SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
@pdewost
Sovereignty in the Digital Age
Sovereignty noun
Sovereignty (over something) :
complete power to govern a country
The state of being a country with
freedom to govern itself
Such supreme power implies
exclusive domestic competency
(internal sovereignty) and full
international independancy where
the only limits are set by
commitments and treaties (external
sovereignty).
Sovereignty is about mastering one’s destiny
digital Sovereignty
Sovereignty is a core governing lever
Power is nothing
without control
Sovereignty
2.0
En 2007, Estonia, that
had heavily invested in
digital government,
was exposed to heavy
cyber attacks.
In 2014, the country
unveiled a plan to
migrante all of its
digital infrastructures
in the cloud in order
to withstand further
foreign cyberattacks.
Silicon > brothers in ARM ? (Baïkal)
Hardware > The Open Compute Elephant
Network > root server anybody ?
Operating Systems > choose your battlefield
Sovereign Cloud > At what cost & scale ?
Cybersecurity > CitizenFour vs. NSA vs. legal
Regulation > acceptability
a 7 layers model ?
In a world where alignment derives more
from speed and less from power
Open Compute
-30% in CAPEX & OPEX
$1Bn revenues in the US
Europe is next
The main difference between
opensourcing software and
hardware is that atoms do not
move at zero marginal cost…
Paradoxes
Acceleration
1700
generations ago,
modern man
emerges and starts
developing
language
300 generations
ago, he develops
writing
35 generations ago,
he develops priting
2013 Internet of Things
2010 Tablets
2007 smartphones
2000 Always on / Web
1985 PC / Networking
1970 Fax / Electronics
1955 Television / Mass Media
1940 Radio / Talking films
1925 Telephone / Silent films
1910 Telegraph / Photographyand then...
représentation©DerrickdeKerckhove2008-2012

adaptationetmiseàjour@pdewost
• Moore
• Metcalfe
• Duplication
Laws at stake
Technology 50 million users in
Books 400 years
Radio 38 years
TV 13 years
Cable 10 years
Internet 5 years
iPod 3 years
facebook 2 years
Angry Birds 35 days
©HoraceDediu@asymco—Racetoabillion(January2013)
Questions ?
@pdewost ©2014

Weitere ähnliche Inhalte

Andere mochten auch

"La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I...
"La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I..."La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I...
"La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I...Philippe DEWOST
 
Une Breve Histoire d'Interfaces
Une Breve Histoire d'InterfacesUne Breve Histoire d'Interfaces
Une Breve Histoire d'InterfacesPhilippe DEWOST
 
les IHM dans l'entreprise numerique
les IHM dans l'entreprise numeriqueles IHM dans l'entreprise numerique
les IHM dans l'entreprise numeriquePhilippe DEWOST
 
Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...
Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...
Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...Philippe DEWOST
 
20150702 usi keynote - open compute - philippe dewost caisse des depots
20150702   usi keynote - open compute  - philippe dewost caisse des depots20150702   usi keynote - open compute  - philippe dewost caisse des depots
20150702 usi keynote - open compute - philippe dewost caisse des depotsPhilippe DEWOST
 
Open Compute EU Summit - philippe dewost caisse des depots keynote
Open Compute EU Summit - philippe dewost caisse des depots keynoteOpen Compute EU Summit - philippe dewost caisse des depots keynote
Open Compute EU Summit - philippe dewost caisse des depots keynotePhilippe DEWOST
 
De la souveraineté numérique (CHECy)
De la souveraineté numérique (CHECy)De la souveraineté numérique (CHECy)
De la souveraineté numérique (CHECy)Philippe DEWOST
 

Andere mochten auch (7)

"La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I...
"La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I..."La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I...
"La dissolution inattendue de la DSI ?" - Keynote de clôture de "Unexpected I...
 
Une Breve Histoire d'Interfaces
Une Breve Histoire d'InterfacesUne Breve Histoire d'Interfaces
Une Breve Histoire d'Interfaces
 
les IHM dans l'entreprise numerique
les IHM dans l'entreprise numeriqueles IHM dans l'entreprise numerique
les IHM dans l'entreprise numerique
 
Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...
Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...
Philippe Dewost on "beyond screens" - Connected tv & digital media forum, Mos...
 
20150702 usi keynote - open compute - philippe dewost caisse des depots
20150702   usi keynote - open compute  - philippe dewost caisse des depots20150702   usi keynote - open compute  - philippe dewost caisse des depots
20150702 usi keynote - open compute - philippe dewost caisse des depots
 
Open Compute EU Summit - philippe dewost caisse des depots keynote
Open Compute EU Summit - philippe dewost caisse des depots keynoteOpen Compute EU Summit - philippe dewost caisse des depots keynote
Open Compute EU Summit - philippe dewost caisse des depots keynote
 
De la souveraineté numérique (CHECy)
De la souveraineté numérique (CHECy)De la souveraineté numérique (CHECy)
De la souveraineté numérique (CHECy)
 

Ähnlich wie Sovereignty in the digital age (opening keynote at CHECy) by Philippe Dewost

Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Mychal McCabe
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber VulnerableThe eCore Group
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioJLL
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of ThingsAshutosh Bhardwaj
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
Enabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloudEnabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloudMrsAlways RigHt
 
Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologyJohn D. Johnson
 
Government-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefGovernment-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefJonathan Reyes
 
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019GoQA
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptjdenbryston
 
10 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 201810 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 2018Axis Communications
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyEricsson
 

Ähnlich wie Sovereignty in the digital age (opening keynote at CHECy) by Philippe Dewost (20)

Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber Vulnerable
 
Cybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolioCybersecurity and its impact on your commercial real estate portfolio
Cybersecurity and its impact on your commercial real estate portfolio
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
Enabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloudEnabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloud
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing Technology
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Government-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefGovernment-ForeScout-Solution-Brief
Government-ForeScout-Solution-Brief
 
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.ppt
 
10 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 201810 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 2018
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
What is the internet of things v3
What is the internet of things v3What is the internet of things v3
What is the internet of things v3
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked Society
 

Kürzlich hochgeladen

Internship Presentation | PPT | CSE | SE
Internship Presentation | PPT | CSE | SEInternship Presentation | PPT | CSE | SE
Internship Presentation | PPT | CSE | SESaleh Ibne Omar
 
Chizaram's Women Tech Makers Deck. .pptx
Chizaram's Women Tech Makers Deck.  .pptxChizaram's Women Tech Makers Deck.  .pptx
Chizaram's Women Tech Makers Deck. .pptxogubuikealex
 
Early Modern Spain. All about this period
Early Modern Spain. All about this periodEarly Modern Spain. All about this period
Early Modern Spain. All about this periodSaraIsabelJimenez
 
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxEngaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxAsifArshad8
 
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comSaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comsaastr
 
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...漢銘 謝
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationNathan Young
 
proposal kumeneger edited.docx A kumeeger
proposal kumeneger edited.docx A kumeegerproposal kumeneger edited.docx A kumeeger
proposal kumeneger edited.docx A kumeegerkumenegertelayegrama
 
GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024GESCO SE
 
cse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitycse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitysandeepnani2260
 
General Elections Final Press Noteas per M
General Elections Final Press Noteas per MGeneral Elections Final Press Noteas per M
General Elections Final Press Noteas per MVidyaAdsule1
 
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRRINDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRRsarwankumar4524
 
Application of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxApplication of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxRoquia Salam
 
A Guide to Choosing the Ideal Air Cooler
A Guide to Choosing the Ideal Air CoolerA Guide to Choosing the Ideal Air Cooler
A Guide to Choosing the Ideal Air Coolerenquirieskenstar
 
Quality by design.. ppt for RA (1ST SEM
Quality by design.. ppt for  RA (1ST SEMQuality by design.. ppt for  RA (1ST SEM
Quality by design.. ppt for RA (1ST SEMCharmi13
 
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power
 
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRachelAnnTenibroAmaz
 

Kürzlich hochgeladen (17)

Internship Presentation | PPT | CSE | SE
Internship Presentation | PPT | CSE | SEInternship Presentation | PPT | CSE | SE
Internship Presentation | PPT | CSE | SE
 
Chizaram's Women Tech Makers Deck. .pptx
Chizaram's Women Tech Makers Deck.  .pptxChizaram's Women Tech Makers Deck.  .pptx
Chizaram's Women Tech Makers Deck. .pptx
 
Early Modern Spain. All about this period
Early Modern Spain. All about this periodEarly Modern Spain. All about this period
Early Modern Spain. All about this period
 
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptxEngaging Eid Ul Fitr Presentation for Kindergartners.pptx
Engaging Eid Ul Fitr Presentation for Kindergartners.pptx
 
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.comSaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
SaaStr Workshop Wednesday w/ Kyle Norton, Owner.com
 
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
THE COUNTRY WHO SOLVED THE WORLD_HOW CHINA LAUNCHED THE CIVILIZATION REVOLUTI...
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism Presentation
 
proposal kumeneger edited.docx A kumeeger
proposal kumeneger edited.docx A kumeegerproposal kumeneger edited.docx A kumeeger
proposal kumeneger edited.docx A kumeeger
 
GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024
 
cse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitycse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber security
 
General Elections Final Press Noteas per M
General Elections Final Press Noteas per MGeneral Elections Final Press Noteas per M
General Elections Final Press Noteas per M
 
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRRINDIAN GCP GUIDELINE. for Regulatory  affair 1st sem CRR
INDIAN GCP GUIDELINE. for Regulatory affair 1st sem CRR
 
Application of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxApplication of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptx
 
A Guide to Choosing the Ideal Air Cooler
A Guide to Choosing the Ideal Air CoolerA Guide to Choosing the Ideal Air Cooler
A Guide to Choosing the Ideal Air Cooler
 
Quality by design.. ppt for RA (1ST SEM
Quality by design.. ppt for  RA (1ST SEMQuality by design.. ppt for  RA (1ST SEM
Quality by design.. ppt for RA (1ST SEM
 
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular PlasticsDutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
Dutch Power - 26 maart 2024 - Henk Kras - Circular Plastics
 
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATIONRACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
RACHEL-ANN M. TENIBRO PRODUCT RESEARCH PRESENTATION
 

Sovereignty in the digital age (opening keynote at CHECy) by Philippe Dewost

  • 2. Sovereignty noun Sovereignty (over something) : complete power to govern a country The state of being a country with freedom to govern itself Such supreme power implies exclusive domestic competency (internal sovereignty) and full international independancy where the only limits are set by commitments and treaties (external sovereignty). Sovereignty is about mastering one’s destiny
  • 3. digital Sovereignty Sovereignty is a core governing lever Power is nothing without control
  • 4. Sovereignty 2.0 En 2007, Estonia, that had heavily invested in digital government, was exposed to heavy cyber attacks. In 2014, the country unveiled a plan to migrante all of its digital infrastructures in the cloud in order to withstand further foreign cyberattacks.
  • 5. Silicon > brothers in ARM ? (Baïkal) Hardware > The Open Compute Elephant Network > root server anybody ? Operating Systems > choose your battlefield Sovereign Cloud > At what cost & scale ? Cybersecurity > CitizenFour vs. NSA vs. legal Regulation > acceptability a 7 layers model ? In a world where alignment derives more from speed and less from power
  • 6. Open Compute -30% in CAPEX & OPEX $1Bn revenues in the US Europe is next The main difference between opensourcing software and hardware is that atoms do not move at zero marginal cost…
  • 8. Acceleration 1700 generations ago, modern man emerges and starts developing language 300 generations ago, he develops writing 35 generations ago, he develops priting 2013 Internet of Things 2010 Tablets 2007 smartphones 2000 Always on / Web 1985 PC / Networking 1970 Fax / Electronics 1955 Television / Mass Media 1940 Radio / Talking films 1925 Telephone / Silent films 1910 Telegraph / Photographyand then... représentation©DerrickdeKerckhove2008-2012
 adaptationetmiseàjour@pdewost
  • 9. • Moore • Metcalfe • Duplication Laws at stake Technology 50 million users in Books 400 years Radio 38 years TV 13 years Cable 10 years Internet 5 years iPod 3 years facebook 2 years Angry Birds 35 days ©HoraceDediu@asymco—Racetoabillion(January2013)