{"id":4393,"date":"2026-04-03T11:17:10","date_gmt":"2026-04-03T11:17:10","guid":{"rendered":"https:\/\/cyber-ihedn.fr\/?p=4393"},"modified":"2026-04-15T16:06:12","modified_gmt":"2026-04-15T16:06:12","slug":"video-quels-leviers-pour-atteindre-lautonomie-strategique-numerique-participation-de-la-chaire-au-pdsf-2026","status":"publish","type":"post","link":"https:\/\/cyber-ihedn.fr\/en\/video-quels-leviers-pour-atteindre-lautonomie-strategique-numerique-participation-de-la-chaire-au-pdsf-2026\/","title":{"rendered":"[VIDEO] \u00ab\u00a0Quels leviers pour atteindre l&rsquo;autonomie strat\u00e9gique num\u00e9rique ?\u00a0\u00bb : participation de la Chaire au PDSF 2026"},"content":{"rendered":"<h3 style=\"text-align: center;\">Esther No\u00ebl co-hosted a round table discussion on the levers available to achieve strategic digital autonomy, as part of the third edition of the <a href=\"https:\/\/parisdefencestrategyforum.com\/fr\/\" target=\"_blank\" rel=\"noopener\">Paris Defence and Strategy Forum (PDSF)<\/a> of the\u2019<a href=\"https:\/\/www.defense.gouv.fr\/academ\" target=\"_blank\" rel=\"noopener\">Defence Academy of the \u00c9cole Militaire (ACADEM)<\/a><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4395 aligncenter\" src=\"https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/PDSF_2026-16.9.jpg\" alt=\"\" width=\"792\" height=\"445\" srcset=\"https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/PDSF_2026-16.9.jpg 792w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/PDSF_2026-16.9-300x169.jpg 300w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/PDSF_2026-16.9-768x432.jpg 768w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/PDSF_2026-16.9-18x10.jpg 18w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/PDSF_2026-16.9-748x420.jpg 748w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/PDSF_2026-16.9-696x391.jpg 696w\" sizes=\"auto, (max-width: 792px) 100vw, 792px\" \/><\/p>\n<p>What levers can be used to achieve strategic digital autonomy?<\/p>\n<p>This is the question that Esther No\u00ebl, researcher at the \u00abDigital and Cyber Sovereignty - IHEDN\u00bb Chair, and her colleagues at the IHEDN are asking. <a id=\"ember63\" class=\"ember-view\" tabindex=\"0\" href=\"https:\/\/www.linkedin.com\/in\/yvesauffret\/\">Yves Auffret<\/a>, a researcher at the\u2019<a class=\"aRNTmLbkEcaZXyEMkVwCJQwonOeCJVuwGE\" tabindex=\"0\" href=\"https:\/\/www.linkedin.com\/company\/ministere-de-la-defense---irsem-paris\/\" target=\"_self\" data-test-app-aware-link=\"\">Strategic Research Institute of the Ecole Militaire (IRSEM)<\/a>, have asked <a id=\"ember64\" class=\"ember-view\" tabindex=\"0\" href=\"https:\/\/www.linkedin.com\/in\/joffrey-c%C3%A9lestin-urbain-4a6b5089\/\">Joffrey C\u00e9lestin-Urbain<\/a> (Chairman of the <a class=\"aRNTmLbkEcaZXyEMkVwCJQwonOeCJVuwGE\" tabindex=\"0\" href=\"https:\/\/www.linkedin.com\/company\/campuscyberfr\/\" target=\"_self\" data-test-app-aware-link=\"\">Cyber Campus<\/a>) and <a id=\"ember65\" class=\"ember-view\" tabindex=\"0\" href=\"https:\/\/www.linkedin.com\/in\/aude-gery-a4700478\/\">Aude G\u00e9ry<\/a> (legal advisor at\u00a0<a class=\"aRNTmLbkEcaZXyEMkVwCJQwonOeCJVuwGE\" tabindex=\"0\" href=\"https:\/\/www.linkedin.com\/company\/viginum\/\" target=\"_self\" data-test-app-aware-link=\"\">VIGINUM<\/a>), at the round table scheduled as part of the 2026 edition of the\u00a0<a href=\"https:\/\/parisdefencestrategyforum.com\/fr\/\" target=\"_blank\" rel=\"noopener\">Paris Defence and Strategy Forum (PDSF)<\/a>, held at the \u00c9cole Militaire, Paris 7, from 24 to 26 March 2026.<\/p>\n<p>The discussions highlighted the solutions, both European and national, that are emerging to meet the economic, legal and democratic challenges posed by digital sovereignty today.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.youtube.com\/watch?v=vfYjqZenNa0\" target=\"_blank\" rel=\"noopener\"><span class=\"td_btn td_btn_md td_default_btn\">see the round table<\/span><\/a><\/p>\n<p><a href=\"https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/oLMK3HPIDSIbM3.jpg\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4397 size-large aligncenter\" src=\"https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/oLMK3HPIDSIbM3-1024x683.jpg\" alt=\"\" width=\"696\" height=\"464\" srcset=\"https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/oLMK3HPIDSIbM3-1024x683.jpg 1024w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/oLMK3HPIDSIbM3-300x200.jpg 300w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/oLMK3HPIDSIbM3-768x512.jpg 768w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/oLMK3HPIDSIbM3-1536x1024.jpg 1536w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/oLMK3HPIDSIbM3-18x12.jpg 18w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/oLMK3HPIDSIbM3-630x420.jpg 630w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/oLMK3HPIDSIbM3-1260x840.jpg 1260w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/oLMK3HPIDSIbM3-696x464.jpg 696w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/oLMK3HPIDSIbM3-1392x928.jpg 1392w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/oLMK3HPIDSIbM3-1068x712.jpg 1068w, https:\/\/cyber-ihedn.fr\/wp-content\/uploads\/2026\/04\/oLMK3HPIDSIbM3.jpg 1579w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Esther No\u00ebl a co-anim\u00e9 une table ronde consacr\u00e9e aux leviers disponibles pour atteindre l&rsquo;autonomie strat\u00e9gique num\u00e9rique, dans le cadre de la troisi\u00e8me \u00e9dition du Forum de Paris pour la d\u00e9fense et la strat\u00e9gie (PDSF) de l\u2019Acad\u00e9mie de d\u00e9fense de l&rsquo;\u00c9cole militaire (ACADEM) Quels leviers peut-on utliser atteindre l&rsquo;autonomie strat\u00e9gique num\u00e9rique ? C&rsquo;est la question qu&rsquo;Esther [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4394,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[356],"tags":[485,571,582,580,547,572,574,577,576,579,575,573,581,578],"class_list":{"0":"post-4393","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-activites-participation-de-la-chaire-a-un-evenement","8":"tag-academ","9":"tag-academie-de-defense-de-lecole-militaire","10":"tag-aude-gery","11":"tag-campus-cyber","12":"tag-esther-noel","13":"tag-forum-de-paris-pour-la-defense-et-la-strategie","14":"tag-fpds","15":"tag-institut-de-recherche-strategique-de-lecole-militaire","16":"tag-irsem","17":"tag-joffrey-celestin-urbain","18":"tag-paris-defence-and-strategy-forum","19":"tag-pdsf","20":"tag-viginum","21":"tag-yves-auffret"},"_links":{"self":[{"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/4393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/comments?post=4393"}],"version-history":[{"count":8,"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/4393\/revisions"}],"predecessor-version":[{"id":4406,"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/posts\/4393\/revisions\/4406"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/media\/4394"}],"wp:attachment":[{"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/media?parent=4393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/categories?post=4393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-ihedn.fr\/en\/wp-json\/wp\/v2\/tags?post=4393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}