Purpose – in this article, the authors propose a management model for Critical Infrastructure cybersecurity,
further development of a model developed by Limba, Plėta, Agafonov, and Damkus (2017).
Research methodology – methodology consists of researching the best practices in cybersecurity management for Critical
Infrastructures and evaluating the best element to be included. The article offers an overview of the model, including
structure and objectives, and further analysis that focuses on pre-existing CI management frameworks.
Findings – main results show that, although previously published protocols and models contain valuable elements, there
is still the need to implement a comprehensive model which can be applied to every type of CI.
Research limitations – research might have been limited due to the lack of a unitary approach to cybersecurity management
for CI, meaning the lack of possibility of reference to a similar model and approach.
Practical implications – model which is presented in the article could offer a new approach to CI protection strategies
and could be the beginning of a more structured approach towards their protection.
Originality/Value – model was created by the authors with references to past published protocols and models, which
are present in the quotation in the text as well as the bibliography.