Global Cybersecurity Outlook 2026
Page 47 of 64 · WEF_Global_Cybersecurity_Outlook_2026.pdf
While the majority of organizations across
industries evaluate the security maturity of their
suppliers (66%) and involve the security function in
procurement processes (65%), significantly fewer
adopt more advanced resilience measures. Only
27% simulate cyber incidents or conduct recovery
exercises, and a mere 33% comprehensively map
their supply chain ecosystems to gain a deeper
understanding of cyberthreat exposure and
interdependencies. These survey results denote
that supply chain risk management is often treated
as a compliance checklist rather than as a dynamic,
continuous process. Existing regulations typically establish only
a minimum-security baseline, which may be
insufficient to address rapidly evolving threats.
A key challenge lies in incentivizing both
organizations and their suppliers to strengthen
cyber resilience. Smaller vendors frequently
lack the resources to implement robust security
measures, while buyers may still prioritize cost
and efficiency over security when choosing
partners. This imbalance creates persistent
exposures, as attackers tend to exploit the
weakest links within the supply chain.
Cyber resilience is no longer confined to individual organizations; it depends on
the strength of our entire ecosystem. By embedding cybersecurity across supply
chains, sharing intelligence transparently and aligning public–private efforts,
we can build a trusted digital foundation that supports innovation, stability and
sustainable economic growth.
Mohamed Al Kuwaiti, Head of Cybersecurity, United Arab Emirates Government
40% 20% 80% 60%We assess the security maturity of our suppliers
We involve our security function in the
procurement process
We share information on threats with our
ecosystem partners (i.e. customers, suppliers, etc.)
We map our ecosystem in detail to understand where
we or our partners are exposed to cyber threats
We align our cyber resilience strategy
among our ecosystem partners
We simulate cyber incident and/or plan recovery
exercises with our ecosystem partners
0%
Responses (%)How does your organization address supply chain cyber risk? (select all that apply)
27%33%33%38%65%66%How organizations address supply chain risk FIGURE 38
Adequate crisis management and recovery planning
is essential to limit the impact of a cyber breach
when it happens. For example, in the aftermath of
the attack on Japanese beer manufacturer Asahi in
October 2025, essential IT services were brought
down, forcing staff to revert to pen and paper
to maintain critical operations such as inventory
tracking and manual checks of control data.43
Concentration of risk
The growing dependency on a small number of
critical digital providers remains a concern for cyber leaders, as it amplifies concentration risk
across the ecosystem. A single vulnerability in
a critical service provider may cause cascading
impacts felt across the globe. The increasing use
of internet of things (IoT) devices and cloud-based
services is expanding the attack surface and
introducing new vulnerabilities, especially when
these technologies are integrated into supply
chains or vendor ecosystems without adequate
security controls. Survey data highlights this risk:
cloud technologies are identified as the second
most impactful technology for cybersecurity in
2026, after AI.
Global Cybersecurity Outlook 2026
47
Ask AI what this page says about a topic: