{"id":3233,"date":"2026-03-26T09:00:00","date_gmt":"2026-03-26T16:00:00","guid":{"rendered":"https:\/\/celacampaig.wpenginepowered.com\/?p=3233"},"modified":"2026-03-26T08:03:02","modified_gmt":"2026-03-26T15:03:02","slug":"cyberspace-global-diplomacy","status":"publish","type":"post","link":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy\/","title":{"rendered":"Cyberspace and the future of global diplomacy"},"content":{"rendered":"<p class=\"wp-block-paragraph\">Cyberspace is a world without physical boundaries, inhabited by people from every country on earth. At the same time, political tensions that exist in the physical world also exist in the digital realm&mdash;and cyberspace today is a central arena for global diplomacy.&nbsp;&nbsp;&nbsp;<\/p><p class=\"wp-block-paragraph\">The discipline now known as &ldquo;cyber diplomacy&rdquo; may be&nbsp;relatively&nbsp;new, but the issues at stake are well known.&nbsp;&ldquo;It&rsquo;s all part of a bigger diplomatic discussion that has been going on since&nbsp;World War II; it&rsquo;s just happening now in an online environment,&rdquo; says Kaja&nbsp;Ciglic, Senior Director of Digital Diplomacy at Microsoft who heads the company&rsquo;s Cybersecurity Policy and Diplomacy (CPD) team.<\/p><p class=\"wp-block-paragraph\">For more than a decade, Microsoft has been working with governments, international organizations, industry partners, and civil society groups to help shape governance in cyberspace. Here,&nbsp;Ciglic&nbsp;and fellow Senior Director of Digital Diplomacy Nemanja &ldquo;Neno&rdquo;&nbsp;Malisevic, two of CPD&rsquo;s longtime leaders, explain what cyber diplomacy is, why it matters, and how&nbsp;it&rsquo;s&nbsp;evolving.&nbsp;<\/p><h2 class=\"wp-block-heading\">People might be surprised to learn that Microsoft has &ldquo;digital diplomats.&rdquo; What does your work involve?<\/h2><p class=\"wp-block-paragraph\"><strong>Kaja&nbsp;Ciglic:&nbsp;<\/strong>On a basic level, our work is about trying to keep the online environment as stable as possible, and to allow as many people as possible to use it securely.&nbsp;<\/p><p class=\"wp-block-paragraph\"><strong>Neno&nbsp;Malisevic:&nbsp;<\/strong>We work with governments, particularly foreign&nbsp;ministries&nbsp;and diplomats, to shape what responsible behavior in cyberspace looks like for governments, what it looks like for industry, and what kind of guardrails should exist for each.&nbsp;&nbsp;<\/p><p class=\"wp-block-paragraph\">This means we engage with countries bilaterally&mdash;in a one-on-one setting&mdash;as well as multilaterally, with groups of countries. Over the last 10-plus years, however,&nbsp;we&rsquo;ve&nbsp;been working to move cybersecurity policy discussions to&nbsp;<em>multistakeholder<\/em>&nbsp;diplomacy, which includes industry and civil society as well as government. Importantly, this has never been about taking decision-making power away from states. The idea is simply that before states&nbsp;make a decision, they should have a chance to hear from people outside of government who have years of experience in this space. As Brad Smith, Vice Chair and President of Microsoft, has framed it, multistakeholder diplomacy gives industry and civil society a voice, not a vote.&nbsp;<\/p><h2 class=\"wp-block-heading\">What are the big issues in cyber diplomacy today?<\/h2><p class=\"wp-block-paragraph\"><strong>Neno&nbsp;Malisevic:&nbsp;<\/strong>A lot of our work is pushing back against authoritarian visions for cyberspace. For&nbsp;nearly 20&nbsp;years, many of the big multilateral cybersecurity processes have been&nbsp;initiated&nbsp;by&nbsp;Russia and&nbsp;its allies&mdash;places where a lot of cyberthreats originate. You&nbsp;don&rsquo;t&nbsp;need to be a cybersecurity expert to know that the real purpose behind these initiatives is not to combat cybercrime or enhance cybersecurity. Rather,&nbsp;it&rsquo;s&nbsp;about control of their citizens, control of the internet. They&nbsp;don&rsquo;t&nbsp;want treaties that protect people from states. They want treaties that protect states from people.&nbsp;&nbsp;<\/p><p class=\"wp-block-paragraph\"><strong>Kaja&nbsp;Ciglic:<\/strong>&nbsp;The difference becomes clear when you look at the words they use: Russia&nbsp;doesn&rsquo;t&nbsp;call it cybersecurity, they call it &ldquo;information security,&rdquo; and&nbsp;that&rsquo;s&nbsp;actually really&nbsp;important. The West has defined cyberspace as the infrastructure that runs the internet. Russia defines it as &ldquo;information space,&rdquo; which includes data as well as infrastructure. Same for China. Because their definition of the online environment includes the information and content shared online, cyber regulation becomes a question of freedom of speech.&nbsp;That&rsquo;s&nbsp;most often where the challenges lie.&nbsp;<\/p><h2 class=\"wp-block-heading\">Why is Microsoft invested in cyber diplomacy?<\/h2><p class=\"wp-block-paragraph\"><strong>Neno&nbsp;Malisevic:<\/strong>&nbsp;Given how many users Microsoft has worldwide, including many government customers, earning public trust really matters.&nbsp;&nbsp;<\/p><p class=\"wp-block-paragraph\">More broadly, if people trust cyberspace, they will engage with it and use it. That helps Microsoft do business in this space. It helps us innovate. It also helps other businesses, including our competitors. And&nbsp;that&rsquo;s&nbsp;okay. This is real diplomacy that Microsoft does for the benefit of the entire cyber ecosystem.&nbsp;<\/p><p class=\"wp-block-paragraph\"><strong>Kaja&nbsp;Ciglic:&nbsp;<\/strong>Cyberspace has become a domain of conflict, which destabilizes the entire online environment. At Microsoft, we have a unique understanding of the cyber landscape because of how many people around the world use our technology. We have a&nbsp;responsibility to use our data and insights to help keep the online world safe, secure, and accessible.&nbsp;<\/p><h2 class=\"wp-block-heading\">How do you push back against authoritarian efforts?<\/h2><p class=\"wp-block-paragraph\"><strong>Neno&nbsp;Malisevic:<\/strong>&nbsp;In formal negotiations among states, Microsoft&nbsp;can&rsquo;t&nbsp;actually propose&nbsp;a treaty or ask for textual changes to an agreement or report. Only states can do that. So, we need to work closely with governments to help them understand why the positions we advocate for are in our common interest and encourage them to advocate for those positions as well. That takes time. Cyber diplomacy&mdash;and all diplomacy, really&mdash;is a marathon, not a sprint,<em>&nbsp;<\/em>which makes it important for us to stay the course for the long run<em>,<\/em>&nbsp;as CPD has done.&nbsp;<\/p><p class=\"wp-block-paragraph\">This is critical because&nbsp;a number of&nbsp;authoritarian states are very strategically patient.&nbsp;They&rsquo;re&nbsp;very good&nbsp;at getting others engaged in minutiae&mdash;this&nbsp;particular rule, this&nbsp;particular paragraph&mdash;while in the bigger picture&nbsp;they&rsquo;re&nbsp;maneuvering to shape the rules in their favor.&nbsp;&nbsp;<\/p><p class=\"wp-block-paragraph\"><strong>Kaja&nbsp;Ciglic:<\/strong>&nbsp;Around the world, countries are at&nbsp;very different&nbsp;stages of development, both offline and online. For many, the internet can feel like a threatening space, and cybersecurity can seem overwhelming. Often, what they want most are practical tools that address immediate economic, development, or security challenges. As a result, they may agree to anything that looks like it could help them, even though ultimately it might carry negative consequences for freedom of speech or could be abused. Unfortunately, some states are adept at exploiting this dynamic.&nbsp;<\/p><h2 class=\"wp-block-heading\">How has cyber diplomacy evolved over the decade that&nbsp;you&rsquo;ve&nbsp;worked in the space?<\/h2><p class=\"wp-block-paragraph\"><strong>Neno&nbsp;Malisevic:<\/strong>&nbsp;Much of the early work aimed to reach consensus on what responsible behavior in cyberspace should look like. In 2017, these discussions stalled among states at the UN. In response, Microsoft focused on bringing multistakeholder groups together to find common ground. We helped launch the&nbsp;<a href=\"https:\/\/parispeaceforum.org\/initiatives\/paris-call-for-trust-and-security-in-cyberspace\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Paris Call for Trust and Security in Cyberspace\">Paris Call for Trust and Security in Cyberspace<\/a>, which, for the first time, brought together governments, industry, and civil society to agree on a set of cybersecurity principles.&nbsp;&nbsp;<\/p><p class=\"wp-block-paragraph\">Cyber diplomacy today is more focused on the practical applications of foundational principles. For example, more than a decade ago, a group of experts at the UN agreed that international law applies in cyberspace&mdash;which was a significant achievement. But&nbsp;there&rsquo;s&nbsp;still a lot of discussion needed to&nbsp;determine&nbsp;<em>how<\/em>&nbsp;to use international law in&nbsp;a cyber context. This is one of the reasons Microsoft helped create the&nbsp;<a href=\"https:\/\/www.elac.ox.ac.uk\/the-oxford-process\/the-statements-overview\/the-oxford-statement-on-ransomware-operations\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Oxford Process on International Law Protections in Cyberspace\">Oxford Process on International Law Protections in Cyberspace<\/a>, which is trying to progress that discussion.&nbsp;<\/p><h2 class=\"wp-block-heading\">Are there emerging cybersecurity issues that are changing your work?<\/h2><p class=\"wp-block-paragraph\"><strong>Kaja Ciglic:<\/strong> We&rsquo;re facing a serious global threat from cyber mercenaries, which are private companies that develop and sell what we call &ldquo;offensive&rdquo; cyber capabilities&mdash;irresponsible or illegal uses of technology that compromise human rights and safety. A common example today is companies that sell spyware for surveillance, which is often used to target journalists and political dissidents. However, the vulnerabilities that mercenaries exploit to access software systems and insert spyware can be used for other types of threats, including attacks on critical infrastructure like water and power utilities. This is not a future problem; it&rsquo;s an issue today.<\/p><p class=\"wp-block-paragraph\">Multistakeholder diplomacy is critical in this case. Many tech companies have agreed on principles that&nbsp;we&rsquo;ll&nbsp;uphold to keep our commercial technology from being used for offensive purposes. Microsoft is a founding member of the&nbsp;<a href=\"https:\/\/cybertechaccord.org\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Cybersecurity Tech Accord\">Cybersecurity Tech Accord<\/a>, which has brought together more than 160 companies in a commitment to principles that include fighting mercenary activity. Governments also need to agree to regulations around the use of cyber mercenary capabilities, and we actively support the&nbsp;<a href=\"https:\/\/www.gov.uk\/government\/publications\/the-pall-mall-process-code-of-practice-for-states\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Pall Mall Process\">Pall Mall Process<\/a>, which&nbsp;seeks&nbsp;to create the necessary guardrails.&nbsp;<\/p><h2 class=\"wp-block-heading\">What is on the horizon for cyber diplomacy?<\/h2><p class=\"wp-block-paragraph\"><strong>Neno&nbsp;Malisevic:&nbsp;<\/strong>It will continue to be important for stakeholders to come together to&nbsp;advocate&nbsp;against potentially dangerous visions for cyberspace. But&nbsp;merely&nbsp;pushing back is not enough. We need to find ways to collectively articulate positive alternatives. And to do that, you need to look at the big picture. You need to build capacity, which we have been championing via a new&nbsp;<a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2025\/05\/14\/strengthen-cybersecurity-in-kenya\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Advancing&nbsp;Regional Cybersecurity (ARC) initiative\"><em>Advancing&nbsp;Regional Cybersecurity (ARC) initiative<\/em><\/a>. You&nbsp;have to&nbsp;continue evolving what responsible behavior in cyberspace looks like, for example, by creating&nbsp;<a href=\"https:\/\/static1.squarespace.com\/static\/66ec2ce26cdcd22fa70e3186\/t\/6977f5868ff464453b31c8d7\/1769469319032\/CSINT+Policy+Paper+Series+Spring+2026%2C+Griffith%2C+Leslie%2C+Grossman.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"guardrails for cyber espionage\">guardrails for cyber espionage<\/a>, something we have been partnering on with&nbsp;the Center for Security, Innovation, and New Technology at American University (AU-CSINT). And, across the board, you need to continue building trust through constructive diplomatic engagements with states bilaterally and multilaterally.&nbsp;&nbsp;<\/p><p class=\"wp-block-paragraph\"><strong>Kaja&nbsp;Ciglic:&nbsp;<\/strong>Hospitals and aid operations increasingly depend on data and networks, and we are partnering with the International&nbsp;Committee of the Red Cross on its&nbsp;<a href=\"https:\/\/blogs.icrc.org\/law-and-policy\/2026\/01\/15\/ihls-lighthouse-navigating-towards-a-digital-emblem\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Digital Emblem\">Digital Emblem<\/a>&nbsp;initiative to strengthen legal protections for humanitarian and medical services in the digital environment.&nbsp;&nbsp;<\/p><p class=\"wp-block-paragraph\">And, of course, we need to continue making sense of AI in the context of cybersecurity and diplomacy. Microsoft helped launch the&nbsp;<a href=\"https:\/\/unidir.org\/raise\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-bi-cn=\"Roundtable for AI, Security, and Ethics (RAISE)\">Roundtable for AI, Security, and Ethics (RAISE)<\/a>, led by&nbsp;United Nations Institute for Disarmament Research (UNIDIR), to translate high-level debates on AI and security into practical, multistakeholder guidance and safeguards that governments and industry can implement. That is where the future of diplomatic discussions is heading&mdash;as technology evolves, so should the responses.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nemanja &ldquo;Neno&rdquo;&nbsp;Malisevic&nbsp;and Kaja&nbsp;Ciglic, Senior Directors of Digital Diplomacy at Microsoft and leaders of the company&rsquo;s Cybersecurity Policy and Diplomacy team, discuss cyber diplomacy: what their work involves, the key issues at stake, and&nbsp;what&rsquo;s&nbsp;on the horizon for digital diplomacy.<\/p>\n","protected":false},"author":23,"featured_media":3250,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_microsoft_sidebar_content":"<!-- wp:group {\"metadata\":{\"name\":\"Social Share\"},\"style\":{\"spacing\":{\"blockGap\":\"var:preset|spacing|sm\"}},\"layout\":{\"type\":\"flex\",\"flexWrap\":\"nowrap\",\"justifyContent\":\"left\"},\"microsoftBreakpointId\":\"05xlfuiuy\"} -->\n<div class=\"wp-block-group microsoft-breakpoint-id-05xlfuiuy\" data-microsoft-breakpoint-id=\"05xlfuiuy\"><!-- wp:paragraph {\"style\":{\"typography\":{\"fontStyle\":\"normal\",\"fontWeight\":\"600\",\"textTransform\":\"uppercase\",\"letterSpacing\":\"6px\"}},\"fontSize\":\"body-sm\"} -->\n<p class=\"has-body-sm-font-size\" style=\"font-style:normal;font-weight:600;letter-spacing:6px;text-transform:uppercase\">Share<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:microsoft-social-share\/social-share {\"show_facebook\":false,\"order_share\":2,\"order_facebook\":3,\"order_x\":1,\"order_linkedin\":0,\"backgroundColor\":\"#291817\",\"globalUrlOverride\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy\",\"xUrlOverride\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy\"} \/--><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"isClickable\":true,\"className\":\"temp-color-scheme-post-card temp-left-card\",\"style\":{\"spacing\":{\"padding\":{\"top\":\"var:preset|spacing|sm\",\"bottom\":\"var:preset|spacing|sm\",\"left\":\"var:preset|spacing|sm\",\"right\":\"var:preset|spacing|sm\"}}},\"layout\":{\"type\":\"default\"},\"blockVisibility\":{\"controlSets\":[{\"id\":1,\"enable\":true,\"controls\":{\"screenSize\":{\"hideOnScreenSize\":{\"small\":true}}}}]},\"clickableContext\":\"selector\",\"clickableSelector\":\"a\",\"hoverBackgroundColor\":\"#152237\",\"hoverTextColor\":\"#c6e3f3\",\"hoverLinkColor\":\"#c6e3f3\",\"hoverColorScheme\":\"default\",\"microsoftBreakpointId\":\"8vxt56kk0\"} -->\n<div class=\"wp-block-group temp-color-scheme-post-card temp-left-card has-hover-background has-hover-text has-hover-link microsoft-breakpoint-id-8vxt56kk0\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm);cursor:pointer;--hover-background-color:#152237;--hover-text-color:#c6e3f3;--hover-link-color:#c6e3f3\" data-is-clickable=\"true\" data-clickable-url=\"\" data-clickable-context=\"selector\" data-clickable-selector=\"a\" data-microsoft-breakpoint-id=\"8vxt56kk0\">\n<!-- wp:heading {\"style\":{\"typography\":{\"lineHeight\":\"1.2\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h2 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.2\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cpi-protecting-ngos\/\">The CyberPeace Institute is helping NGOs defend themselves\u2014before it\u2019s too late<\/a><\/h2>\n<!-- \/wp:heading -->\n<!-- wp:buttons -->\n<div class=\"wp-block-buttons\">\n<!-- wp:button {\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-custom-font-size wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cpi-protecting-ngos\/\">Read the article<img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" style=\"width: 1em;)\" class=\"ignite-wp-icon\"><\/a><\/div>\n<!-- \/wp:button -->\n<\/div>\n<!-- \/wp:buttons -->\n<\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"isClickable\":true,\"className\":\"temp-color-scheme-post-card temp-left-card\",\"style\":{\"spacing\":{\"padding\":{\"top\":\"var:preset|spacing|sm\",\"bottom\":\"var:preset|spacing|sm\",\"left\":\"var:preset|spacing|sm\",\"right\":\"var:preset|spacing|sm\"}}},\"layout\":{\"type\":\"default\"},\"blockVisibility\":{\"controlSets\":[{\"id\":1,\"enable\":true,\"controls\":{\"screenSize\":{\"hideOnScreenSize\":{\"small\":true}}}}]},\"clickableContext\":\"selector\",\"clickableSelector\":\"a\",\"hoverBackgroundColor\":\"#152237\",\"hoverTextColor\":\"#c6e3f3\",\"hoverLinkColor\":\"#c6e3f3\",\"hoverColorScheme\":\"default\",\"microsoftBreakpointId\":\"nf1dmwdcn\"} -->\n<div class=\"wp-block-group temp-color-scheme-post-card temp-left-card has-hover-background has-hover-text has-hover-link microsoft-breakpoint-id-nf1dmwdcn\" style=\"padding-top:var(--wp--preset--spacing--sm);padding-right:var(--wp--preset--spacing--sm);padding-bottom:var(--wp--preset--spacing--sm);padding-left:var(--wp--preset--spacing--sm);cursor:pointer;--hover-background-color:#152237;--hover-text-color:#c6e3f3;--hover-link-color:#c6e3f3\" data-is-clickable=\"true\" data-clickable-url=\"\" data-clickable-context=\"selector\" data-clickable-selector=\"a\" data-microsoft-breakpoint-id=\"nf1dmwdcn\">\n<!-- wp:heading {\"style\":{\"typography\":{\"lineHeight\":\"1.2\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h2 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.2\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/dmc\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\">5 things you need to know about tracking today\u2019s nation-state threats<\/a><br><\/h2>\n<!-- \/wp:heading -->\n<!-- wp:buttons -->\n<div class=\"wp-block-buttons\">\n<!-- wp:button {\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-custom-font-size wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/dmc\/topics\/cybersecurity\/stories\/5-things-threat-analyst\/\">Read the article<img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" style=\"width: 1em;)\" class=\"ignite-wp-icon\"><\/a><\/div>\n<!-- \/wp:button -->\n<\/div>\n<!-- \/wp:buttons -->\n<\/div>\n<!-- \/wp:group -->\n\n<!-- wp:quote {\"className\":\"is-style-framed\",\"blockVisibility\":{\"controlSets\":[{\"id\":1,\"enable\":true,\"controls\":{\"screenSize\":{\"hideOnScreenSize\":{\"small\":true}}}}]}} -->\n<blockquote class=\"wp-block-quote is-style-framed\"><!-- wp:paragraph -->\n<p>It\u2019s all part of a bigger diplomatic discussion that has been going on since World War II; it\u2019s just happening now in an online environment.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph {\"fontSize\":\"body\",\"fontFamily\":\"segoe-sans\"} -->\n<p class=\"has-segoe-sans-font-family has-body-font-size\">Kaja Ciglic, <br>Senior Director of Digital Diplomacy at Microsoft<\/p>\n<!-- \/wp:paragraph --><\/blockquote>\n<!-- \/wp:quote -->","_microsoft_bottom_content":"<!-- wp:group {\"align\":\"wide\",\"style\":{\"spacing\":{\"blockGap\":\"var:preset|spacing|xl-fluid\"}},\"layout\":{\"type\":\"grid\",\"minimumColumnWidth\":\"19rem\"},\"microsoftBreakpointId\":\"vg97ktoc2\"} -->\n<div class=\"wp-block-group alignwide microsoft-breakpoint-id-vg97ktoc2\" data-microsoft-breakpoint-id=\"vg97ktoc2\"><!-- wp:group {\"isClickable\":true,\"className\":\"temp-card\",\"layout\":{\"type\":\"flex\",\"orientation\":\"vertical\",\"justifyContent\":\"stretch\",\"verticalAlignment\":\"space-between\"},\"clickableContext\":\"selector\",\"clickableSelector\":\"a\",\"microsoftBreakpointId\":\"98660tone\"} -->\n<div class=\"wp-block-group temp-card microsoft-breakpoint-id-98660tone\" data-is-clickable=\"true\" data-clickable-url=\"\" data-clickable-context=\"selector\" data-clickable-selector=\"a\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"98660tone\"><!-- wp:group {\"layout\":{\"type\":\"default\"}} -->\n<div class=\"wp-block-group\"><!-- wp:image {\"lightbox\":{\"enabled\":false},\"id\":2433,\"aspectRatio\":\"16\/9\",\"scale\":\"cover\",\"sizeSlug\":\"full\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-full\"><img src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2025\/12\/quantum-header-v1.png\" alt=\"Kevin Reifsteck, Director for Cybersecurity Policy, and Emily Violi Benjamin, Senior Program Manager, Quantum Legal and Policy\" class=\"wp-image-2433\" style=\"aspect-ratio:16\/9;object-fit:cover\" \/><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3,\"style\":{\"typography\":{\"lineHeight\":\"1.3\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h3 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.3\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/\">Preparing for the quantum unknown<\/a><\/h3>\n<!-- \/wp:heading --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:buttons {\"layout\":{\"type\":\"flex\",\"justifyContent\":\"left\"}} -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"textAlign\":\"right\",\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/preparing-for-the-quantum-unknown\/\">\n    <span class=\"screen-reader-text\">\n      Read \u201c5 things threat analysts wish you knew\u201d\n    <\/span>\n    <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" class=\"ignite-wp-icon\" style=\"width: 1em;)\" alt=\"\" aria-hidden=\"true\">\n  <\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"isClickable\":true,\"className\":\"temp-card\",\"layout\":{\"type\":\"flex\",\"orientation\":\"vertical\",\"justifyContent\":\"stretch\",\"verticalAlignment\":\"space-between\"},\"clickableContext\":\"selector\",\"clickableSelector\":\"a\",\"microsoftBreakpointId\":\"uaduiwdaz\"} -->\n<div class=\"wp-block-group temp-card microsoft-breakpoint-id-uaduiwdaz\" data-is-clickable=\"true\" data-clickable-url=\"\" data-clickable-context=\"selector\" data-clickable-selector=\"a\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"uaduiwdaz\"><!-- wp:group {\"layout\":{\"type\":\"default\"},\"microsoftBreakpointId\":\"hurcw20sr\"} -->\n<div class=\"wp-block-group microsoft-breakpoint-id-hurcw20sr\" data-microsoft-breakpoint-id=\"hurcw20sr\"><!-- wp:image {\"lightbox\":{\"enabled\":false},\"id\":3163,\"aspectRatio\":\"16\/9\",\"scale\":\"cover\",\"sizeSlug\":\"full\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-full\"><img src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/02\/CELA_RedVDS_1920x800.jpg\" alt=\"An illustration of a shadowy, masked figure, partially obscured by an email message with a red warning symbol.\" class=\"wp-image-3163\" style=\"aspect-ratio:16\/9;object-fit:cover\" \/><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3,\"style\":{\"typography\":{\"lineHeight\":\"1.3\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h3 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.3\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/dmc\/topics\/cybersecurity\/stories\/redvds\/\">RedVDS and the invisible infrastructure of modern cybercrime<\/a><\/h3>\n<!-- \/wp:heading --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:buttons {\"layout\":{\"type\":\"flex\",\"justifyContent\":\"left\"}} -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"textAlign\":\"right\",\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/dmc\/topics\/cybersecurity\/stories\/redvds\/\">\n    \n    <span class=\"screen-reader-text\">\n      Read \u201cProtecting NGOs from cyberattacks\u201d\n    <\/span>\n\n    <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" class=\"ignite-wp-icon\" style=\"width: 1em;)\" alt=\"\" aria-hidden=\"true\">\n  <\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"isClickable\":true,\"className\":\"temp-card\",\"layout\":{\"type\":\"flex\",\"orientation\":\"vertical\",\"justifyContent\":\"stretch\",\"verticalAlignment\":\"space-between\"},\"clickableContext\":\"selector\",\"clickableSelector\":\"a\",\"microsoftBreakpointId\":\"rbbt8v9z0\"} -->\n<div class=\"wp-block-group temp-card microsoft-breakpoint-id-rbbt8v9z0\" data-is-clickable=\"true\" data-clickable-url=\"\" data-clickable-context=\"selector\" data-clickable-selector=\"a\" style=\"cursor:pointer\" data-microsoft-breakpoint-id=\"rbbt8v9z0\"><!-- wp:group {\"layout\":{\"type\":\"default\"}} -->\n<div class=\"wp-block-group\"><!-- wp:image {\"lightbox\":{\"enabled\":false},\"id\":3020,\"aspectRatio\":\"16\/9\",\"scale\":\"cover\",\"sizeSlug\":\"large\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-large\"><img src=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/01\/CELA_RaccoonO365_1200x630-1024x538.png\" alt=\"An illustration of silhouetted investigators shining flashlights toward an underground maze where raccoons sit among Bitcoins, computer code, and login credentials.\" class=\"wp-image-3020\" style=\"aspect-ratio:16\/9;object-fit:cover\" \/><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:heading {\"level\":3,\"style\":{\"typography\":{\"lineHeight\":\"1.3\"}},\"fontSize\":\"body-xl-fluid\"} -->\n<h3 class=\"wp-block-heading has-body-xl-fluid-font-size\" style=\"line-height:1.3\"><a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/raccoono365\/\">Inside the takedown of RaccoonO365: How Phishing-as-a-Service fuels ransomware\u2019s engine<\/a><\/h3>\n<!-- \/wp:heading --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"textAlign\":\"right\",\"width\":100,\"className\":\"is-style-secondary\",\"fontSize\":\"body-sm\"} -->\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-secondary\"><a class=\"wp-block-button__link has-body-sm-font-size has-text-align-right has-custom-font-size wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/raccoono365\/\">\n\n    <span class=\"screen-reader-text\">\n      Read \u201cStarting your journey to become quantum-safe\u201d\n    <\/span>\n\n    <img data-icon=\"arrow-right-corner\" data-icon-set=\"microsoft-theme-icons\" src=\"image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mNkYAAAAAYAAjCB0C8AAAAASUVORK5CYII=\" class=\"ignite-wp-icon\" style=\"width: 1em;)\" alt=\"\" aria-hidden=\"true\">\n  <\/a><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><\/div>\n<!-- \/wp:group --><\/div>\n<!-- \/wp:group -->","_microsoft_story_hero_content":"<!-- wp:group {\"align\":\"wide\",\"style\":{\"spacing\":{\"blockGap\":\"0\"},\"typography\":{\"fontStyle\":\"normal\",\"fontWeight\":\"600\",\"textTransform\":\"uppercase\",\"letterSpacing\":\"0.15em\",\"lineHeight\":\"1\"}},\"fontSize\":\"body-xs\",\"layout\":{\"type\":\"flex\",\"flexWrap\":\"nowrap\",\"justifyContent\":\"left\"},\"microsoftBreakpointId\":\"zmxsh4o4w\"} -->\n<div class=\"wp-block-group alignwide has-body-xs-font-size microsoft-breakpoint-id-zmxsh4o4w\" style=\"font-style:normal;font-weight:600;letter-spacing:0.15em;line-height:1;text-transform:uppercase\" data-microsoft-breakpoint-id=\"zmxsh4o4w\"><!-- wp:tenup\/post-primary-term {\"isLink\":false,\"style\":{\"spacing\":{\"padding\":{\"top\":\"var:preset|spacing|xs\",\"bottom\":\"var:preset|spacing|xs\",\"left\":\"var:preset|spacing|xs\",\"right\":\"var:preset|spacing|xs\"}},\"elements\":{\"link\":{\"color\":{\"text\":\"var:preset|color|clear-blue\"}}}},\"backgroundColor\":\"brown-black\",\"textColor\":\"clear-blue\"} \/--><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:group {\"align\":\"wide\",\"className\":\"is-style-post-header\",\"layout\":{\"type\":\"flex\",\"flexWrap\":\"wrap\",\"justifyContent\":\"space-between\",\"verticalAlignment\":\"bottom\"},\"microsoftBreakpointId\":\"3xxgrttak\"} -->\n<div class=\"wp-block-group alignwide is-style-post-header microsoft-breakpoint-id-3xxgrttak\" data-microsoft-breakpoint-id=\"3xxgrttak\"><!-- wp:group {\"style\":{\"layout\":{\"selfStretch\":\"fit\",\"flexSize\":\"\"}},\"layout\":{\"type\":\"default\"},\"microsoftBreakpointId\":\"kgbedb7qx\"} -->\n<div class=\"wp-block-group microsoft-breakpoint-id-kgbedb7qx\" data-microsoft-breakpoint-id=\"kgbedb7qx\"><!-- wp:post-title {\"level\":1,\"style\":{\"typography\":{\"lineHeight\":\"1.2\"}},\"fontSize\":\"body-4-xl-fluid\"} \/--><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:post-excerpt {\"style\":{\"layout\":{\"selfStretch\":\"fit\",\"flexSize\":\"\"}}} \/--><\/div>\n<!-- \/wp:group -->","_microsoft_story_content_prefix_content":"<!-- wp:group {\"layout\":{\"type\":\"flex\",\"flexWrap\":\"nowrap\",\"justifyContent\":\"right\",\"orientation\":\"horizontal\",\"verticalAlignment\":\"bottom\"},\"microsoftBreakpointId\":\"78xaub60h\"} -->\n<div class=\"wp-block-group microsoft-breakpoint-id-78xaub60h\" data-microsoft-breakpoint-id=\"78xaub60h\"><!-- wp:post-date {\"format\":\"M j, Y\",\"metadata\":{\"bindings\":{\"datetime\":{\"source\":\"core\/post-data\",\"args\":{\"field\":\"date\"}}}}} \/--><\/div>\n<!-- \/wp:group -->","_microsoft_story_content_suffix_content":"<!-- wp:paragraph {\"placeholder\":\"Add content to this area...\"} -->\n<p><\/p>\n<!-- \/wp:paragraph -->","_microsoft_author-bio_content":"","_microsoft_responsive_featured_images":[],"_microsoft_use_source_image":false,"_microsoft_color_scheme":"clear-blue","footnotes":""},"categories":[2,4],"tags":[],"topic":[48],"class_list":["post-3233","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government","category-international-coalitions","topic-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberspace and the future of global diplomacy | Microsoft<\/title>\n<meta name=\"description\" content=\"Nemanja \u201cNeno\u201d\u00a0Malisevic\u00a0and Kaja\u00a0Ciglic, Senior Directors of Digital Diplomacy at Microsoft and leaders of the company\u2019s Cybersecurity Policy and Diplomacy team, discuss cyber diplomacy: what their work involves, the key issues at stake, and\u00a0what\u2019s\u00a0on the horizon for digital diplomacy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberspace and the future of global diplomacy | Microsoft\" \/>\n<meta property=\"og:description\" content=\"Nemanja \u201cNeno\u201d\u00a0Malisevic\u00a0and Kaja\u00a0Ciglic, Senior Directors of Digital Diplomacy at Microsoft and leaders of the company\u2019s Cybersecurity Policy and Diplomacy team, discuss cyber diplomacy: what their work involves, the key issues at stake, and\u00a0what\u2019s\u00a0on the horizon for digital diplomacy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Corporate Responsibility\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-26T16:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/03\/Headshot_Hero_1920x800_option1-2-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"796\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CELA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CELA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy#article\",\"isPartOf\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy\/\"},\"author\":{\"name\":\"CELA\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0\"},\"headline\":\"Cyberspace and the future of global diplomacy\",\"datePublished\":\"2026-03-26T16:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy\/\"},\"wordCount\":1692,\"publisher\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy#primaryimage\"},\"thumbnailUrl\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/03\/Headshot_Hero_1920x800_option1-2-scaled.jpg\",\"articleSection\":[\"Government\",\"International Coalitions\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy\",\"name\":\"Cyberspace and the future of global diplomacy | Microsoft\",\"isPartOf\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy#primaryimage\"},\"thumbnailUrl\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/03\/Headshot_Hero_1920x800_option1-2-scaled.jpg\",\"datePublished\":\"2026-03-26T16:00:00+00:00\",\"description\":\"Nemanja \u201cNeno\u201d\u00a0Malisevic\u00a0and Kaja\u00a0Ciglic, Senior Directors of Digital Diplomacy at Microsoft and leaders of the company\u2019s Cybersecurity Policy and Diplomacy team, discuss cyber diplomacy: what their work involves, the key issues at stake, and\u00a0what\u2019s\u00a0on the horizon for digital diplomacy.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy#primaryimage\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/03\/Headshot_Hero_1920x800_option1-2-scaled.jpg\",\"contentUrl\":\"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/03\/Headshot_Hero_1920x800_option1-2-scaled.jpg\",\"width\":2560,\"height\":796,\"caption\":\"Stylized head shots of Nemanja \u201cNeno\u201d Malisevic and Kaja Ciglic, Senior Directors of Digital Diplomacy at Microsoft.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/celacampaig.wpenginepowered.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberspace and the future of global diplomacy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#website\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/\",\"name\":\"Corporate Responsibility\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/celacampaig.wpenginepowered.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#organization\",\"name\":\"Corporate Responsibility\",\"url\":\"https:\/\/celacampaig.wpenginepowered.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Corporate Responsibility\"},\"image\":{\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0\",\"name\":\"CELA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g\",\"caption\":\"CELA\"},\"sameAs\":[\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberspace and the future of global diplomacy | Microsoft","description":"Nemanja \u201cNeno\u201d\u00a0Malisevic\u00a0and Kaja\u00a0Ciglic, Senior Directors of Digital Diplomacy at Microsoft and leaders of the company\u2019s Cybersecurity Policy and Diplomacy team, discuss cyber diplomacy: what their work involves, the key issues at stake, and\u00a0what\u2019s\u00a0on the horizon for digital diplomacy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy","og_locale":"en_US","og_type":"article","og_title":"Cyberspace and the future of global diplomacy | Microsoft","og_description":"Nemanja \u201cNeno\u201d\u00a0Malisevic\u00a0and Kaja\u00a0Ciglic, Senior Directors of Digital Diplomacy at Microsoft and leaders of the company\u2019s Cybersecurity Policy and Diplomacy team, discuss cyber diplomacy: what their work involves, the key issues at stake, and\u00a0what\u2019s\u00a0on the horizon for digital diplomacy.","og_url":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy","og_site_name":"Microsoft Corporate Responsibility","article_published_time":"2026-03-26T16:00:00+00:00","og_image":[{"width":2560,"height":796,"url":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/03\/Headshot_Hero_1920x800_option1-2-scaled.jpg","type":"image\/jpeg"}],"author":"CELA","twitter_card":"summary_large_image","twitter_misc":{"Written by":"CELA","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy#article","isPartOf":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy\/"},"author":{"name":"CELA","@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0"},"headline":"Cyberspace and the future of global diplomacy","datePublished":"2026-03-26T16:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy\/"},"wordCount":1692,"publisher":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy#primaryimage"},"thumbnailUrl":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/03\/Headshot_Hero_1920x800_option1-2-scaled.jpg","articleSection":["Government","International Coalitions"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/celacampaig.wpenginepowered.com\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy\/","url":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy","name":"Cyberspace and the future of global diplomacy | Microsoft","isPartOf":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy#primaryimage"},"thumbnailUrl":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/03\/Headshot_Hero_1920x800_option1-2-scaled.jpg","datePublished":"2026-03-26T16:00:00+00:00","description":"Nemanja \u201cNeno\u201d\u00a0Malisevic\u00a0and Kaja\u00a0Ciglic, Senior Directors of Digital Diplomacy at Microsoft and leaders of the company\u2019s Cybersecurity Policy and Diplomacy team, discuss cyber diplomacy: what their work involves, the key issues at stake, and\u00a0what\u2019s\u00a0on the horizon for digital diplomacy.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy#primaryimage","url":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/03\/Headshot_Hero_1920x800_option1-2-scaled.jpg","contentUrl":"https:\/\/celacampaig.wpenginepowered.com\/wp-content\/uploads\/2026\/03\/Headshot_Hero_1920x800_option1-2-scaled.jpg","width":2560,"height":796,"caption":"Stylized head shots of Nemanja \u201cNeno\u201d Malisevic and Kaja Ciglic, Senior Directors of Digital Diplomacy at Microsoft."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/topics\/cybersecurity\/stories\/cyberspace-global-diplomacy#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/celacampaig.wpenginepowered.com\/"},{"@type":"ListItem","position":2,"name":"Cyberspace and the future of global diplomacy"}]},{"@type":"WebSite","@id":"https:\/\/celacampaig.wpenginepowered.com\/#website","url":"https:\/\/celacampaig.wpenginepowered.com\/","name":"Corporate Responsibility","description":"","publisher":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/celacampaig.wpenginepowered.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/celacampaig.wpenginepowered.com\/#organization","name":"Corporate Responsibility","url":"https:\/\/celacampaig.wpenginepowered.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Corporate Responsibility"},"image":{"@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/celacampaig.wpenginepowered.com\/#\/schema\/person\/ce859313c57e3391d8283b3b6104ddd0","name":"CELA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fc604534920b8a31569e892d2c11aa1a6d22586668697b81a1cc8f49f3b1d740?s=96&d=mm&r=g","caption":"CELA"},"sameAs":["https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/"]}]}},"_links":{"self":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/posts\/3233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/comments?post=3233"}],"version-history":[{"count":0,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/posts\/3233\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/media\/3250"}],"wp:attachment":[{"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/media?parent=3233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/categories?post=3233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/tags?post=3233"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/celacampaig.wpenginepowered.com\/wp-json\/wp\/v2\/topic?post=3233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}