Summary
The Heise Academy offers a five-part classroom series on digital sovereignty, led by expert Manuel "HonkHase" Atug. The sessions take place from May to June 2026 and cover dependency identification, cloud and AI usage, decentralized communication, open-source alternatives, and IT security. Each session lasts four hours and is conducted live with Q&A; recordings remain available to participants.
People
- Manuel "HonkHase" Atug (Expert, Course Instructor)
Topics
- Digital Sovereignty
- Cloud Computing
- Open-Source Software
- IT Security
- Data Independence
Clarus Lead
In the face of growing geopolitical tensions and corporate dependencies, digital self-determination has become a strategic necessity for organizations. The course addresses the central tension: How can risks from uncontrolled data flows and vendor lock-in be mitigated without completely overturning productive workflows?
Detailed Summary
The training series is based on the diagnosis that cloud services, AI systems, and communication platforms are dominated by a few international providers. The course design follows an escalation logic: participants first learn to contextualize political developments and their IT implications before becoming familiar with concrete de-risking strategies – alternatives to radical "decoupling" that preserve existing habits.
Two problem areas form the thematic core: (1) Data control in cloud and AI: The course demonstrates vendor lock-in avoidance and emergency exit strategies. (2) Platform independence in communication: Decentralized email is positioned as an alternative to centralized solutions like Microsoft 365; Linux and open-source software as ways out of Windows dependency.
The concluding security module connects sovereignty with protection: complete data processing within the EU, compliance with European legislation, and open-source security tools as cornerstones of genuine IT independence.
Key Statements
- Digital dependency arises from corporate monopolies; systematic identification enables targeted de-risking
- Decentralized alternatives (email, Linux, open-source office) offer functionality equivalent to commercial solutions without platform lock-in
- Sovereign IT infrastructure (EU data processing, European compliance) demonstrably reduces security risks
Critical Questions
Evidence (a): What concrete data flow studies or security audits substantiate the claimed risks of uncontrolled data outflows from the mentioned providers?
Conflicts of Interest (b): To what extent does the Heise Academy itself profit from marketing open-source and EU-centric solutions, and how could this influence course design?
Causality (c): Is the assumption justified that "de-risking instead of decoupling" is technically and organizationally practical, or do implementation complexities arise that the course does not address?
Feasibility (d): How high are the real transaction costs (training, migration, maintenance) when switching to open-source infrastructures compared to proprietary solutions?
Counter-Hypotheses (e): Could the focus on vendor independence increase security risks if open-source solutions undergo less established security audits?
Source Directory
Primary Source: Digital Sovereignty in Practice: Make Cloud, AI and Security Crisis-Proof – https://www.heise.de/news/Digitale-Souveraenitaet-in-der-Praxis-Cloud-KI-und-Security-krisensicher-machen-11222625.html
Verification Status: ✓ 2025
This text was created with the support of an AI model. Editorial Responsibility: clarus.news | Fact-Checking: 2025