% 63% To read the full report Global Cybersecurity Outlook 2026 on cybersecurity risks and trends at a global scale, please visit wef.ch/cybersecurity26. Explore the data deeper with our accompanying Data Explorer .With regard to the ways in which your board is engaged in cybersecurity, the following statements apply: 92% 8% Board is engaged in cybersecurity Board is not engaged in cybersecurity Supply chain –The top three supply chain-related cyber risks reported by organizations in the region are: 1. Inheritance risk: Inability to assure integrity of third-party software, hardware and services 2. Procurement risk: Inability to apply security controls to third-party suppliers 3. Visibility: Lack of visibility into own organization’s extended supply chain, tie with Concentration risk: A high degree of dependence on critical third-party suppliers –To mitigate these risks, 67% of organizations in the region assess their suppliers’ maturity, while 60% of organizations prioritize involving the security function in procurement processes. *Some graphs may show percentages exceeding 100% due to multiple-choice questions and rounding.
Ask AI what this page says about a topic: