{"id":695428,"date":"2026-04-22T00:00:00","date_gmt":"2026-04-22T00:00:00","guid":{"rendered":"https:\/\/enterpriseam.com\/egypt\/?post_type=hardhat&#038;p=695428"},"modified":"2026-04-22T03:42:17","modified_gmt":"2026-04-22T03:42:17","slug":"egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty","status":"publish","type":"hardhat","link":"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/","title":{"rendered":"Egypt shifts digital strategy from efficiency to national sovereignty"},"content":{"rendered":"<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"> <strong>Talks about the c<\/strong><strong>ountry\u2019s digital transformation efforts are no longer just about <\/strong><strong>efficiency, but about sovereignty and resilience too. <\/strong>Digital sovereignty and data sovereignty were highlighted by policymakers and the private sector players EnterpriseAM spoke to as important concepts that go beyond just the building of data centers within the borders of the country.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Digital sovereignty isn\u2019t just about where the data resides<\/strong> \u2014 it\u2019s \u201cthe ability of an institution or the state to control its technological infrastructure and its own data and information,\u201d former CIT Ministry Legislative Committee head and digital legislation consultant Mohamed Hegazy tells EnterpriseAM. IBM North and East Africa General Manager Marwa Abbas, in comments to EnterpriseAM, similarly described digital sovereignty as \u201cthe ability for organizations and nations to operate technology on their own terms \u2014 maintaining demonstrable control over data, infrastructure, and operations, regardless of where systems are physically located.\u201d<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Why this matters: <\/strong>\u201cEgyptian national security is no longer confined to securing land, sea, and air borders. It has expanded to include virtual borders or what we know as cyberspace,\u201d Supreme Cybersecurity Council consultant Waleed Haggag tells us. While the question of who controls the data may seem like a technicality, it can make private or public institutions \u201ca hostage to foreign suppliers, platforms, or legislation, especially during critical times like wars and crises,\u201d Hegazy tells us.<\/p>\n<p style=\"border-right-style:solid;border-top-width:0pt;border-left-style:solid;orphans:2;text-align:left;padding:0;margin:0;border-right-width:0pt;line-height:1.15;border-left-width:0pt;border-top-style:solid;border-bottom-width:0pt;border-bottom-style:solid;widows:2\"><strong>\u201cSovereignty helps ensure the uninterrupted operation of vital state facilities<\/strong>,\u201d Haggag tells us, explaining how having data stored locally makes it \u201cdifficult for hostile entities to exploit vulnerabilities in international servers to reach us.\u201d \u201cThis plays a pivotal role during geopolitical tensions that may lead to internet service cuts or restrictions by foreign powers,\u201d he added.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Digital transformation is no longer defined by speed and efficiency alone \u2014 resilience is <\/strong><strong>now a defining metric<\/strong>,\u201d Abbas tells us. \u201cRecent global disruptions, from large-scale outages to geopolitical instability, have demonstrated that digital infrastructure is now part of a nation\u2019s critical fabric. When systems fail, the impact extends beyond IT to economies, public services, and public trust,\u201d she explained.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Digital sovereignty is also about accountability<\/strong>, as having data based physically and statutorily in Egypt \u201censures that any breach or leak falls under Egyptian [\u2026] jurisdiction\u201d and means we don\u2019t have to rely on \u201cforeign entities that might procrastinate or refuse to cooperate,\u201d Haggag says.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>The <\/strong><strong>National Cybersecurity Strategy has already made significant progress onshoring <\/strong><strong>government data<\/strong>, with a host of new data centers \u2014 albeit limited in number and size when compared to our regional peers \u2014 that now host \u201call sensitive government databases within Egypt,\u201d according to Haggag. Continuity of services is also a priority with \u201cisolated sandboxes used to ensure that citizen services remain unaffected by outages or breaches in global commercial clouds.\u201d<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Vital sectors like water, electricity, and health have additional layers of protection<\/strong>, with the Supreme Cybersecurity Council mandating that the core operational technology networks for critical utilities be \u201ccompletely isolated from the public internet and administrative networks,\u201d Haggag tells us. Encryption and locally generated and managed keys are also mandated to prevent foreign manufacturers from having a backdoor.<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>Before anything\u2019s connected, all imported hardware and software follow \u201cstrict<\/strong><strong> requirements set for inspecting and testing,\u201d<\/strong> Haggag says. This step is taken before introducing anything to critical infrastructure to ensure that the components are \u201cfree of pre-planted malicious code or electronic components that allow remote exploitation.\u201d<\/p>\n<p style=\"padding:0;margin:0;line-height:1.15;orphans:2;widows:2;text-align:left\"><strong>But the problem is that \u201cexcessive legislative rigor can become an obstacle\u201d to attracting <\/strong><strong>global tech companies to Egypt<\/strong>, while on the flipside, \u201claxity can turn citizens' data into economic fuel for global companies without any return for the state,\u201d according to Hegazy. Upcoming legislation on the topic \u201cmust achieve this balance by adopting and applying international standards rather than reinventing the [regulatory] wheel,\u201d he added.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cEgyptian national security is no longer confined to securing land, sea, and air borders,\u201d Supreme Cybersecurity Council consultant Waleed Haggag tells EnterpriseAM<\/p>\n","protected":false},"featured_media":695429,"menu_order":0,"template":"","categories":[7235],"tags":[7094,12583,72,7116,7448],"class_list":["post-695428","hardhat","type-hardhat","status-publish","has-post-thumbnail","hentry","category-hardhat","tag-ai","tag-data-centres","tag-enterpriseam","tag-hardhat","tag-tech","wpautop","entry"],"acf":{"mongo_id":"cf7c8fd0-75ca-4cf4-b47f-ca714dc91157","order":"13","is_powered_by":false,"story_type":"2","photo_url":"https:\/\/ent.news\/2026\/4\/1058.jpg","photo_position":"above","homepage_title":"","full_issue_title":"Digital sovereignty has an important role to play in the digital transformation","related_issue":[695406],"teaser":"\u201cEgyptian national security is no longer confined to securing land, sea, and air borders,\u201d Supreme Cybersecurity Council consultant Waleed Haggag tells EnterpriseAM"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Egypt shifts digital strategy from efficiency to national sovereignty - EnterpriseAM Egypt<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Egypt shifts digital strategy from efficiency to national sovereignty\" \/>\n<meta property=\"og:description\" content=\"\u201cEgyptian national security is no longer confined to securing land, sea, and air borders,\u201d Supreme Cybersecurity Council consultant Waleed Haggag tells EnterpriseAM\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/\" \/>\n<meta property=\"og:site_name\" content=\"EnterpriseAM Egypt\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-22T03:42:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/ent.news\/2026\/4\/1058.jpg?fit=%2C&ssl=1\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/\",\"url\":\"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/\",\"name\":\"Egypt shifts digital strategy from efficiency to national sovereignty - EnterpriseAM Egypt\",\"isPartOf\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/ent.news\/2026\/4\/1058.jpg?fit=%2C&ssl=1\",\"datePublished\":\"2026-04-22T00:00:00+00:00\",\"dateModified\":\"2026-04-22T03:42:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/ent.news\/2026\/4\/1058.jpg?fit=%2C&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/ent.news\/2026\/4\/1058.jpg?fit=%2C&ssl=1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/enterpriseam.com\/egypt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hardhat\",\"item\":\"https:\/\/enterpriseam.com\/egypt\/hardhats\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Egypt shifts digital strategy from efficiency to national sovereignty\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#website\",\"url\":\"https:\/\/enterpriseam.com\/egypt\/\",\"name\":\"EnterpriseAM\",\"description\":\"The State of the Nation\",\"publisher\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enterpriseam.com\/egypt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#organization\",\"name\":\"EnterpriseAM\",\"url\":\"https:\/\/enterpriseam.com\/egypt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ent.news\/internal\/240894.svg\",\"contentUrl\":\"https:\/\/ent.news\/internal\/240894.svg\",\"caption\":\"EnterpriseAM\"},\"image\":{\"@id\":\"https:\/\/enterpriseam.com\/egypt\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Egypt shifts digital strategy from efficiency to national sovereignty - EnterpriseAM Egypt","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/","og_locale":"en_US","og_type":"article","og_title":"Egypt shifts digital strategy from efficiency to national sovereignty","og_description":"\u201cEgyptian national security is no longer confined to securing land, sea, and air borders,\u201d Supreme Cybersecurity Council consultant Waleed Haggag tells EnterpriseAM","og_url":"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/","og_site_name":"EnterpriseAM Egypt","article_modified_time":"2026-04-22T03:42:17+00:00","og_image":[{"url":"https:\/\/i0.wp.com\/ent.news\/2026\/4\/1058.jpg?fit=%2C&ssl=1","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/","url":"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/","name":"Egypt shifts digital strategy from efficiency to national sovereignty - EnterpriseAM Egypt","isPartOf":{"@id":"https:\/\/enterpriseam.com\/egypt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/#primaryimage"},"image":{"@id":"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/ent.news\/2026\/4\/1058.jpg?fit=%2C&ssl=1","datePublished":"2026-04-22T00:00:00+00:00","dateModified":"2026-04-22T03:42:17+00:00","breadcrumb":{"@id":"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/#primaryimage","url":"https:\/\/i0.wp.com\/ent.news\/2026\/4\/1058.jpg?fit=%2C&ssl=1","contentUrl":"https:\/\/i0.wp.com\/ent.news\/2026\/4\/1058.jpg?fit=%2C&ssl=1"},{"@type":"BreadcrumbList","@id":"https:\/\/enterpriseam.com\/egypt\/hardhats\/egypt-shifts-digital-strategy-from-efficiency-to-national-sovereignty\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/enterpriseam.com\/egypt\/"},{"@type":"ListItem","position":2,"name":"Hardhat","item":"https:\/\/enterpriseam.com\/egypt\/hardhats\/"},{"@type":"ListItem","position":3,"name":"Egypt shifts digital strategy from efficiency to national sovereignty"}]},{"@type":"WebSite","@id":"https:\/\/enterpriseam.com\/egypt\/#website","url":"https:\/\/enterpriseam.com\/egypt\/","name":"EnterpriseAM","description":"The State of the Nation","publisher":{"@id":"https:\/\/enterpriseam.com\/egypt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enterpriseam.com\/egypt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enterpriseam.com\/egypt\/#organization","name":"EnterpriseAM","url":"https:\/\/enterpriseam.com\/egypt\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enterpriseam.com\/egypt\/#\/schema\/logo\/image\/","url":"https:\/\/ent.news\/internal\/240894.svg","contentUrl":"https:\/\/ent.news\/internal\/240894.svg","caption":"EnterpriseAM"},"image":{"@id":"https:\/\/enterpriseam.com\/egypt\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/hardhat\/695428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/hardhat"}],"about":[{"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/types\/hardhat"}],"version-history":[{"count":1,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/hardhat\/695428\/revisions"}],"predecessor-version":[{"id":695465,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/hardhat\/695428\/revisions\/695465"}],"acf:post":[{"embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/issue\/695406"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/media\/695429"}],"wp:attachment":[{"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/media?parent=695428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/categories?post=695428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enterpriseam.com\/egypt\/wp-json\/wp\/v2\/tags?post=695428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}