Cybersecurity 2026: cloud, supply chain, and the keys of the SOC for the digital future

As workspaces evolve towards more digital, sustainable, and well-being-focused environments, threats are also transforming.

The cloud, interconnected supply chains, and the growing reliance on artificial intelligence expand the attack surface. In this new context, it is not enough to react; it is necessary to anticipate.

In this second part, we explore how Microsoft’s Security Operations Center (SOC) becomes a fundamental pillar for building a resilient cybersecurity strategy, based on visibility, collaboration, and automation.

From protecting critical infrastructures to fostering a strong organizational culture, we address the keys that will make the difference in the digital future.

1. Security in the cloud and supply chain

The cloud is the new standard, but also a critical target. Supply chains expand the attack surface, and “fourth-party” risks are increasingly frequent.

What are fourth-party risks?

When we talk about third-party risks, we refer to the direct suppliers with whom a company has a contractual relationship.

However, fourth-party risks arise when the suppliers of our suppliers —with whom we have no direct contact— become vectors of vulnerability.

So, these actors may have indirect access to critical systems, data, or processes, and are often not under direct supervision, which makes them harder to control.

For that reason, it creates a cascade of exposure that attackers can exploit to infiltrate an organization through weak links in the chain.

How does Microsoft’s SOC respond?

Microsoft’s SOC allows for:

  • Complete visibility of the cloud infrastructure, including external dependencies.
  • Third- and fourth-party risk management with tools like Microsoft Purview, which help map relationships and assess compliance.
  • Automation of audits and controls to ensure that suppliers meet security standards and regulations such as GDPR, ENS, and NIS2.
  • Copilot for Security, which facilitates the analysis of complex relationships between entities, generates contextualized alerts, and suggests mitigation measures based on threat intelligence.

This approach allows organizations to anticipate hidden vulnerabilities and protect their digital ecosystem in a more holistic way.

2.Cybersecurity culture and continuous training

Technology is not enough without a solid culture. Microsoft promotes training with:

  • Integrated awareness campaigns.
  • Crisis simulations and response exercises.
  • Coordinated action plans from the SOC, with expert support.

Looking to the future: trends that will set the course

As we move towards 2026 and beyond, the digital environment will continue to evolve rapidly. These are some of the trends already emerging as key:

  • Autonomous and defensive AI

We will see systems capable of predicting attacks, adapting security policies, and generating hyper-realistic simulations to train teams. Microsoft’s SOC already integrates adaptive machine learning and real-time anomaly detection.

  • Identity-centered security

Digital identity will be the new perimeter. Solutions like Microsoft Entra will evolve towards continuous authentication models, based on behavior.

  • Collaborative cybersecurity

The fight against digital crime will be increasingly global. This is where Microsoft Defender Threat Intelligence comes into play, a platform that allows:

  1. Access to real-time global threat intelligence, based on signals collected by Microsoft through its worldwide network.
  2. Identification of malicious actors, compromised infrastructures, and active campaigns, with enriched context.
  3. Correlation of threats with internal incidents, facilitating decision-making from the SOC.
  4. Sharing of information between organizations, fostering collective defense against sophisticated attacks.

Defender Threat Intelligence is cyber-intelligence in action, enabling security teams to anticipate attacker moves and strengthen their defenses with updated and verifiable data that avoids reactive mode and enables proactive mode.

  • Protection of critical sectors

As digital threats become more sophisticated, certain sectors become priority targets due to their direct impact on society. These are the main ones:

    1. Health: hospitals and medical systems handle sensitive data and cannot afford interruptions. Attacks can directly affect patient care, or even be the result of crime-as-a-service.
    2. Energy: electrical grids, plants, and distribution systems are essential. A cyberattack can cause blackouts or sabotage. Vandalism, extortion, vanity hacking…
    3. Transport and public infrastructures: airports, railways, and urban systems depend on connected technologies that can be vulnerable. Same as above…
    4. Finance: banks and insurers are frequent targets for fraud, data theft, and transaction manipulation. “Powerful gentleman is Mr. Money”; no further explanation needed.
    5. Public administrations: governments and agencies manage essential services and citizen data, making them targets for espionage and sabotage. If all the above reasons fit this typology, we should add the political factor here.

These sectors not only require advanced protection, but also operational resilience. Microsoft’s SOC offers specific solutions for each one, including Defender for IoT, Sentinel, and Copilot for Security, which enable the detection, response, and anticipation of threats in complex and critical environments.

  • Training extended to families

The attack surface includes personal and family devices. Cybersecurity training will extend beyond the company, involving employees and their households.

Conclusion

The digital future will be as promising as it is challenging.

The key will be to combine innovation with prudence, automation with humanity, and technology with culture.

Microsoft’s SOC, with its integrated and proactive approach, enables us to move forward confidently in this new environment, protecting what matters most: people, data, and business continuity.

digital Cybersecurity

Hugo Zunzarren Denis

CISO & DPO - Bravent

For more details, you can contact us at Info@bravent.net

    Privacy

    This website uses cookies so that we can offer you the best possible user experience. Cookie information is stored in your browser and performs functions such as recognizing you when you return to our website or helping our team understand which sections of the website you find most interesting and useful.

    Strictly Necessary Cookies

    Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

    Third party cookies

    This website uses analytical cookies to collect anonymous information such as the number of visitors to the site, or the most popular pages.

    Leaving this cookie active allows us to improve our website.