only a partial overlap with GDPR, a pure GDRP con-
sultant will not pass the checking process.
Collecting Evolution Needs. The interview pro-
cess was also the opportunity to get feedback from
the field. Although our assessment grid was designed
to fit SME maturity and was validated before start-
ing our interview campaign, some checks proved too
advanced like forensics analysis or direct cooperation
with local CERT. Other checks may need more de-
tailed breakdown like making sure the security pol-
icy matches the company purpose (after identifying
both). This evolution is planned on an annual basis
and will be discussed with an advisory board involv-
ing cybersecurity professors from local universities
and with all the interested experts part of KIS with the
support of a local cybersecurity cluster. In addition to
help us improving our criteria, those meetings also
help to define the path to increase the maturity level
of SMEs engaged in an cybersecurity improvement
process while keeping attracting news SMEs through
specific awareness-raising actions. Last but not least,
we expect this will also be the opportunity to share
some good practices between experts.
5 CONCLUSION & NEXT STEPS
In this paper, we reported about the ongoing evalua-
tion process of cybersecurity experts carried out us-
ing the Keep IT Secure framework at the regional
level in Wallonia (Belgium). We showed how the
framework is aligned with our national perspective
and international standards such as NIST cybersecu-
rity and CIS20 while also providing a path to ISO27K.
Based on those strong references, we designed an au-
dit methodology for validating the expertise of cy-
bersecurity companies that will help end-user SMEs.
The resulting evaluation grid is used in a role-playing
game that allows the advise centre to check how well
an expert covers the full spectrum of key activities and
controls when dealing with an SME case. The process
does not impose a specific methodology but follows
the expert methodology. This enables to assess how
effective it is and to make some recommendations.
Second, we also reported about the analysis of the
interesting data set collected during our interviews.
Thanks to the systematic use of our check-list, we
could perform a quite interesting analysis. Although
it requires some extensions both in size and scope,
we could already point out interesting characteristics
and some lessons learned. We believe our approach
could interest other countries dealing with the prob-
lem of providing a reliable expert network to help
SMEs tackle the cybersecurity threats.
Our future work is to update our analysis based on
more audits. At this point an estimated 60% of active
cybersecurity companies have been covered. We also
plan to evolve our framework based on the collected
feedback and to make it available more widely for
those interested in sharing similar approaches. At a
more global scale, we are working on the interconnec-
tion of our work with emerging certification scheme
at the Belgian federal level (see Figure 1). We are also
providing feedback at European level through specific
projects like SPARTA and organisations like ECSO.
ACKNOWLEDGEMENTS
This research was partly supported by Digital Wal-
lonia and the SPARTA H2020 project (nr. 830892).
We also thank Infopole, DGO6 and companies of the
Walloon cybersecurity cluster.
REFERENCES
CCB (2016). Cyber Security Guide for SME. http://www.
ccb.belgium.be/en/guide-sme.
CIS (2016). CIS Controls V6.1. https://www.cisecurity.org/
controls.
Digital Wallonia (2018). Keep IT Secure. https://www.
digitalwallonia.be/keepitsecure.
FINCSC (2018). Finnish Cyber Security Certificate. https:
//www.fincsc.fi.
ISO (2013). Iso/iec 27001 information se-
curity management. https://www.iso.org/
isoiec-27001-information-security.html.
Keeper Security (2018). 2018 State of Cybersecurity in
Small and Medium Size Businesses study. https:
//start.keeper.io/2018-ponemon-report.
Muller, P. et al. (2015). Annual Report on European SMEs
2014/2015. European Commission.
NCSA (2018). Stay Safe Online - Cybersecurity Awareness
Toolkit for SMB. National Cyber Security Alliance.
NIST (2014). Cybersecurity Framework. https://www.nist.
gov/cyberframework.
Ponsard, C. and Grandclaudon, J. (2018). Survey and guide-
lines for the design and deployment of a cyber security
label for smes. In 4th Int. Conf. on Information Sys-
tems Security and Privacy (Revised Selected Papers),
Funchal, Madeira, Portugal.
Ponsard, C., Grandclaudon, J., and Bal, S. (2019). Survey
and lessons learned on raising SME awareness about
cybersecurity. In 5th Int. Conf. on Information Sys-
tems Security and Privacy, Prague, Czech Republic.
UK Gov. (2016). Cyber essentials. https://www.
cyberaware.gov.uk/cyberessentials.
Methodology and Feedback about Systematic Cybersecurity Experts Auditing in Belgium
759