{"id":6770,"date":"2023-03-29T09:21:46","date_gmt":"2023-03-29T09:21:46","guid":{"rendered":"https:\/\/heliview.com\/cyber-resilience-belgium\/?p=6770"},"modified":"2023-03-29T14:12:11","modified_gmt":"2023-03-29T14:12:11","slug":"achieve-digital-sovereignty-with-thales","status":"publish","type":"post","link":"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/","title":{"rendered":"Achieve Digital Sovereignty with Thales"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]<strong>Digital sovereignty refers to the ability to have control over your own digital destiny \u2013 the data, hardware, and software that you rely on and create.<\/strong><\/p>\n<p><em>How big is the digital sovereignty problem?<\/em><\/p>\n<p>Today the World Economic Forum estimates that over 92% of all data in the western world is stored on servers owned by very few US-based companies. This concentration creates a situation of high dependence and a challenge for business resilience. It also has the potential to impact law enforcement beyond the US. Consequently, digital sovereignty has become an important topic for many nation states, and new regulations emerge to manage these risks.[\/vc_column_text][vc_empty_space]        <div class=\"lgx-subscriber-area\" >\n            <form class=\"vc-whitepaper-form\">\n                <h3>Download the whitepaper<\/h3>\n                <p class=\"nieuwsbrief-validation-error nieuwsbrief-validation-error--message hidden\">\n                    One or more fields have not been filled in or have been filled in incorrectly.\n                <\/p>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        First name*<br>\n                        <input type=\"text\" name=\"firstname\" maxlength=\"50\" autocomplete=\"given-name\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Last name*<br>\n                        <input type=\"text\" name=\"lastname\" maxlength=\"50\" autocomplete=\"family-name\">\n                    <\/label>\n                <\/div>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        Company name*<br>\n                        <input type=\"text\" name=\"companyname\" value=\"\" size=\"50\" autocomplete=\"organization\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Role*<br>\n                        <input type=\"text\" name=\"workdescription\" value=\"\" size=\"100\" autocomplete=\"organization\">\n                    <\/label>\n                <\/div>\n                <label>\n                    Business email address*\n                    <input type=\"email\" id=\"EmailAddressNewsletter\" name=\"email\" \/>\n                <\/label>\n                <p>By clicking on sign up you give permission to be emailed, you will receive the whitepaper in your mailbox.<\/p>\n                <input onclick=\"Website.SubscribeToNewsletter('851292295242', '4febed1b-9b81-4c52-a2b3-57cb35b461c8')\" type=\"button\" class=\"lgx-btn\" value=\"Sign up\">\n                <div id=\"NewsletterSuccess\" class=\"nieuwsbrief-succes hidden\">Thank you, you will receive an email within a few minutes to download the whitepaper.<\/div>\n                <div id=\"NewsletterError\" class=\"nieuwsbrief-error hidden\">Unfortunately something went wrong; your request was not successful. Please try again later.<\/div>\n            <\/form>\n        <\/div>[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_wp_search][vc_wp_posts number=&#8221;5&#8243;][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]Digital sovereignty refers to the ability to have control over your own digital destiny \u2013 the data, hardware, and software that you rely on and create. How big is the digital sovereignty problem? Today the World Economic Forum estimates that over 92% of all data in the western world is stored on servers owned [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":6771,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[47],"tags":[],"class_list":["post-6770","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-whitepapers"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Achieve Digital Sovereignty with Thales - Cyber Resilience Conference<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Achieve Digital Sovereignty with Thales - Cyber Resilience Conference\" \/>\r\n<meta property=\"og:description\" content=\"[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]Digital sovereignty refers to the ability to have control over your own digital destiny \u2013 the data, hardware, and software that you rely on and create. How big is the digital sovereignty problem? Today the World Economic Forum estimates that over 92% of all data in the western world is stored on servers owned [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Cyber Resilience Conference\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:published_time\" content=\"2023-03-29T09:21:46+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2023-03-29T14:12:11+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2023\/03\/Thales-whitepaper-pic-e1680081510215.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\r\n\t<meta property=\"og:image:height\" content=\"350\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"miki\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"miki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/\",\"url\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/\",\"name\":\"Achieve Digital Sovereignty with Thales - Cyber Resilience Conference\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2023\/03\/Thales-whitepaper-pic-e1680081510215.png\",\"datePublished\":\"2023-03-29T09:21:46+00:00\",\"dateModified\":\"2023-03-29T14:12:11+00:00\",\"author\":{\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d\"},\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/#primaryimage\",\"url\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2023\/03\/Thales-whitepaper-pic-e1680081510215.png\",\"contentUrl\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2023\/03\/Thales-whitepaper-pic-e1680081510215.png\",\"width\":1140,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Achieve Digital Sovereignty with Thales\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/#website\",\"url\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/\",\"name\":\"Cyber Resilience Conference\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d\",\"name\":\"miki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/heliview.com\/cyber-resilience-belgium\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g\",\"caption\":\"miki\"}}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Achieve Digital Sovereignty with Thales - Cyber Resilience Conference","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/","og_locale":"en_US","og_type":"article","og_title":"Achieve Digital Sovereignty with Thales - Cyber Resilience Conference","og_description":"[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]Digital sovereignty refers to the ability to have control over your own digital destiny \u2013 the data, hardware, and software that you rely on and create. How big is the digital sovereignty problem? Today the World Economic Forum estimates that over 92% of all data in the western world is stored on servers owned [&hellip;]","og_url":"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/","og_site_name":"Cyber Resilience Conference","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_published_time":"2023-03-29T09:21:46+00:00","article_modified_time":"2023-03-29T14:12:11+00:00","og_image":[{"width":1140,"height":350,"url":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2023\/03\/Thales-whitepaper-pic-e1680081510215.png","type":"image\/png"}],"author":"miki","twitter_card":"summary_large_image","twitter_creator":"@HeliviewConf","twitter_site":"@HeliviewConf","twitter_misc":{"Written by":"miki","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/","url":"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/","name":"Achieve Digital Sovereignty with Thales - Cyber Resilience Conference","isPartOf":{"@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/#website"},"primaryImageOfPage":{"@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/#primaryimage"},"image":{"@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/#primaryimage"},"thumbnailUrl":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2023\/03\/Thales-whitepaper-pic-e1680081510215.png","datePublished":"2023-03-29T09:21:46+00:00","dateModified":"2023-03-29T14:12:11+00:00","author":{"@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d"},"breadcrumb":{"@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/#primaryimage","url":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2023\/03\/Thales-whitepaper-pic-e1680081510215.png","contentUrl":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2023\/03\/Thales-whitepaper-pic-e1680081510215.png","width":1140,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/cyber-resilience-belgium\/"},{"@type":"ListItem","position":2,"name":"Achieve Digital Sovereignty with Thales"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/#website","url":"https:\/\/heliview.com\/cyber-resilience-belgium\/","name":"Cyber Resilience Conference","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/cyber-resilience-belgium\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d","name":"miki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/heliview.com\/cyber-resilience-belgium\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g","caption":"miki"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/posts\/6770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/comments?post=6770"}],"version-history":[{"count":1,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/posts\/6770\/revisions"}],"predecessor-version":[{"id":6772,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/posts\/6770\/revisions\/6772"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/media\/6771"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/media?parent=6770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/categories?post=6770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-json\/wp\/v2\/tags?post=6770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}