The article examines the peculiarities of forming a cybersecurity management system for enterprises in wartime. The paper presents the theoretical and applied aspect of this issue.
 The purpose of the article is to study the peculiarities and theoretical and applied aspects of forming a cybersecurity management system for enterprises in wartime. The main methods used in the study are analysis, synthesis, statistical methods, etc.
 The importance of enterprise cybersecurity management for their economic security and achievement of the required level of national security is substantiated. A review and analysis of literary sources on the problem of defining the essence of the concept of "cybersecurity" is carried out. It is proved that for effective cybersecurity management it is advisable to classify cyberattacks. It is also advisable to add the following classification features to the existing classification features: "by the level of insurance", i.e. whether it is possible to insure (over-insure) against the threat itself and its consequences, and "by the level of loss", i.e. the level of losses from cyber attacks.
 Modern cyberattacks and their consequences are analyzed. The key stages of building an effective cybersecurity management system are formed. The key aspects of determining the security policy of enterprises, their proactive response to highly dynamic economic conditions (primarily in the field of cybersecurity) in wartime are indicated. The system of enterprise cybersecurity management and organization should provide for the possibility of timely selection of specific means and ways to ensure it. 
 The author analyzes the functional and managerial aspect of forming a cybersecurity management system for enterprises in wartime. The key measures to develop the potential of the security and defense sector of Ukraine are investigated. 
 The study proposes a conceptual model for the formation of an effective cybersecurity management system for enterprises in wartime. Each of its stages is characterized. The functions of the cybersecurity management system of enterprises in wartime are described.