SlideShare a Scribd company logo
@pdewost
Sovereignty in the Digital Age
Sovereignty noun
Sovereignty (over something) :
complete power to govern a country
The state of being a country with
freedom to govern itself
Such supreme power implies
exclusive domestic competency
(internal sovereignty) and full
international independancy where
the only limits are set by
commitments and treaties (external
sovereignty).
Sovereignty is about mastering one’s destiny
digital Sovereignty
Sovereignty is a core governing lever
Power is nothing
without control
Sovereignty
2.0
En 2007, Estonia, that
had heavily invested in
digital government,
was exposed to heavy
cyber attacks.
In 2014, the country
unveiled a plan to
migrante all of its
digital infrastructures
in the cloud in order
to withstand further
foreign cyberattacks.
Silicon > brothers in ARM ? (Baïkal)
Hardware > The Open Compute Elephant
Network > root server anybody ?
Operating Systems > choose your battlefield
Sovereign Cloud > At what cost & scale ?
Cybersecurity > CitizenFour vs. NSA vs. legal
Regulation > acceptability
a 7 layers model ?
In a world where alignment derives more
from speed and less from power
Open Compute
-30% in CAPEX & OPEX
$1Bn revenues in the US
Europe is next
The main difference between
opensourcing software and
hardware is that atoms do not
move at zero marginal cost…
Paradoxes
Acceleration
1700
generations ago,
modern man
emerges and starts
developing
language
300 generations
ago, he develops
writing
35 generations ago,
he develops priting
2013 Internet of Things
2010 Tablets
2007 smartphones
2000 Always on / Web
1985 PC / Networking
1970 Fax / Electronics
1955 Television / Mass Media
1940 Radio / Talking films
1925 Telephone / Silent films
1910 Telegraph / Photographyand then...
représentation©DerrickdeKerckhove2008-2012

adaptationetmiseàjour@pdewost
• Moore
• Metcalfe
• Duplication
Laws at stake
Technology 50 million users in
Books 400 years
Radio 38 years
TV 13 years
Cable 10 years
Internet 5 years
iPod 3 years
facebook 2 years
Angry Birds 35 days
©HoraceDediu@asymco—Racetoabillion(January2013)
Questions ?
@pdewost ©2014

More Related Content

Viewers also liked

"La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I...
"La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I..."La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I...
"La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I...Philippe DEWOST
 
Une Breve Histoire d'Interfaces
Une Breve Histoire d'InterfacesUne Breve Histoire d'Interfaces
Une Breve Histoire d'InterfacesPhilippe DEWOST
 
les IHM dans l'entreprise numerique
les IHM dans l'entreprise numeriqueles IHM dans l'entreprise numerique
les IHM dans l'entreprise numeriquePhilippe DEWOST
 
Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...
Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...
Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...Philippe DEWOST
 
20150702 usi keynote - open compute - philippe dewost caisse des depots
20150702   usi keynote - open compute  - philippe dewost caisse des depots20150702   usi keynote - open compute  - philippe dewost caisse des depots
20150702 usi keynote - open compute - philippe dewost caisse des depotsPhilippe DEWOST
 
Open Compute EU Summit - philippe dewost caisse des depots keynote
Open Compute EU Summit - philippe dewost caisse des depots keynoteOpen Compute EU Summit - philippe dewost caisse des depots keynote
Open Compute EU Summit - philippe dewost caisse des depots keynotePhilippe DEWOST
 
De la souveraineté numérique (CHECy)
De la souveraineté numérique (CHECy)De la souveraineté numérique (CHECy)
De la souveraineté numérique (CHECy)Philippe DEWOST
 

Viewers also liked (7)

"La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I...
"La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I..."La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I...
"La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I...
 
Une Breve Histoire d'Interfaces
Une Breve Histoire d'InterfacesUne Breve Histoire d'Interfaces
Une Breve Histoire d'Interfaces
 
les IHM dans l'entreprise numerique
les IHM dans l'entreprise numeriqueles IHM dans l'entreprise numerique
les IHM dans l'entreprise numerique
 
Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...
Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...
Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...
 
20150702 usi keynote - open compute - philippe dewost caisse des depots
20150702   usi keynote - open compute  - philippe dewost caisse des depots20150702   usi keynote - open compute  - philippe dewost caisse des depots
20150702 usi keynote - open compute - philippe dewost caisse des depots
 
Open Compute EU Summit - philippe dewost caisse des depots keynote
Open Compute EU Summit - philippe dewost caisse des depots keynoteOpen Compute EU Summit - philippe dewost caisse des depots keynote
Open Compute EU Summit - philippe dewost caisse des depots keynote
 
De la souveraineté numérique (CHECy)
De la souveraineté numérique (CHECy)De la souveraineté numérique (CHECy)
De la souveraineté numérique (CHECy)
 

Similar to Sovereignty in the digital age (opening keynote at CHECy) by Philippe Dewost

Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Mychal McCabe
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber VulnerableThe eCore Group
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioJLL
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of ThingsAshutosh Bhardwaj
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
Enabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloudEnabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloudMrsAlways RigHt
 
Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologyJohn D. Johnson
 
Government-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefGovernment-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefJonathan Reyes
 
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019QADay
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptjdenbryston
 
10 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 201810 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 2018Axis Communications
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyEricsson
 

Similar to Sovereignty in the digital age (opening keynote at CHECy) by Philippe Dewost (20)

Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber Vulnerable
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolio
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
Enabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloudEnabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloud
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing Technology
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Government-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefGovernment-ForeScout-Solution-Brief
Government-ForeScout-Solution-Brief
 
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.ppt
 
10 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 201810 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 2018
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
What is the internet of things v3
What is the internet of things v3What is the internet of things v3
What is the internet of things v3
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked Society
 

Recently uploaded

0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
 
Hi-Tech Industry 2024-25 Prospective.pptx
Hi-Tech Industry 2024-25 Prospective.pptxHi-Tech Industry 2024-25 Prospective.pptx
Hi-Tech Industry 2024-25 Prospective.pptxShivamM16
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesIP ServerOne
 
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdf
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdfOracle Database Administration I (1Z0-082) Exam Dumps 2024.pdf
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdfSkillCertProExams
 
123445566544333222333444dxcvbcvcvharsh.pptx
123445566544333222333444dxcvbcvcvharsh.pptx123445566544333222333444dxcvbcvcvharsh.pptx
123445566544333222333444dxcvbcvcvharsh.pptxgargh1099
 
05232024 Joint Meeting - Community Networking
05232024 Joint Meeting - Community Networking05232024 Joint Meeting - Community Networking
05232024 Joint Meeting - Community NetworkingMichael Orias
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationAccess Innovations, Inc.
 
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...Rahsaan L. Browne
 
Introduction of Biology in living organisms
Introduction of Biology in living organismsIntroduction of Biology in living organisms
Introduction of Biology in living organismssoumyapottola
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Orkestra
 
The Canoga Gardens Development Project. PDF
The Canoga Gardens Development Project. PDFThe Canoga Gardens Development Project. PDF
The Canoga Gardens Development Project. PDFRahsaan L. Browne
 
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22LHelferty
 
527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdf527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdfrajpreetkaur75080
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerVladimir Samoylov
 

Recently uploaded (14)

0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Hi-Tech Industry 2024-25 Prospective.pptx
Hi-Tech Industry 2024-25 Prospective.pptxHi-Tech Industry 2024-25 Prospective.pptx
Hi-Tech Industry 2024-25 Prospective.pptx
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdf
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdfOracle Database Administration I (1Z0-082) Exam Dumps 2024.pdf
Oracle Database Administration I (1Z0-082) Exam Dumps 2024.pdf
 
123445566544333222333444dxcvbcvcvharsh.pptx
123445566544333222333444dxcvbcvcvharsh.pptx123445566544333222333444dxcvbcvcvharsh.pptx
123445566544333222333444dxcvbcvcvharsh.pptx
 
05232024 Joint Meeting - Community Networking
05232024 Joint Meeting - Community Networking05232024 Joint Meeting - Community Networking
05232024 Joint Meeting - Community Networking
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
Writing Sample 2 -Bridging the Divide: Enhancing Public Engagement in Urban D...
 
Introduction of Biology in living organisms
Introduction of Biology in living organismsIntroduction of Biology in living organisms
Introduction of Biology in living organisms
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
The Canoga Gardens Development Project. PDF
The Canoga Gardens Development Project. PDFThe Canoga Gardens Development Project. PDF
The Canoga Gardens Development Project. PDF
 
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
Pollinator Ambassador Earth Steward Day Presentation 2024-05-22
 
527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdf527598851-ppc-due-to-various-govt-policies.pdf
527598851-ppc-due-to-various-govt-policies.pdf
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 

Sovereignty in the digital age (opening keynote at CHECy) by Philippe Dewost

  • 2. Sovereignty noun Sovereignty (over something) : complete power to govern a country The state of being a country with freedom to govern itself Such supreme power implies exclusive domestic competency (internal sovereignty) and full international independancy where the only limits are set by commitments and treaties (external sovereignty). Sovereignty is about mastering one’s destiny
  • 3. digital Sovereignty Sovereignty is a core governing lever Power is nothing without control
  • 4. Sovereignty 2.0 En 2007, Estonia, that had heavily invested in digital government, was exposed to heavy cyber attacks. In 2014, the country unveiled a plan to migrante all of its digital infrastructures in the cloud in order to withstand further foreign cyberattacks.
  • 5. Silicon > brothers in ARM ? (Baïkal) Hardware > The Open Compute Elephant Network > root server anybody ? Operating Systems > choose your battlefield Sovereign Cloud > At what cost & scale ? Cybersecurity > CitizenFour vs. NSA vs. legal Regulation > acceptability a 7 layers model ? In a world where alignment derives more from speed and less from power
  • 6. Open Compute -30% in CAPEX & OPEX $1Bn revenues in the US Europe is next The main difference between opensourcing software and hardware is that atoms do not move at zero marginal cost…
  • 8. Acceleration 1700 generations ago, modern man emerges and starts developing language 300 generations ago, he develops writing 35 generations ago, he develops priting 2013 Internet of Things 2010 Tablets 2007 smartphones 2000 Always on / Web 1985 PC / Networking 1970 Fax / Electronics 1955 Television / Mass Media 1940 Radio / Talking films 1925 Telephone / Silent films 1910 Telegraph / Photographyand then... représentation©DerrickdeKerckhove2008-2012
 adaptationetmiseàjour@pdewost
  • 9. • Moore • Metcalfe • Duplication Laws at stake Technology 50 million users in Books 400 years Radio 38 years TV 13 years Cable 10 years Internet 5 years iPod 3 years facebook 2 years Angry Birds 35 days ©HoraceDediu@asymco—Racetoabillion(January2013)