
practical implementation, offering valuable lessons
for policymakers and CI operators, particularly in
similar-sized nations or regions navigating similar cy-
bersecurity landscapes.
The study’s validity depends on accurate data col-
lection, but the subjective nature of thematic analy-
sis introduces the possibility of interpretation bias.
Despite using techniques like member checking, the
findings may be influenced by participants’ articula-
tion and the researcher’s interpretation. Participants
received copies of their transcripts for validation.
Interpretation subjectivity challenges qualitative
research reliability. Efforts were made to ensure that
the inherent subjectivity of qualitative analysis hin-
ders accurate translations but perfect consistency. The
study’s findings, limited by sample size and partic-
ipant demographics, may not be broadly applicable.
Replicating interview conditions precisely is difficult
due to the dynamic nature of human interactions. Ex-
tending results to diverse populations should be done
cautiously, recognizing these limitations for future re-
search.
Future research could expand into more detailed
analysis by studying an entire strategy implementa-
tion process within a selected organization, identify-
ing internal challenges more precisely through inter-
views or questionnaires at various hierarchical levels.
Another valuable area of research would be to inves-
tigate national cybersecurity agencies in more detail
to identify national coordination problems. Replicat-
ing similar research in other European countries could
reveal common challenges and potentially offer new
solutions for foreign organizations or governments to
implement.
REFERENCES
115th Congress of the United States (2018). Clarifying
Lawful Overseas Use of Data (CLOUD) Act. Pub-
lic Law No: 115-141. https://www.congress.gov/bill/
115th-congress/house-bill/4943.
Ait Maalem Lahcen, R., Caulkins, B., Mohapatra, R., and
Kumar, M. (2020). Review and insight on the be-
havioural aspects of cybersecurity. Cybersecurity,
3(10).
Alessandro, A., Fabio, N., and Giulia, P. (2020). Under-
standing the management of cyber resilient systems.
Computers & Industrial Engineering, 149:1–18.
Amin, H., Amin, R., Stefano, G., Mohsen, A., Riccardo,
T., Avi, O., and Katherine, B. (2020). A review of
cybersecurity incidents in the water sector. Journal of
Environmental Engineering, 146(5).
Antova, G. (2020). Wie k
¨
onnen wir die digitalisierung
der kritischen infrastrukturen sicher gestalten?
https://digitaleweltmagazin.de/wie-koennen-wir-die-
digitalisierung-der-kritischen-infrastrukturen-sicher-
gestalten/. Accessed: 2024-04-12.
Beil, L. (2023). Kritische infrastruktur in gefahr? https://
www.tagesschau.de/wissen/technologie/infrastruktur-
cybersicherheit-cyberattacken-101.html. Accessed:
2024-04-12.
Bundesamt f
¨
ur Sicherheit in der Informationtechnik (2022).
Die lage der it-sicherheit in deutschland 2022. Tech-
nical report, Bundesamt f
¨
ur Sicherheit in der Informa-
tiontechnik, Berlin.
CERT governmental Luxembourg (2023). Govcert. https:
//www.govcert.lu/en/. Accessed: 2023-05-11.
Chaudhary, S., Gkioulos, V., and Katsikas, S. (2023). A
quest for research and knowledge gaps in cyberse-
curity awareness for small and medium-sized enter-
prises. Computer Science Review, 50.
Chowdhury, N. and Gkioulos, V. (2021). Cyber security
training for critical infrastructure protection: A litera-
ture review. Computer Science Review, 40.
Creos (2022). Le Groupe Encevo victime d’une cy-
berattaque. https://www.creos-net.lu/actualites/
actualites/article/le-groupe-encevo-victime-dune-
cyberattaque.html. Accessed: 2023-05-28.
Cybersecurity Luxembourg (2020). National cybersecu-
rity strategy iv (ncss iv). https://www.cybersecurity.
lu/strategy. Accessed: 2023-05-11.
Denscombe, M. (2021). The Good Research Guide. Open
University Press, New York.
European Commission (2022). Proposal for a regulation
of the european parliament and of the council on
horizontal cybersecurity requirements for prod-
ucts with digital elements (cyber resilience act).
https://eur-lex.europa.eu/resource.html?uri=cellar:
864f472b-34e9-11ed-9c68-01aa75ed71a1.0001.02/
DOC
1&format=PDF. Accessed: 2024-04-12.
European Parliament and the Council of the European
Union (2016). Directive concerning measures for a
high common level of security of network and infor-
mation systems across the union. Official Journal of
the European Union. Directive (EU) 2016/1148.
European Parliament and the Council of the European
Union (2019). Regulation (eu) 2019/881 of the eu-
ropean parliament and of the council of 17 april 2019
on enisa (the european union agency for cybersecu-
rity) and on information and communications technol-
ogy cybersecurity certification and repealing regula-
tion (eu) no 526/2013 (cybersecurity act). https://eur-
lex.europa.eu/eli/reg/2019/881/oj. Accessed: 2024-
04-12.
European Parliament and the Council of the European
Union (2022). Directive on measures for a high com-
mon level of cybersecurity across the union, repealing
directive (eu) 2016/1148. Official Journal of the Eu-
ropean Union. Directive (EU) 2022/2555.
Gonc¸alo, A. T., Miguel, M. d. S., and Ruben, P. (2019). The
critical success factors of gdpr implementation: a sys-
tematic literature review. Digital Policy, Regulation
and Governance, 21(4).
Grigalashvili, V. (2022). The essence of critical infrastruc-
ture in the european union, nato and g7 countries.
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
24