Cyber Sovereignty: A Snapshot from a Field in Motion