Digital sovereignty has become a key strategic objective for organisations seeking to manage geopolitical and data security risks. But translating this goal into implementation is challenging with many IT leaders yet to make appreciable progress.
What are some practical steps, then, for CIOs to carry out this shift effectively? Julio Guijarro, CTO of Red Hat EMEA, says the best place to start is by assessing current risks around digital sovereignty and then building a strategy accordingly. “You really need to understand your dependencies as a business,” he says, speaking in a CIO webcast.
Effective risk assessment is vital to avoid reactive, excessive moves such as completely removing all data from hyperscalers, regardless of the cost or migration time involved, advises Chris Jenkins, Senior Principal Chief Architect at Red Hat, EMEA. “Data underpins all of the workloads that you have. So, you can move the workload on-prem, but moving the data may take a very long time,” he says.
But by doing a proper risk assessment, organisations often realise “actually, we don’t need to move that data off the hyperscaler… It’s not doing anything classified or sensitive,” Jenkins says. This allows them to shift only the data that genuinely must be sovereign, achieving “minimum viable sovereignty” with a hybrid cloud approach.
For CIOs tempted to delegate, Jenkins has a final piece of advice: “This shouldn’t be something for CIS admin enterprise architects to be working on. This should be at the executive level because it’s such a huge, potentially huge paradigm shift for the organisation.”
To hear more practical insights into shifting toward digital sovereignty, watch the full webcast.
To watch the full Webcast Series ‘The rise of digital sovereignty’, click below
Read More from This Article: Toward a sovereign future: The practical steps IT leaders should take
Source: News

