Global Cybersecurity Outlook 2026 Regional Analysis East Asia and Pacific
Page 3 of 3 · WEF_Global_Cybersecurity_Outlook_2026_Regional_Analysis_East_Asia_and_Pacific.pdf
Cyber skills
–44% of businesses in East Asia and Pacific report they
lack the workforce skills required to meet their current
cybersecurity objectives (globally 50%).
–Threat intelligence analyst is the most critical missing
cybersecurity role in the region, as identified by 27%
of organizations.
How does your organization address supply chain
cyber risk?Does your organization’s workforce have the skills
needed to achieve its current cybersecurity objectives?
27%We assess the security maturity of our suppliers34%We map our ecosystem in detail to understand where we or our
partners are exposed to cyber threats41%We align our cyber resilience strategy among our
ecosystem partnersWe involve our security function in the procurement process
60%67%We simulate cyber incidents and/or plan recovery exercises with
our ecosystem partners
We share information on threats with partners in our ecosystem
(customers, suppliers, partners)
42%
East Asia and PacificYes, we have the people and skills we need today
No, we are missing critical people and skillsSouth Asia
57% 43%
Europe and Central Asia
57% 43%
East Asia and Pacific
56% 44%
Middle East and North Africa
53% 47%
North America
52% 48%
Latin America and the Caribbean
35% 65%Sub-Saharan Africa
37% 63%
To read the full report Global Cybersecurity Outlook 2026 on cybersecurity risks and trends at a global scale,
please visit wef.ch/cybersecurity26. Explore the data deeper with our accompanying Data Explorer .With regard to the ways in which your board
is engaged in cybersecurity, the following
statements apply:
92% 8%
Board is engaged in cybersecurity
Board is not engaged in cybersecurity
Supply chain
–The top three supply chain-related cyber risks reported by
organizations in the region are:
1. Inheritance risk: Inability to assure integrity of third-party
software, hardware and services
2. Procurement risk: Inability to apply security controls to
third-party suppliers
3. Visibility: Lack of visibility into own organization’s
extended supply chain, tie with
Concentration risk: A high degree of dependence on
critical third-party suppliers
–To mitigate these risks, 67% of organizations in the
region assess their suppliers’ maturity, while 60% of
organizations prioritize involving the security function in
procurement processes.
*Some graphs may show percentages exceeding 100% due to multiple-choice questions and rounding.
Ask AI what this page says about a topic: