Global Cybersecurity Outlook 2026 Regional Analysis Sub-Saharan Africa

Page 3 of 3 · WEF_Global_Cybersecurity_Outlook_2026_Regional_Analysis_Sub-Saharan_Africa.pdf

How does your organization address supply chain cyber risk? Sub-Saharan AfricaWe simulate cyber incidents and/or plan recovery exercises with our ecosystem partnersWe align our cyber resilience strategy among our ecosystem partners We map our ecosystem in detail to understand where we or our partners are exposed to cyber threatsWe assess the security maturity of our suppliers We involve our security function in the procurement processWe share information on threats with partners in our ecosystem (customers, suppliers, partners)55% 45% 42% 37% 29% 26%Supply chain –The top three cyber risks related to supply chain security reported by organizations in sub-Saharan Africa are: 1. External factors: Uncertainty of impact of external factors (e.g., geopolitics, regulations) 2. Inheritance risk: Inability to assure integrity of third-party software, hardware and services 3. Concentration risk: A high degree of dependence on critical third-party suppliers –To mitigate these risks, 55% assess their supplier maturity, while 45% share information on threats with their ecosystem partners (customers, suppliers, etc.).Cyber skills –63% of respondents report their organizations lack the workforce skills required to meet current cybersecurity objectives. Sub-Saharan Africa has the second-widest cybersecurity skills gap among the regions after Latin America and the Caribbean (65%). Does your organization’s workforce have the skills needed to achieve its current cybersecurity objectives? Yes, we have the people and skills we need today No, we are missing critical people and skillsSouth Asia 57% 43% Europe and Central Asia 57% 43% East Asia and Pacific 56% 44% Middle East and North Africa 53% 47% North America 52% 48% Latin America and the Caribbean 35% 65%Sub-Saharan Africa 37% 63% –The most critical missing roles are: –Threat intelligence analyst –DevSecOps engineer –Identity and access management specialist To read the full report Global Cybersecurity Outlook 2026 on cybersecurity risks and trends at a global scale, please visit wef.ch/cybersecurity26. Explore the data deeper with our accompanying Data Explorer .*Some graphs may show percentages exceeding 100% due to multiple-choice questions and rounding.
Ask AI what this page says about a topic: