

Beyond Location: Achieving Data Sovereignty in Email & File Transfer and Collaboration with M365/Google
Information
Email and file collaboration remain the weakest link in data sovereignty. Even with M365/Google, extraterritorial access, provider visibility, and fragile transport security can undermine confidentiality, especially for sensitive data in financial services, public services, and healthcare. This talk shows how to move from a NIS2/ISO 27001 risk analysis to concrete, auditable measures that keep you in control of who can read, share, and retain information—independent of storage location.
We’ll map the key risks (provider access, human error, server authentication gaps, key management, auditability) and demonstrate five practical fixes you can implement within 90 days: zero/no-access encryption on top of M365/Google, stronger server authentication and policy enforcement, recipient authentication tied to classification, human-error prevention at the point of send, and retention/keys/audit aligned to compliance. Expect a pragmatic blueprint you can apply immediately, without ripping and replacing your productivity stack.
Speakers

