VIDEO: Sovereignty and Resilience on a Geopolitical Scale

The influence of US tech giants on EU data

Nick Prescot, CyberKainos, CISO Advisory & Consultancy

In this episode, Nick Prescott, a seasoned fractional CISO, joins Henrik to explore the complex realities of digital sovereignty, privacy, and the influence of US tech giants on European data.

With blunt insights on surveillance, EU regulation, resilience mandates, and the illusion of control over our personal data, Nick shares why achieving true data independence in Europe is so difficult, and why it matters.

From GDPR to AI’s growing role in eroding privacy, this candid conversation is essential listening for CISOs navigating compliance, cloud strategy, and digital ethics in a world increasingly defined by borderless tech and relentless data capture topics range.

From: "No one logs on to Google saying, ‘Where are you storing my data?’" - a resigned, almost casual acceptance of how deeply embedded US tech is in our daily lives and how little control individuals exercise over their own data.

To: "Three months of independent operations with pretty much the cables cut." -  a stark, high-stakes scenario of national resilience planning, where governments prepare for complete digital isolation in the face of geopolitical threats.

This one’s a cracker!

Shadow AI: What Is It and Why Does It Matter?

Nick Prescot: CyberKainos, CISO Advisory & Consultancy

28.22
unpatched
More in Wrap up of CyberSync 2025
VIDEO: AI and the Future of Channel Marketing
VIDEO: AI and the Future of Channel Marketing

Everyone thinks they can write or call these days


VIDEO: What will it take to tackle AI-driven threats?
VIDEO: What will it take to tackle AI-driven threats?

Improving your incident response in 2025.


VIDEO: Defenders vs hackers
VIDEO: Defenders vs hackers

AI in security - hype cycle or real-time game changer?


VIDEO: Staff aren't villains, but their use of AI opens the door
VIDEO: Staff aren't villains, but their use of AI opens the door

Rethinking insider threats in the age of AI.


VIDEO: Two sides of the same cyber breach
VIDEO: Two sides of the same cyber breach

Unpatched: PR and cybersecurity.


VIDEO: Is Compliance Enough?
VIDEO: Is Compliance Enough?

Mind the Gap... Between Cybersecurity and Regulation


VIDEO: Shadow AI
VIDEO: Shadow AI

What Is It and Why Does It Matter? 


VIDEO: Manipulator or Listener
VIDEO: Manipulator or Listener

Navigating Emotional Intelligence in Cyber Security


Share this story

We're a community where IT security buyers can engage on their own terms.

We help you to better understand the security challenges associated with digital business and how to address them, so your company remains safe and secure.