Level 3 · Specialization · 4 to 5 days

Digital
Sovereignty

Data, algorithms, infrastructure, cyber and value chain — regaining control

5 modules to build operational mastery of digital sovereignty. From data classification to supplier contractual clauses, through cyber resilience and sovereign infrastructure.

This learning path at a glance
5
Modules
4–5d
Duration
C-Level
Target Audience
Lvl.3
Level

Learning Sequence · 5 steps

From data to the value chain

MA establishes sovereign classification and lineage. MC masters algorithmic models. MD builds resilient infrastructure. MH secures the cyber perimeter. MK extends sovereignty to suppliers.

MA
Step 1 · Data CDO · DPO · CIO GDPR · Cloud Act · DORA
Data Sovereignty
Operational classification, sovereign Data Lineage, Cloud Act vs GDPR and sovereignty roadmap.
1 day
Program
Mastery & classification
  • Operational data classification — 4 sensitivity levels
  • Sovereign Data Lineage — trace, audit, justify
  • Cloud Act vs GDPR — the Gordian knot of sovereignty
Assessment & roadmap
  • Data sovereignty assessment — 5 evaluation axes
  • Identifying data exposed to foreign jurisdictions
  • Data sovereignty roadmap — prioritization and milestones
Deliverables
  • 🗂️
    Sovereign Classification Grid
    4 levels x regulatory criteria — applicable to any data inventory
  • 🔗
    Sovereign Data Lineage Diagram
    Annotated flows with jurisdictions, transfer points and legal obligations
  • 🗺️
    Data Sovereignty Assessment
    5 axes — hosting, access, transfer, encryption, auditability
  • 📅
    Sovereignty Roadmap · 18 months
    Actions prioritized by risk level — milestones and owners
📖
Self-Learning Module Available
Self Learning — Data Sovereignty
data → algorithmic models
MC
Step 2 · Algorithms CDO · CTO · AI Architects EU AI Act
Algorithmic Sovereignty
Model mastery, algorithm intellectual property and EU AI Act obligations for high-risk systems.
1 day
Program
  • What mastering a model truly means — 5 dimensions
  • What the EU AI Act imposes on high-risk AI systems
  • Who owns the model you trained?
  • Build vs Buy vs Fine-tune — strategic sovereignty decision
  • Explainability and auditability — conditions for mastery
  • Third-party LLM dependency — risks and mitigation strategies
Deliverables
  • ⚖️
    Algorithmic Mastery Grid
    5 dimensions — access, explainability, ownership, auditability, portability
  • 📋
    EU AI Act High-Risk Systems Checklist
    Operational obligations — documentation, testing, human supervision
  • 🧭
    Build / Buy / Fine-tune Matrix
    Decision criteria based on required sovereignty level
📖
Self-Learning Module Available
Self Learning — Algorithmic Sovereignty
algorithms → infrastructure foundation
MD
Step 3 · Infrastructure CTO · CIO · Architects DORA · NIS 2
Sovereign Infrastructure
Anatomy of a sovereign infrastructure, ICT concentration risk and building a resilient foundation.
1 day
Program
  • Anatomy of a sovereign infrastructure — the 6 components
  • ICT concentration risk — the systemic DORA threat
  • Sovereign cloud, on-premise, hybrid — which strategy?
  • Building a resilient and sovereign infrastructure
  • Portability and reversibility — cloud provider exit strategy
  • Sovereignty certification criteria — SecNumCloud, EUCS
Deliverables
  • 🏗️
    Sovereign Architecture Diagram
    6 annotated components — hosting, network, encryption, access, audit, exit
  • ⚠️
    ICT Concentration Risk Radar
    Supplier dependency mapping and failure scenarios
  • 🚪
    Cloud Reversibility Plan
    Documented exit strategy — conditions, timelines, estimated costs
📖
Self-Learning Module Available
Self Learning — Sovereign Infrastructure
infrastructure → security and cyber sovereignty
MH
Step 4 · Cyber sovereignty CISO · CIO · Risk NIS 2 · DORA
Cyber Sovereignty
4 forms of cyber dependency, sovereign SOC, operational NIS 2 and assessment grid.
1 day
Program
  • The 4 forms of cyber dependency threatening sovereignty
  • Internal, outsourced or hybrid SOC — the sovereign choice
  • Operational NIS 2 — what concretely changes in 2026
  • DORA cyber — resilience requirements for financial entities
  • Sovereign incident management — from detection to notification
  • Assessment grid — cyber sovereignty evaluation
Deliverables
  • 🔍
    Cyber Sovereignty Assessment Grid
    4 dimensions x indicators — objective assessment in 2 hours
  • 🛡️
    SOC Decision Matrix
    Internal vs outsourced vs hybrid — sovereignty criteria and trade-offs
  • 📋
    NIS 2 / DORA Cyber Compliance Plan
    Obligations by entity type — milestones and operational owners
📖
Self-Learning Module Available
Self Learning — Cyber Sovereignty
cyber → value chain sovereignty
MK
Step 5 · Ecosystem & suppliers CDO · CPO · Procurement DORA · Critical third parties
Value Chain Sovereignty
Digital third parties, supplier scoring and 8 sovereignty propagation clauses in contracts.
½ day
Program
  • Who are your digital third parties — and where are the risks
  • Supplier sovereignty scoring method
  • The 8 sovereignty propagation clauses in contracts
  • Dependency concentration — detection and remediation plans
  • Critical third-party governance — DORA obligations
Deliverables
  • 📊
    Supplier Scoring Matrix
    Weighted sovereignty criteria — jurisdiction, reversibility, auditability, concentration
  • 📝
    Sovereignty Contract Clauses
    8 standard clauses to include in any contract with a critical digital third party
  • 🗺️
    Digital Third-Party Map
    Consolidated inventory — dependency risks by supplier and action plan
📖
Self-Learning Module Available
Self Learning — Value Chain Sovereignty
MAData
MCAlgorithmic
MDInfrastructure
MHCyber
MKValue Chain
4–5 days
Total Duration
Prerequisite · Confirmed CIO, CISO or architecture experience
Build an operational digital sovereignty strategy
This learning path is designed for organizations subject to strict regulations (DORA, NIS 2, GDPR) seeking to reduce their dependency on non-European providers.