Digital Sovereignty for Aspiring Managers

Introduction

Digital sovereignty has emerged as one of the most critical strategic issues facing organizations in the 2020s. At its core, digital sovereignty describes an organization’s fundamental ability to control its own digital destiny – the data it generates, the infrastructure it relies upon, and the technology platforms that drive its operations. For aspiring managers, understanding this concept is no longer optional. It represents a new lens through which strategic decisions about technology, vendors, compliance, and competitive positioning must be viewed.

Understanding the Foundation

The concept extends beyond simple data protection into three interconnected layers that together define an organization’s digital autonomy. The physical layer encompasses infrastructure and technology – where data centers are located, who owns the hardware, and under which jurisdiction these assets fall. The code layer involves standards, rules, and design choices – whether you use proprietary platforms that lock you in or open standards that preserve flexibility. The data layer covers ownership, flows, and usage rights – who can access your information, where it moves, and what legal frameworks govern its use. This multidimensional nature means that achieving digital sovereignty is not a single project you can complete and tick off a list. Rather, it represents an ongoing process of managing dependencies, maintaining control, and ensuring operational autonomy in an increasingly interconnected digital world. Organizations can achieve sovereignty to varying degrees across these dimensions, and the appropriate level depends on the criticality of specific business processes and data

Why Digital Sovereignty Matters Now

The strategic importance has intensified due to converging forces.

Geopolitical tensions have made reliance on foreign technology providers a tangible risk rather than a theoretical concern. In early 2025, when the Chief Prosecutor of the International Criminal Court temporarily lost access to his emails because Microsoft blocked access due to political tensions, it demonstrated that cutting off data access is not hypothetical – it can directly impact business-critical processes in emergencies. European organizations now face a stark reality: over 90% of Western data is stored or processed through cloud infrastructures owned by U.S. tech giants, with 80% of Europe’s professional cloud and software spending – amounting to €265 billion – captured by American providers. The regulatory landscape has evolved dramatically to address these concerns. The Digital Operational Resilience Act (DORA), which entered into application on January 17, 2025, requires financial institutions across Europe to demonstrate comprehensive control over their ICT risks, including third-party dependencies. The NIS2 Directive extends cybersecurity requirements to over 150,000 entities across 18 critical sectors, demanding that medium and large organizations implement appropriate risk management measures and maintain operational resilience. These regulations transform digital sovereignty from a strategic choice into a compliance imperative. Customer trust has become another powerful driver. Research from Cisco found that 76% of globally surveyed consumers wouldn’t buy products from a business they don’t trust to manage their data, and over one-third have switched to a competitor because of data privacy practices. When organizations can demonstrate sovereign control – showing customers exactly where their data is stored, how it’s managed, and who can access it – they build competitive advantage through transparency.

Practical Examples from Industry

  • The automotive sector provides compelling illustrations of digital sovereignty in action. Catena-X has emerged as an open-source, collaborative data ecosystem specifically designed for the automotive industry. Nearly 200 organizations, including major manufacturers like BMW, Mercedes-Benz, and Volkswagen, have joined this initiative to securely and efficiently exchange data across the entire supply chain while maintaining control. The ecosystem addresses real-world challenges such as managing complex global supply chains, complying with strict environmental and social governance regulations, and creating connected efficiency through seamless data exchange. What makes Catena-X distinctive is its approach to sovereignty. Rather than creating a centralized data lake controlled by a single entity, it enables standardized, trusted point-to-point data exchange where companies maintain sovereignty over their information. The Automotive Solution Center for Simulation has implemented decentralized identity technology using verifiable credentials, allowing members and employees to access data spaces and services while retaining control over their digital identities. This approach aligns with the broader Gaia-X initiative, which promotes federated data infrastructure based on European values of transparency, openness, data protection, and security.
  • In healthcare, organizations face particularly acute sovereignty challenges given the sensitivity of patient data and stringent regulatory requirements. Research examining how healthcare providers can maintain digital sovereignty while operating in multi-cloud environments has identified key enablers: strong data governance frameworks, well-crafted contractual agreements, regulatory alignment, and emerging technologies such as confidential computing and sovereign cloud infrastructures. The Dutch hospital ZGT achieved digital sovereignty by implementing solutions that ensure sensitive health information remains within their control and national borders, demonstrating compliance with data protection requirements while maintaining operational efficiency
  • Financial services institutions are confronting similar pressures. Banks must balance the benefits of cloud infrastructure with the need to retain control over their most valuable resource: data. The strategic response involves moving toward modular IT architectures that support multi-cloud strategies, enabling banks to leverage the strengths of each cloud provider while reducing dependence on individual vendors. Users of certain banking platforms can replace their entire cloud infrastructure within 72 hours if needed, and AI models can be swapped in just 90 minutes – a level of agility required by DORA regulations. This rapid switching capability provides insurance against geopolitical disruption, regulatory changes, or vendor failures.
  • In logistics, DB Schenker has engaged with data sovereignty initiatives through participation in the International Data Spaces Association, working to develop cross-company use cases that enable secure and sovereign data management across supply chains. The company has also embraced digital transformation through platforms that facilitate interactions while maintaining appropriate controls over data flows and system integrations

The Vendor Lock-In Challenge

One of the most practical manifestations of digital sovereignty concerns is vendor lock-in – the situation where an organization becomes deeply anchored in a provider’s ecosystem, making switching to another platform difficult and expensive.

This dependency limits flexibility, weakens negotiating position, and creates strategic vulnerability. Surveys confirm that avoidance of dependencies (41%) and adherence to compliance requirements (42%) are the primary drivers pushing companies toward multi-cloud strategies, ahead of technical reasons such as resilience (32%). For aspiring managers, understanding how to avoid vendor lock-in while maintaining digital sovereignty requires attention to several technological approaches. Kubernetes and containerization enable applications to run consistently across different cloud environments without being tied to proprietary services. Infrastructure-as-code tools like Terraform allow organizations to define their infrastructure in a provider-agnostic way, making migration between clouds more feasible. Open-source solutions and open standards reduce proprietary dependencies and increase flexibility in choosing or changing providers A practical example from the public sector illustrates this approach: a state authority concerned about data sovereignty opted for a multi-cloud architecture where critical citizen data remains in a national sovereign cloud while less sensitive applications run in Microsoft Azure to benefit from scalability and modern services. The infrastructure is defined as code with Terraform and rolled out consistently in both clouds, with applications running on Kubernetes clusters in both environments. This allows the authority to move workloads between clouds as required to comply with new regulatory requirements or optimize costs, without redeveloping applications.

The Business Case for Digital Sovereignty

While digital sovereignty involves investment and effort, research demonstrates substantial returns for organizations that treat it as a strategic priority. Analysis of 2,050 executives from enterprises across 13 countries revealed that only 13% of firms have achieved what researchers call sovereign AI and data capabilities – yet these organizations produce up to 5x the return on investment compared to peers. These sovereignty leaders deploy mainstream agentic and generative AI at twice the rate of other firms and achieve 2.5x greater system-wide efficiency and innovation gains. The competitive advantages extend beyond financial returns. Sovereignty-ready firms can resolve five areas of business pain with a single intelligent application, versus just one or two for other organizations. They can pivot faster against competitors, shift operational expenditure more effectively, recruit talent based on proven performance, and solve multiple business problems in parallel. Executives from sovereignty-ready firms were 2.5 times more likely to predict they would move from mainstream to industry leadership in the next three years. The benefits also include enhanced resilience against disruption. When companies achieve digital sovereignty, they reduce risks associated with business continuity, compliance, and reputation. Organizations gain greater understanding and transparency about how their data is handled, which fosters trust among customers, partners, and regulatory authorities. For example, when a German company attests that it stores information about German customers in a sovereign cloud located in Germany, those individuals feel reassured that their personal data isn’t in a facility where different laws may apply – creating value in terms of public relations and customer relationships

Major Cloud Providers’ Sovereign Offerings

Recognizing the market demand, major hyper-scalers have developed sovereignty-specific offerings for European customers. AWS announced the AWS European Sovereign Cloud, launching by the end of 2025, designed with independent European governance, local European leadership, and a dedicated Security Operations Center. The infrastructure will be entirely located within the EU, physically and logically separate from other AWS Regions, with no critical dependencies on non-EU infrastructure. Only AWS employees residing in the EU will control day-to-day operations, and the governance structure includes an independent advisory board composed of EU citizens. Microsoft has expanded its Sovereign Cloud offerings across public cloud, private digital infrastructure, and national partner clouds. The Sovereign Public Cloud, available across all European Azure regions, ensures customer data stays in Europe under European law, with operations and access controlled by European personnel. The Data Guardian capability provides transparency into operational sovereignty controls, with all remote access by Microsoft engineers routed to the EU where EU-based operators can monitor and halt activities if necessary.​ Google has updated its sovereign cloud services with disconnected, air-gapped options for customers with strict data security requirements, as well as Google Cloud Dedicated for local and regional partner deployments.

These developments reflect the broader reality that by 2025, approximately 50% of European organizations plan to adopt sovereign cloud solutions to enhance cybersecurity, expand cloud adoption, and meet compliance needs.

Implementation Framework for Managers

For aspiring managers tasked with implementing digital sovereignty strategies, a structured approach is essential.

The journey begins with classification and assessment – conducting a review of current security and compliance processes, tools, platforms, and skill sets, then classifying data and applications according to sovereign requirements. Not all workloads need migration to sovereign infrastructure; only those deemed to include sensitive data classified as top secret or highly confidential require such treatment. The analysis should follow a clear procedural model that starts with business-critical processes or products. Managers must ask which services are essential for the business model, then evaluate digital dependency step by step along the dimensions of infrastructure, software, data, and expertise. This systematic approach identifies particularly sensitive or dependent areas as well as concentrations of dependencies, enabling specific fields of action to emerge. Defining and delimiting responsibilities forms the next critical step. Organizations should divide business processes into clearly defined domains, with each domain assigned to accountable units responsible for digital sovereignty within that scope. When delegating responsibilities to internal teams or external partners, interfaces and service-level agreements must be precisely defined, especially for aspects like data storage, access rights, auditability, and exit strategies. Vendor management requires explicit consideration of sovereignty factors. Beyond evaluating functionality and cost, managers should implement vendor classification schemes that account for strategic relevance – how essential is this vendor’s product or service to core business and future innovation. The more strategic the role, the more control and scrutiny are required. Clear contractual frameworks should define where data can be stored, who can access it, under which jurisdictions it falls, and what happens if the relationship must end. Technical architecture choices should prioritize resilience, portability, and autonomy from the ground up. Multi-cloud or hybrid strategies diversify across providers to mitigate dependency risks. Currently, around 60% of typical use cases in enterprises can be implemented with European cloud offerings such as StackIT or OVH, and through targeted use of open-source tools, this rate rises to up to 75%.

Navigating the Challenges

Implementation of digital sovereignty faces several urgent challenges that managers must navigate. The complexity of achieving true sovereignty while maintaining innovation velocity requires careful balance. Organizations must avoid the extremes of either complete dependence on foreign providers or inefficient technological isolation. The goal is conscious controllability – the ability to recognize, critically evaluate, and actively shape technological dependencies while securing switching options and enabling multi-vendor strategies The cultural dimension cannot be overlooked. Implementing a sovereignty-conscious strategy involves cultural, organizational, and structural transformation beyond technical changes. Organizations benefit from establishing a sovereignty board—an interdisciplinary team spanning IT, legal, procurement, and business units—to oversee sovereignty requirements and guide strategic decisions. Domain teams need empowerment and accountability to make sovereignty-conscious decisions within their areas. Internal capabilities must be built through investment in technical, legal, and operational expertise to reduce external dependencies. Regulatory complexity adds another layer of challenge. The overlay of GDPR, DORA, NIS2, and sector-specific regulations creates a demanding compliance landscape that varies by jurisdiction. Member States may adopt additional national localization requirements beyond EU-level directives, requiring organizations to build flexibility into contracts and architectures.

Managers must track these evolving requirements continuously and ensure their sovereignty strategies remain aligned.

Looking Forward

The trajectory is clear: digital sovereignty is transitioning from a theoretical debate to a business imperative. Governments worldwide have committed over $1 trillion collectively to national sovereignty programs, signaling the strategic importance at the highest levels. European initiatives such as Gaia-X, the Digital Markets Act, the Data Act, the Chips Act, and national programs like France 2030 aim to regulate dominant players and foster European alternatives. Yet public policies alone won’t be sufficient – reclaiming technological autonomy requires large-scale, coordinated commitment from the private sector. For aspiring managers, the message is unambiguous: organizations that embed digital sovereignty into their strategic decision-making now will be better positioned to weather future disruptions and seize emerging opportunities. The companies that proactively build sovereign digital strategies will be equipped to thrive during geopolitical uncertainty, regulatory evolution, and technological transformation. Those who delay will find themselves at a structural disadvantage – slower, less secure, less innovative, and less attractive to both customers and talent. Digital sovereignty does not mean developing everything in-house or acting completely independently of third parties. Rather, it represents conscious control – the freedom to make technological decisions autonomously, maintain capacity for action, and shape one’s own digital future. In a world where data has become perhaps the most valuable strategic asset, sovereignty over that data and the systems that process it increasingly determines which organizations will lead and which will follow

References:

  1. https://www.apizee.com/digital-sovereignty.php
  2. https://www.orange-business.com/en/blogs/digital-and-data-sovereignty-impacting-business-strategies
  3. https://insights.mgm-tp.com/en/it-modernisation-and-digital-sovereignty-in-the-ai-era-a-guide-for-it-managers/
  4. https://www.weforum.org/stories/2025/01/europe-digital-sovereignty/
  5. https://www.pwc.de/en/digitale-transformation/open-source-software-management-and-compliance/digital-sovereignty-why-it-pays-to-be-independent.html
  6. https://www.pwc.de/en/digitale-transformation/open-source-software-management-and-compliance/digital-sovereignty-recognising-criticality-and-acting-strategically.html
  7. https://www.maibornwolff.de/en/know-how/digital-sovereignty/
  8. https://www.wavestone.com/en/insight/digital-sovereignty-awakens-why-businesses-lead-charge/
  9. https://www.oodrive.com/blog/regulation/dora-regulation
  10. https://digital-strategy.ec.europa.eu/en/policies/nis2-directive
  11. https://www.eiopa.europa.eu/digital-operational-resilience-act-dora_en
  12. https://www.oodrive.com/blog/security/cybersecurity-regulation-new-nis2-directive
  13. https://www.dlr.de/en/research-and-transfer/projects-and-missions/catena-x-ein-datenokosystem-fur-die-automobilindustrie
  14. https://supplychaindigital.com/technology/cgi-catena-x-data-ecosystem
  15. https://www.cgi.com/en/blog/manufacturing/unlocking-collaborative-data-ecosystems-catena-x
  16. https://en.wikipedia.org/wiki/Gaia-X
  17. https://www.polytechnique-insights.com/en/columns/digital/gaia-x-the-bid-for-a-sovereign-european-cloud/
  18. https://www.altme.io/blog/decentralized-identity-in-the-automotive-industry-how-altme-the-automotive-solution-center-for-simulation-and-tezos-join-forces/
  19. https://su.diva-portal.org/smash/get/diva2:2001371/FULLTEXT01.pdf
  20. https://nextcloud.com/fr/blog/dutch-hospital-zgt-achieves-digital-sovereignty-with-nextcloud/
  21. https://www.bsi-software.com/en/blog/digital-sovereignty
  22. https://www.bloglobal.fr/wp-content/uploads/2021/12/Automotive_presentation.pdf
  23. https://www.iml.fraunhofer.de/en/news_archiv/new-logistics-community-pushes-forward-development–of-digital-b.html
  24. https://www.arvato-systems.com/blog/sovereignty-through-portability-how-to-avoid-vendor-lock-in
  25. https://www.innoq.com/en/articles/2025/10/governance-methodik-fuer-digitale-souveraenitaet/
  26. https://learn.microsoft.com/en-us/industry/sovereign-cloud/overview/digital-sovereignty
  27. https://www.ciodive.com/spons/ai-and-data-sovereignty-not-just-a-national-debate-but-a-business-survival/805029/
  28. https://www.techtarget.com/searchcio/feature/Ignoring-digital-sovereignty-CIOs-cant-afford-to
  29. https://www.aboutamazon.eu/news/aws/built-operated-controlled-and-secured-in-europe-aws-unveils-new-sovereign-controls-and-governance-structure-for-the-aws-european-sovereign-cloud
  30. https://aws.amazon.com/blogs/security/establishing-a-european-trust-service-provider-for-the-aws-european-sovereign-cloud/
  31. https://blogs.microsoft.com/blog/2025/06/16/announcing-comprehensive-sovereign-solutions-empowering-european-organizations/
  32. https://azure.microsoft.com/en-us/blog/microsoft-strengthens-sovereign-cloud-capabilities-with-new-services/
  33. https://www.redhat.com/en/resources/digital-sovereignty-service-provider-overview
  34. https://www.directionsonmicrosoft.com/microsoft-adds-more-sovereign-cloud-options-for-european-customers/
  35. https://www.redhat.com/fr/blog/implementing-digital-sovereignty-the-decision-framework
  36. https://www.cloudfest.com/blog/data-sovereignty-sovereign-cloud-guide/
  37. https://www.security.com/expert-perspectives-broadcom-software/countdown-dora-digital-operational-resilience-act
  38. https://www.docaposte.com/en/digital-sovereignty
  39. https://www.raconteur.net/technology/what-is-digital-sovereignty
  40. https://wire.com/en/blog/digital-sovereignty-2025-europe-enterprises
  41. https://www.anrt.asso.fr/sites/default/files/2024-03/ANRT_Digital_sovereignty_regaining_control_in_France_and_Europe_01.24.pdf
  42. https://www.techuk.org/resource/achieving-digital-sovereignty-in-defence-cloud-a-practical-guide.html
  43. https://www.clever.cloud/blog/entreprise/2025/03/20/digital-sovereignty-and-strategic-digital-autonomy/
  44. https://www.lancom-systems.com/company/digital-sovereignty/digital-sovereignty-guide
  45. https://www.mendix.com/blog/quick-guide-to-eu-digital-sovereignty/
  46. https://en.talkspirit.com/white-papers/a-leaders-guide-to-digital-sovereignty-in-europe
  47. https://www.oodrive.com/blog/actuality/digital-sovereignty-keys-full-understanding
  48. https://www.quilyx.com/digital-sovereignty-in-europe/
  49. https://www.datacenterdynamics.com/en/analysis/gaia-x-has-europes-grand-digital-infrastructure-project-hit-the-buffers/
  50. https://news.sap.com/2025/09/aws-sap-expand-collaboration-advance-digital-sovereignty-europe/
  51. https://www.oecd.org/en/publications/access-to-public-research-data-toolkit_a12e8998-en/gaia-x_db008090-en.html
  52. https://european.cloud/sovereign-cloud/microsoft-cloud-for-sovereignity/
  53. https://aws.amazon.com/compliance/europe-digital-sovereignty/
  54. https://gaia-x.eu
  55. https://www.silicon.fr/Thematique/cloud-1370/Breves/cloud-souverain-microsoft-muscle-jeu-europe-482644.htm
  56. https://aws.amazon.com/fr/compliance/europe-digital-sovereignty/
  57. https://cnig.gouv.fr/IMG/pdf/20231123_location_ecosystem_wg_overview.pdf
  58. https://news.microsoft.com/source/emea/2025/06/microsoft-annonce-des-solutions-souveraines-completes-pour-renforcer-les-organisations-europeennes/?lang=fr
  59. https://www.lemagit.fr/actualites/366625514/European-Sovereign-Cloud-AWS-persiste-et-signe
  60. https://wikis.ec.europa.eu/download/attachments/33527460/MIG12_GAIA-X.pdf?version=1&modificationDate=1606377365505&api=v2
  61. https://www.lemondeinformatique.fr/actualites/lire-microsoft-tente-de-rassurer-sur-son-cloud-europeen-97159.html
  62. https://www.myneva.eu/en/blog/werner-hoellrigl-data-sovereignty-in-the-age-of-digital-care-a-tale-of-two-realities
  63. https://news.sap.com/2024/02/next-wave-digital-transformation-automotive-industry/
  64. https://www.cionet.com/towards-digital-sovereignty-in-the-financial-sector
  65. https://internationaldataspaces.org/why-data-sovereignty-is-essential-to-healthcare-and-what-it-has-to-do-with-data-spaces/
  66. https://www.t-systems.com/de/en/insights/newsroom/expert-blogs/net-zero-as-a-target-638692
  67. https://www.celent.com/en/insights/947409586
  68. https://www.ifri.org/sites/default/files/migrated_files/documents/atoms/files/tonon_govtech_digital_sovereignty_2020.pdf
  69. https://international.eco.de/news/7-reasons-for-future-proof-data-spaces-in-the-automotive-market/
  70. https://cib.bnpparibas/unlocking-the-power-of-digital-assets-to-modernise-the-financial-markets/
  71. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5450934
  72. https://techpolicy.press/connected-vehicles-and-data-privacy-sovereignty-in-the-global-south
  73. https://www.sciencespo.fr/public/chaire-numerique/wp-content/uploads/2024/06/DIGITAL-SOVEREIGNTY-policy-brief.pdf
  74. https://www.valantic.com/en/case-studies/digital-sovereignty-automotive-with-aws/
  75. https://www.banque-france.fr/en/governors-interventions/central-bank-digital-currency-sovereignty-challenge
  76. https://www.iris-france.org/164982-health-sovereignty-in-the-digital-age-china-shows-more-urgency/
  77. https://www.convotis.ch/en/news/customer-story-schenker/
  78. https://aws.amazon.com/blogs/industries/rapidly-experimenting-with-catena-x-data-space-technology-on-aws/
  79. https://www.northatlantic.fi/digital-sovereignty-in-practice/
  80. https://openlogisticsfoundation.org/the-next-big-thing-the-efti-regulation/
  81. https://www.sciencespo.fr/public/chaire-numerique/en/2024/06/11/interview-how-to-implement-digital-sovereignty-by-samuele-fratini/
  82. https://www.rolandberger.com/publications/publication_pdf/roland_berger_transport_logistics_1.pdf?v=712824
  83. https://digitaleindustrie.at/wp-content/uploads/sites/2/2024/06/Catena-X-made-easy-%E2%80%93-SMEs-in-Automotive-Data-Ecosystems-Mai-2024.pdf
  84. https://www.stormshield.com/news/european-union-puts-its-digital-sovereignty-to-the-test/
  85. https://www.dbschenker.com/global
  86. https://github.com/aws-samples/minimum-viable-dataspace-for-catenax
  87. https://www.dbschenker.com/fr-fr
  88. https://catenax-ev.github.io/docs/operating-model/why-understanding-the-catena-x-data-space
  89. https://pppescp.com/2025/02/04/digital-sovereignty-in-europe-navigating-the-challenges-of-the-digital-era/
  90. https://www.civo.com/blog/vendor-lock-in-and-the-fight-for-uk-digital-sovereignty
  91. https://www.hivenet.com/post/understanding-european-tech-sovereignty-challenges-and-opportunities
  92. https://blog.whaller.com/en/2025/10/29/whaller-eu-cloud-sovereignty-framework/
  93. https://kantree.io/blog/tips/digital-sovereignity-project-management
  94. https://www.sofrecom.com/en/news-insights/digital-sovereignty-a-crucial-challenge-for-europe.html
  95. https://evertrust.io/blog/digital-sovereignty-what-is-it-and-why-is-it-important-for-your-certificates/
  96. https://www.oodrive.com/blog/security/data-localization-a-strategic-challenge-for-digital-sovereignty/
  97. https://commission.europa.eu/document/download/09579818-64a6-4dd5-9577-446ab6219113_en?filename=Cloud-Sovereignty-Framework.pdf
  98. https://www.sciencedirect.com/science/article/pii/S1877050925004193
  99. https://www.alinto.com/digital-sovereignty-european-initiatives/
  100. https://www.amf-france.org/en/news-publications/depth/dora
  101. https://www.suse.com/c/embedded-digital-sovereignty/
  102. https://illuminem.com/illuminemvoices/for-digital-sovereignty-and-eu-security-the-first-step-is-to-neutralise-the-us-cloud-act
  103. https://www.bearingpoint.com/en/insights-events/insights/data-sovereignty-the-driving-force-behind-europes-sovereign-cloud-strategy/
  104. https://www.ibm.com/think/insights/navigating-the-digital-wave-understanding-dora-and-the-role-of-confidential-computing
  105. https://apcoworldwide.com/blog/the-challenge-of-digital-sovereignty-in-europe
  106. https://www.teradata.com/insights/data-security/why-data-sovereignty-matters
  107. https://www.avenga.com/magazine/what-does-the-concept-of-digital-sovereignty-mean-for-enterprises-in-2026/
  108. https://eleks.com/blog/digital-sovereignty-in-government-balancing-transformation-with-independence/
  109. https://www.banque-france.fr/en/governors-interventions/fintechs-and-sovereignty-three-pillars-be-strengthened-together
  110. https://www.sofrecom.com/en/news-insights/digital-sovereignty-strategy-protect-sensitive-data.html
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *