Critical infrastructure defense: perspectives from the EU and USA cyber experts

User Rating:  / 0


I.Leroy1,2,, Université de Lorraine, Nancy, the French Republic; European Security and Defence College, Brussels, the Kingdom of Belgium, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

I.Zolotaryova*3,, Simon Kuznets Kharkiv National University of Econo­mics, Kharkiv, Ukraine, e-mail:  This email address is being protected from spambots. You need JavaScript enabled to view it.

* Corresponding author e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

повний текст / full article

Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu. 2023, (5): 165 - 170


To examine the components of cyber autonomy according to the insights of seasoned professionals from the European Union (EU) and the United States of America (USA). The value of each element will be calculated by obtaining data from structured in-depth interviews.

Through an investigation of different aspects of the research, we used the Delphi technique and research interviews include the option of the Interviewee Transcript Review (ITR). The Delphi method is processed in several rounds, usually three, with two rounds being considered as a minimum and in that respect the Delphi method helps our study explore, predict and identify the nature and fundamental elements of Cyber Autonomy.

The study findings demonstrate that elements such as “Policies”, “Reputation management”, and “Infrastructure and Architecture” hold substantial importance within Cyber Autonomy. These elements are considered critical for future perspectives. The research highlights the role of Cyber Autonomy in streamlining cybersecurity approaches, mitigating the impact of cyber-attacks, and safeguarding possible reputation damage. The study also highlights the importance of well-defined implementation methods and the organizational structure in successfully deploying Cyber Autonomy.

 The research demonstrates the interdisciplinary nature of cybersecurity and applies a comprehensive approach covering information security, information security policy, technical and economic aspects, noting the important role of governance in the company share value recovery process. Cyber Autonomy could offer a concept of defense reputation that helps to identify potential cyber threats that are further intensified in connection with the development of various platforms for remote control of artificial intelligence, distance learning, and opportunities for autonomous operation of enterprise systems, the influence of multinational companies on financial markets, and automated decision-making systems.

Practical value.
Experts’ insights are analyzed that can help to provide practical solutions for the Cyber Autonomy and risk management methods for implementing cyber resilience strategy for critical infrastructure. The research provides adjustments to existing cybersecurity frameworks and directives which consider new cyber elements of information security realities. The current study can be used as a guide to confidence-building measures for possible reputation and financial loss, reinforces protection actions against disinformation or negative cyber impact.

cyber autonomy, critical infrastructure, cyber-attack, risk mitigation


1. European Commission (2017). Joint Communication to the European Parliament and the Council: Resilience, Deterrence, and Defence: Building Strong Cybersecurity for the EU. Brussels: European Commission. Retrieved from

2. Leroy, I. (2021). Cyber Autonomy Toolbox – Project Management Digital Transformation. AARMS – Academic and Applied Research in Military and Public Management Science, (pp. 95-110). ISSN 2498-5392.

3. Leroy, I. (2021). Cyber autonomy for business: building a European cyber resilience. Views on the progress of CSDP. Luxembourg: Publications Office of the European Union. ISBN: 978-3-902275-48-6.

4. Knowles, W., Prince, S., Hutchison, D., Pagna Disso, J. F., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International Journal of Critical Infrastructure Protection, 9, 52-80.

5. Cartagena, S., Gosrani, V., Grewal, J., & Pikinska, J. (2020). Silent cyber assessment framework. British Actuarial Journal, 25, E2.

6. Fondation pour la Recherche Stratégique (n.d.). FRS: The European Union between strategic autonomy and technological sovereignty: impasses and opportunities. Retrieved from

7. Ministère des Armées France: REVUE STRATÉGIQUE DE DÉFENSE ET DE SÉCURITÉ NATIONALE (n.d.). Retrieved from

8. FIIA (2021). Report Strategic Autonomy and the transformation of the EU new agendas for the security, diplomacy, and trade technology. Finnish Institute of International Affairs. Retrieved from

9. Reinhold, T., & Reuter, C. (2023). Preventing the escalation of cyber conflicts: towards an approach to plausibly assure the non-involvement in a cyberattack. Z Friedens und Konflforsch.

10. EPRS (2016). European Parliament: CSDP. Cybersecurity in the EU Common Security and Defence Policy (CSDP). Challenges and risks for the EU. EPRS, European Parliamentary Research Service.

11. Kruszka, L., Klósak, M., & Muzolf, P. (2019). Critical Infrastructure Protection: Best Practices and Innovative Methods of Protection. Amsterdam: IOS Press.

12. Danet, D., & Desforges, A. (2021). Souveraineté numérique et autonomie stratégique en Europe: du concept aux réalités géopolitiques. Hérodote, 177-178(2-3), 179-195.

13. D’Ambrosio, A. (2014). Cybersecurity: Executive Order 13636 and the Critical Infrastructure Framework. Nova Science Publishers, Inc. ISBN-13: 978-1631176715.

14. Talesh, S. (2018). Data Breach, Privacy, and Cyber Insurance: How Insurance Companies Act as “Compliance Managers” for Businesses. Law & Social Inquiry, 43(2), 417-440.

15. European Union Agency for Cybersecurity (2015). For Digital Service Providers (NIS Directive) – ENISA ( Retrieved from

16. Ponemon Institute (2020). Cost of a Data Breach Report: European Union. Ponemon Institute LLC. Retrieved from

17. Linstone, H. A., & Turoff, M. (2021). Introduction, In Delphi method: Techniques and applications. Addison-Wesley, 12.

18. COUNCIL DECISION, CFSP 2020/1127: Amending Decision (CFSP) 2019/797 concerning restrictive measures against cyber-attacks threatening the Union or its Member States. Official Journal of the European Union. Brussels: 2020, Retrieved from

19. Jamshed, S. (2014). Qualitative research method-interviewing and observation. Journal of Basic and Clinical Pharmacy, 5(4), 87-88.



This Month
All days

Guest Book

If you have questions, comments or suggestions, you can write them in our "Guest Book"

Registration data

ISSN (print) 2071-2227,
ISSN (online) 2223-2362.
Journal was registered by Ministry of Justice of Ukraine.
Registration number КВ No.17742-6592PR dated April 27, 2011.


D.Yavornytskyi ave.,19, pavilion 3, room 24-а, Dnipro, 49005
Tel.: +38 (056) 746 32 79.
e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
You are here: Home Archive by issue 2023 Content №5 2023 Critical infrastructure defense: perspectives from the EU and USA cyber experts