{"id":31539,"date":"2026-05-19T18:43:16","date_gmt":"2026-05-19T16:43:16","guid":{"rendered":"https:\/\/www.itm.nrw\/listening-at-the-2026-data-protection-conference\/"},"modified":"2026-05-19T18:44:17","modified_gmt":"2026-05-19T16:44:17","slug":"listening-at-the-2026-data-protection-conference","status":"publish","type":"post","link":"https:\/\/www.itm.nrw\/en\/listening-at-the-2026-data-protection-conference\/","title":{"rendered":"Listening at the 2026 Data Protection Conference"},"content":{"rendered":"<p class=\"_77e1d0b9 aed4b93c fda23c3b _0efb07f0 cbbbbf30 _29c64e8c _2b342f76 d178cb34 _009f3bd3 _28c0365e d21f4ae5 dea7061d _692b38f3 _6867050f\"><span class=\"_4cecf8c6 _0b93d180\" tabindex=\"-1\" data-testid=\"expandable-text-box\">Today (May 19) presentation at the Handelsblatt Data Protection Conference in Berlin: &#8220;Digital sovereignty &#8211; data protection as a strategic success factor for cloud, data rooms and AI&#8221;.<br \/>\nThe focus was on the question of how Europe can operationalize digital sovereignty in practice: not as a buzzword, but as a legally, technically and economically resilient governance model. Data protection is not just compliance, but a strategic factor for cloud architectures, data rooms, AI governance and public procurement.<br \/>\nThis is particularly evident in the interplay between the GDPR, the Data Act, cloud switching rules, third-country access and the debate on the sovereign cloud. The storage location alone is not enough. The decisive factor is who actually exercises control over data, keys, administration and infrastructures.<br \/>\nMy core thesis: digital sovereignty is not created by concepts, but by enforceable options &#8211; portability, interoperability, key sovereignty, genuine exit strategies and resilient European infrastructures.<br \/>\nMany thanks to Handelsblatt for the invitation and the exciting discussion in Berlin.<br \/>\n<a class=\"_967cf84a _7c35eb2a\" href=\"https:\/\/www.linkedin.com\/search\/results\/all\/?keywords=%23datenschutz&#038;origin=HASH_TAG_FROM_FEED\"><span class=\"_99f3dd2e\"><strong>#Datenschutz<\/strong><\/span><\/a> <a class=\"_967cf84a _7c35eb2a\" href=\"https:\/\/www.linkedin.com\/search\/results\/all\/?keywords=%23digitalesouver%C3%A4nit%C3%A4t&#038;origin=HASH_TAG_FROM_FEED\"><span class=\"_99f3dd2e\"><strong>#DigitaleSouver\u00e4nit\u00e4t<\/strong><\/span><\/a> <a class=\"_967cf84a _7c35eb2a\" href=\"https:\/\/www.linkedin.com\/search\/results\/all\/?keywords=%23cloud&#038;origin=HASH_TAG_FROM_FEED\"><span class=\"_99f3dd2e\"><strong>#Cloud<\/strong><\/span><\/a> <a class=\"_967cf84a _7c35eb2a\" href=\"https:\/\/www.linkedin.com\/search\/results\/all\/?keywords=%23dataact&#038;origin=HASH_TAG_FROM_FEED\"><span class=\"_99f3dd2e\"><strong>#DataAct<\/strong><\/span><\/a> <a class=\"_967cf84a _7c35eb2a\" href=\"https:\/\/www.linkedin.com\/search\/results\/all\/?keywords=%23dsgvo&#038;origin=HASH_TAG_FROM_FEED\"><span class=\"_99f3dd2e\"><strong>#DSGVO<\/strong><\/span><\/a> <a class=\"_967cf84a _7c35eb2a\" href=\"https:\/\/www.linkedin.com\/search\/results\/all\/?keywords=%23ki&#038;origin=HASH_TAG_FROM_FEED\"><span class=\"_99f3dd2e\"><strong>#KI<\/strong><\/span><\/a> <a class=\"_967cf84a _7c35eb2a\" href=\"https:\/\/www.linkedin.com\/search\/results\/all\/?keywords=%23cybersecurity&#038;origin=HASH_TAG_FROM_FEED\"><span class=\"_99f3dd2e\"><strong>#Cybersecurity<\/strong><\/span><\/a> <a class=\"_967cf84a _7c35eb2a\" href=\"https:\/\/www.linkedin.com\/search\/results\/all\/?keywords=%23legaltech&#038;origin=HASH_TAG_FROM_FEED\"><span class=\"_99f3dd2e\"><strong>#LegalTech<\/strong><\/span><\/a> <a class=\"_967cf84a _7c35eb2a\" href=\"https:\/\/www.linkedin.com\/search\/results\/all\/?keywords=%23europeandigitalsovereignty&#038;origin=HASH_TAG_FROM_FEED\"><span class=\"_99f3dd2e\"><strong>#EuropeanDigitalSovereignty<\/strong><\/span><\/a> <a class=\"_967cf84a _7c35eb2a\" href=\"https:\/\/www.linkedin.com\/search\/results\/all\/?keywords=%23dsk26&#038;origin=HASH_TAG_FROM_FEED\"><span class=\"_99f3dd2e\"><strong>#DSK26<\/strong><\/span><\/a><br \/>\nPhotos Copyright by Handelsblatt \/ Dietmar Gust Photography<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-31520\" src=\"https:\/\/www.itm.nrw\/wp-content\/uploads\/2026\/05\/Hoeren_0005-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.itm.nrw\/wp-content\/uploads\/2026\/05\/Hoeren_0005-300x200.jpg 300w, https:\/\/www.itm.nrw\/wp-content\/uploads\/2026\/05\/Hoeren_0005-1024x683.jpg 1024w, https:\/\/www.itm.nrw\/wp-content\/uploads\/2026\/05\/Hoeren_0005-768x512.jpg 768w, https:\/\/www.itm.nrw\/wp-content\/uploads\/2026\/05\/Hoeren_0005-1536x1025.jpg 1536w, https:\/\/www.itm.nrw\/wp-content\/uploads\/2026\/05\/Hoeren_0005-2048x1366.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<figure id=\"attachment_31524\" aria-describedby=\"caption-attachment-31524\" style=\"width: 300px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-31524\" src=\"https:\/\/www.itm.nrw\/wp-content\/uploads\/2026\/05\/Hoeren_0007-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.itm.nrw\/wp-content\/uploads\/2026\/05\/Hoeren_0007-300x200.jpg 300w, https:\/\/www.itm.nrw\/wp-content\/uploads\/2026\/05\/Hoeren_0007-1024x683.jpg 1024w, https:\/\/www.itm.nrw\/wp-content\/uploads\/2026\/05\/Hoeren_0007-768x512.jpg 768w, https:\/\/www.itm.nrw\/wp-content\/uploads\/2026\/05\/Hoeren_0007-1536x1025.jpg 1536w, https:\/\/www.itm.nrw\/wp-content\/uploads\/2026\/05\/Hoeren_0007-2048x1366.jpg 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-31524\" class=\"wp-caption-text\">D<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Today (May 19) presentation at the Handelsblatt Data Protection Conference in Berlin: &#8220;Digital sovereignty &#8211; data protection as a strategic success factor for cloud, data rooms and AI&#8221;. The focus was on the question of how Europe can operationalize digital sovereignty in practice: not as a buzzword, but as a legally, technically and economically resilient [&#8230;]\n","protected":false},"author":7,"featured_media":31531,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1067],"tags":[],"class_list":["post-31539","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.itm.nrw\/en\/wp-json\/wp\/v2\/posts\/31539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itm.nrw\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itm.nrw\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itm.nrw\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itm.nrw\/en\/wp-json\/wp\/v2\/comments?post=31539"}],"version-history":[{"count":1,"href":"https:\/\/www.itm.nrw\/en\/wp-json\/wp\/v2\/posts\/31539\/revisions"}],"predecessor-version":[{"id":31541,"href":"https:\/\/www.itm.nrw\/en\/wp-json\/wp\/v2\/posts\/31539\/revisions\/31541"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itm.nrw\/en\/wp-json\/wp\/v2\/media\/31531"}],"wp:attachment":[{"href":"https:\/\/www.itm.nrw\/en\/wp-json\/wp\/v2\/media?parent=31539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itm.nrw\/en\/wp-json\/wp\/v2\/categories?post=31539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itm.nrw\/en\/wp-json\/wp\/v2\/tags?post=31539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}