CISM Security Management ConsultingProgent offers the services of security consultants who have earned Certified Information Security Manager (CISM) Certification. CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management and consulting services.

CISM measures expertise in the areas of information security management including information security governance, information risk management, information security program development and management, and information security incident management. CISM certification also requires five years of professional experience in information management.

Information Security Governance:
Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Tasks include:

  • Develop the information security strategy in support of business strategy and direction.
  • Obtain senior management commitment and support for information security throughout the enterprise.
  • Ensure that definitions of roles and responsibilities throughout the enterprise include information security governance activities.
  • Establish reporting and communication channels that support information security governance activities.
  • Establish and maintain information security policies that support business goals and objectives.
  • Ensure the development of procedures and guidelines that support information security policies.
  • Develop business case and enterprise value analysis that support information security program investments.
Risk Management:
Identify and manage information security risks to achieve business objectives. Tasks include:
  • Develop a systematic, analytical and continuous risk management process.
  • Ensure that risk identification, analysis and mitigation activities are integrated into life cycle processes.
  • Apply risk identification and analysis methods.
  • Define strategies and prioritize options to mitigate risk to levels acceptable to the enterprise.
  • Report significant changes in risk to appropriate levels of management on both a periodic and event-driven basis.
Information Security Program Management:
Design, develop and manage an information security program to implement the information security governance framework. Tasks include:
  • Create and maintain plans to implement the information security governance framework.
  • Develop information security baseline.
  • Develop procedures and guidelines to ensure business processes address information security risk.
  • Develop procedures and guidelines for IT infrastructure activities to ensure compliance with information security policies.
  • Integrate information security program requirements into the organization's life cycle activities.
  • Develop methods of meeting information security policy requirements that recognize impact on end users.
  • Promote accountability by business process owners and other stakeholders in managing information security risks.
  • Establish metrics to manage the information security governance framework.
  • Ensure that internal and external resources for information security are identified, appropriated and managed.
Information Security Management:
Oversee and direct information security activities to execute the information security program. Tasks include:
  • Ensure that the rules of use for information systems comply with the enterprise's information security policies.
  • Ensure that the administrative procedures for information systems comply with the enterprise's information security policies.
  • Ensure that services provided by other enterprises, including outsourced providers, are consistent with established information security policies.
  • Use metrics to measure, monitor and report on the effectiveness of information security controls and compliance with information security policies.
  • Ensure that information security is not compromised throughout the change management process.
  • Ensure that vulnerability assessments are performed to evaluate effectiveness of existing controls.
  • Ensure that noncompliance issues and other variances are resolved in a timely manner.
  • Ensure the development and delivery of activities that can influence culture and behavior of staff including information security education and awareness.
Response Management:
Develop and manage a capability to respond to and recover from disruptive and destructive information security events. Tasks include:
  • Develop and implement processes for detecting, identifying and analyzing security related events.
  • Develop response and recovery plans including organizing, training and equipping the teams.
  • Ensure periodic testing of the response and recovery plans where appropriate.
  • Ensure the execution of response and recovery plans as required.
  • Establish procedures for documenting an event as a basis for subsequent action, including forensics when necessary.
  • Manage post-event reviews to identify causes and corrective actions.
Additional Certifications Earned by Progent's Security Consultants
In addition to offering the services of security specialists with CISM security manager credentials, Progent can also provide your business with access to CISSP-certified cybersecurity experts, ISSAP-certified network architecture security consultants, CISA-certified information security audit engineers, GIAC-certified information assurance consultants, and CRISC-certified risk management consultants.

Contact Progent for Access to a CISM-certified Information Security Consultant
To learn more about Progent's security consulting expertise, phone Progent at 800-993-9400 or refer to Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to help organizations to take the time-critical first step in responding to a ransomware attack by putting out the fire. Progent's remote ransomware expert can assist businesses to identify and isolate breached servers and endpoints and protect undamaged resources from being penetrated. If your network has been breached by any version of ransomware, act fast. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For more information, visit Progent's Ransomware 24x7 Hot Line.

An index of content::

  • 24-Hour Specialists for IT Service Organizations - Hialeah - Transparent Short-Term Staff Augmentation Hialeah, FL Consulting Expertise for IT Service Companies nearby Hialeah - Transparent Temporary Support Team Augmentation

  • 24x7x365 Online Help Windows Server 2012 R2 Hyper-V Virtual Switch
    Windows Server 2012 R2 Hyper-V Online Consulting

    Progent's certified professionals can help you to assess the benefits of Microsoft Windows Server 2012 R2 for your company, develop test systems and rollout strategies, optimize your network infrastructure for local, multi-location, cloud-based, and partial-cloud environments, train your IT management team, create an enterprise-wide security strategy, streamline network administration, help with creating applications, and generate and validate a DR/BC plan.

  • 24x7x365 Support Outsourcing SMS Migration Engineer Microsoft SMS

  • Microsoft Exchange Server 2000 Network Support Consulting
    Microsoft Exchange Upgrade IT Outsourcing Group

    Progent's Microsoft-certified consultants average more than 10 years of experience providing messaging support for customers ranging from small businesses to global corporations. Progent provides economical support for all editions of Exchange Server to enhance email and virus security, configure high availability email systems, and facilitate off-site and wireless email access. Progent's Exchange consulting services can help you in designing and carrying out a move from a legacy SMPT server or older Microsoft Email package such as Exchange 2003 to Exchange 2019 Server. In addition offers support for Windows 10 and Windows 11 clients running Office Outlook and can show you how to configure Outlook Web App (OWA) for popular web browsers. For e-mail virus defense, spam blocking and data data leak prevention, Progent offers Email Guard security services.

  • Akron At Home Workers Help Desk Augmentation Consulting Experts Akron Work from Home Employees Akron Consulting and Support Services - Help Desk Call Center Solutions Guidance Akron, Summit County, USA
  • At Home Workers Assistance nearby Minnetonka - Data Protection Technology Consulting Experts Minnetonka-Edina, Minnesota Minnetonka Work from Home Employees Data Protection Solutions Consulting Services Minnetonka-St Louis Park, Minnesota
  • Security Management Engineer
  • Augusta-Richmond County Work from Home Employees Security Solutions Consulting and Support Services Richmond County Telecommuters Augusta-Richmond County Expertise - Endpoint Security Solutions Assistance Augusta Aiken

  • CheckPoint FireWalls Testing
    Check Point Ransomware Protection Security Certification

    Progent's Check Point experts can show you how to select and deploy Check Point Firewall utilities and appliances based on Check Point Software's security platform to offer an economical and effective security solution for your business network. Progent can also help you integrate other Check Point products including Check Point ZoneAlarm and Check Point Power-1 firewalls with security products from other vendors and offer a central source for continuing technical support, administration, education, and design expertise.

  • Austin-Bergstrom Airport AUS Remote Workforce Consultants near Austin - Help Desk Solutions Guidance Work at Home Employees Austin Consulting and Support Services - Help Desk Call Center Solutions Consulting Services Austin-Bergstrom Airport AUS

  • Onsite Technical Support wireless IP phones and Meraki APs
    wireless IP phone integration Computer Consultants

    Cisco's wireless VoIP phones are industrial-grade Wi-Fi devices intended for professionals who are mobile within campus, warehouse, health-care or other venues where IT management requires user endpoints that offer more control, data security and durability than is achievable with the Bring-Your-Own-Device style of mobile collaboration. Successful integration of Cisco's wireless VoIP phones usually demands that you set up and optimize many key pieces of your wireless infrastructure including APs, routers, wireless LAN controllers, and call management software. Progent's certified experts can provide remote and on-premises support to help you create and manage a Cisco wireless VoIP phone deployment by delivering integration services that can range from debugging the set up of a wireless IP phone or access point to providing comprehensive project management outsourcing or co-sourcing for modernizing the Wi-Fi infrastructure of an entire campus.

  • Best Windows 2008 Server IT Outsourcing Group Phoenix, AZ Windows 2019 Server Technical Support Firms
  • Birmingham At Home Workforce Backup/Restore Solutions Assistance Birmingham International Airport BHM Work at Home Employees Consultants near me in Birmingham - Data Protection Technology Consulting and Support Services

  • Project Planning Consultancy
    Consultant Services Project Design Tuning

    For advanced project management assistance, Progent offers the services of veteran information technology professionals with years of background in IT management, application development, and process design for organizations from Big 4 firms to dot-com startups to government agencies. These high-level IT managers can provide project management expertise to assist enterprise clients follow best practices to make sure major projects are successfully completed on schedule and within budget.

  • Boise Telecommuters Voice/Video Conferencing Solutions Consulting Services Boise, ID, U.S.A. Remote Workforce Boise Consulting - Video Conferencing Systems Consultants Boise

  • Emergency ProSight DPS ECHO Backup and Recovery Services Professionals
    Cloud Backup Security Onsite Technical Support

    ProSight Data Protection Services ECHO from Progent offer small and medium-sized businesses a low cost end-to-end solution for secure backup/disaster recovery. Available at a low monthly cost, ProSight DPS automates your backup processes and allows rapid restoration of vital files, apps and virtual machines that have become unavailable or damaged due to component failures, software bugs, natural disasters, human error, or malware attacks such as ransomware. ProSight DPS can help you back up, recover and restore files, folders, applications, system images, as well as Hyper-V and VMware images/. Important data can be backed up on the cloud, to an on-promises storage device, or to both. Progent's disaster recovery consultants can deliver world-class support to configure ProSight Data Protection Services to to comply with regulatory requirements like HIPAA, FINRA, and PCI and, whenever necessary, can help you to recover your critical data.

  • Consulting Experts for Network Service Organizations in Monterey - Transparent Short-Term Support Staff Assistance Monterey California Consulting for Monterey Network Service Organizations Monterey
  • Consulting Support for IT Service Providers - Orlando - Short-Term Support Team Augmentation Orlando Consulting Experts for Network Support Firms Orlando Florida
  • Emergency Charleston Consulting Experts for Network Support Providers Charleston County South Carolina, United States Charleston, America Consulting Services for Charleston Network Support Firms
  • Eugene At Home Workers Integration Solutions Consulting and Support Services Eugene, Lane County Teleworkers Consulting near Eugene - Connectivity Solutions Consulting and Support Services Eugene, Lane County
  • Exchange 2019 MCDB Cache Online Consulting Exchange 2019 Mailbox Migration Configuration

  • Development Firms Custom Excel
    FRx Report Coding

    For custom application development, Progent can provide programming experts to produce business software in areas such as eCommerce, web development, Microsoft Dynamics packages such as Great Plains Software accounting system, and specialized management reports based on Crystal Reports, Access Report, or FRx Reports. Progent's consultants can use Microsoft IIS to build custom eCommerce solutions based on Microsoft ASP.NET. In addition, Progent offers expertise in a broad range of custom software development environments including SQL Server and Delphi. For custom e-Commerce programming, Progent also can provide specialists in custom Microsoft Access, custom Microsoft Visual Basic, custom Excel, and any other specialized programming powered by any Microsoft development platform.

  • Harris County, U.S.A. Webster Crypto-Ransomware DopplePaymer Preparedness Assessment Webster Crypto-Ransomware Netwalker Preparedness Assessment Harris County

  • Technology Consulting Services Microsoft 365 OneDrive Integration
    Microsoft 365 Publisher Integration Outsourcing

    Microsoft 365, previously branded Office 365, is Microsoft's growing suite of client productivity applications and cloud services offered on a subscription basis. Microsoft 365 programs and cloud-based services are available in a variety of product bundles intended for markets from students and home offices to enterprises. Progent offers fast and affordable online access to specialists with in-depth knowledge of Microsoft, macOS, Apple iOS, and Android platforms. Progent can help your business to evaluate the wealth of subscription plans offered with Microsoft 365 and integrate your network with Microsoft 365 so you realize maximum business value. Progent offers expertise with cross-vendor networks that include Windows, macOS or OS X, and Linux software. Progent can also help your business to create and maintain hybrid solutions that transparently combine on-premises and cloud products and services.

  • Hayward MongoLock Ransomware Forensics Hayward Ryuk Crypto-Ransomware Reporting Hayward
  • Immediate Network Security Consulting Exchange Jacksonville Arlington, United States Jacksonville Arlington Exchange IT Service Providers
  • Largest Lakeland Consulting Expertise for Computer Support Companies Lakeland Florida Emergency Expertise for IT Service Providers near Lakeland - Seamless Temporary Support Staff Assistance Lakeland

  • After Hours Active Directory Cleanup Technology Professional
    Active Directory Health Check Consultant Services

    Progent's ProSight Network Audits offer a quick and affordable alternative for small and mid-size organizations to get an objective evaluation of the health of their IT system. Powered by some of the leading remote monitoring and management (RMM) platforms available, and overseen by Progent's world-class group of IT experts, ProSight Network Audits show you how well the deployment of your essential network assets adhere to best practices. The Basic and Advanced versions of ProSight Network Audit services are available at a budget-friendly, one-time cost and deliver instant ROI like a more manageable and safer AD environment. Both versions also provide the ongoing benefits of cutting-edge remote network monitoring and management (RMM) technology. These benefits can include simpler network management, improved compliance with data security standards, higher utilization of network resources, quicker troubleshooting, more reliable backup and restore, and less downtime.

  • Largest Professional Cisco PIX Firewall Migration Specialists PIX
  • Security Management Services
  • Los Angeles Work at Home Employees Conferencing Technology Consulting Services Work at Home Employees Los Angeles Consultants - Voice/Video Conferencing Technology Guidance
  • Microsoft Network Onsite Support Fort Collins Remote Help Desk Computer Setup Fort Collins, Larimer County
  • Microsoft SQL 2008 Design Companies Ceres, CA Modesto California Small Office Network Consultant Microsoft SQL Server 2017

  • MSP360 Server Backup Consultants
    MSP360 Backup Network Consultant

    Progent's data protection experts can help your company to create, deploy and debug a backup plan based on MSP360 technology. MSP360 offers file/folder or image backup/recovery for virtual machines and physical computers, works with all leading public clouds, and allows businesses to create a data protection ecosystem with a minimum Recovery Time Objective and a defined Recovery Point Objective (RPO). With ProSight DPS 360 Backup, Progent can provide comprehensive monitoring and management of your backup system to prevent data loss caused by user miscues, system errors, ill-intentioned users, and malware attacks like ransomware. To read more, visit ProSight Data Protection Services 360 Backup services.

  • Microsoft SQL 2008 Network Repair Service San Bernardino County California Microsoft SQL 2008 Service San Bernardino County California
  • Microsoft SQL 2014 Outsourcing IT Support San Diego, California San Diego-La Jolla, CA Outsourcing Firm Microsoft SQL 2008
  • Microsoft SQL Server 2016 Consulting Firm Fort Myers FL Online Help Microsoft SQL 2008

  • Internet Security and Acceleration Server Network Consulting
    ISA Server Consulting Services

    Progent's certified Internet Security and Acceleration Server consultants have extensive backgrounds creating corporate security designs for IT networks with multiple sites, mobile workers, and mission-critical web-based applications. A Progent ISA Server consultant can help your small or mid-size company plan and deploy an installation of Microsoft ISA Server 2004 that meets your IT protection needs without restricting your productivity.

  • CISM Certified Cybersecurity Cybersecurity Firm
  • Microsoft SharePoint Server Support and Setup Pasadena, CA SharePoint 2010 Engineer Pasadena, United States
  • Napa Implementation Support Napa County Computer Consultancy Firm
  • Network Help Progent's Management Team Progent Management Team Design
  • Network Management Services SQL Server 2019 Lincoln Nebraska, United States Network Support Group Microsoft SQL Server 2017 Lincoln
  • Consultant Services CISM Certified Security Management
  • Network Specialist Windows 2008 Server Shreveport Bossier City , United States Windows System Recovery
  • Oxford Offsite Workforce Endpoint Security Systems Consulting and Support Services Oxford Oxford At Home Workers Network Security Solutions Guidance Oxford, United Kingdom
  • Progent Phone Numbers Progent Phone Numbers
  • Remote Workforce Consultants near San Jose - VoIP Systems Consulting Silicon Valley, California At Home Workers San Jose Assistance - VoIP Technology Consultants Silicon Valley

  • ransomware cryptoworm recovery Services
    Avaddon ransomware hot line Consultancy

    Progent's Ransomware Hot Line provides 24x7 access to a seasoned ransomware recovery expert who can help your business to halt the progress of an active ransomware attack. Call 800-462-8800

  • SQL Server 2014 Database Migration Technology Consulting Services Microsoft Experts SQL Server 2014 Backup IT Consultants
  • CISM Security Management Consulting Services
  • SQL Server 2019 Small Business Outsourcing IT Top Microsoft SQL 2014 Server Consulting Raleigh
  • CISM Certified Cybersecurity Management Technology Professional
  • Savannah, GA BlackBerry Email Network Consultants Networking Specialist BlackBerry Desktop Manager Savannah

  • FAQ about Computer Consultant Telecommuting Jobs
    Home Based Jobs FAQ about Telecommuting Microsoft Consultant

    For answers to frequent enquiries about being employed by Progent, visit Jobs at Progent FAQs.

  • SharePoint Server 2007 IT Services Rancho Cordova Immediate Microsoft SharePoint 2010 Remote Technical Support Rancho Cordova, CA
  • SharePoint Server 2010 IT Services Skokie-Buffalo Grove, Illinois SharePoint Server 2007 Remote Technical Support Skokie-Buffalo Grove
  • Small Business Providers Install Small Office

  • 24/7 Technical Support Services 802.11ax Upgrade
    Cisco wireless Support and Help

    Progent's Wireless Consulting Services offer a fast, affordable way for businesses of all sizes to configure, manage, monitor and troubleshoot advanced wireless network technology. For 802.11n and the latest 802.11ac Wi-Fi environments, Progent can help you plan and deploy hardware such as Cisco's Aironet and Meraki access points and wireless controllers. For mobile email and web-based applications, Progent can help with Apple IOS iPhones, Apple iPads, Google Androids, and Windows phones and tablets.

  • Solaris Online System Consulting Linux Remote Consulting Services
  • Southlake Consulting Expertise for Network Support Providers in Southlake - Short-Term Support Team Augmentation Immediate Consulting Services for Southlake IT Service Firms Southlake-Coppell, Texas
  • Specialist Exchange Online Archiving Microsoft 365 and iOS Remote Support
  • Supplemental IT Support Staffing Services Consulting Support Irvine, CA IT Staffing for IT Service Teams Irvine, CA
  • Telecommuters Cambridge Guidance - Management Systems Consulting Services Cambridge 24-7 Telecommuters Cambridge Assistance - Management Solutions Consulting and Support Services East of England
  • Top Offsite Workforce Wichita Consulting Services - Conferencing Technology Consultants Wichita Offsite Workforce Conferencing Systems Expertise Wichita
  • Top Urgent Tulsa Crypto-Ransomware Repair Tulsa Green Country Tulsa Crypto Repair Services
  • Toronto Short Term IT Staffing Support Toronto Supplemetary IT Staffing Support Services
  • Urgent CISSP Security Consultants Firewall Security Firms
  • Washington Ryuk Crypto-Ransomware Forensics Analysis DC Urgent Washington DopplePaymer Crypto-Ransomware Forensics Ronald Reagan Washington Airport DCA
  • Windows Server 2016 Small Business Network Consultant Tampa St Petersburg Clearwater, United States 24/7 Microsoft Windows Server 2016 Server Consultants Tampa
  • Windows Server 2019 IT Consulting Firm Las Vegas McCarran International Airport LAS Troubleshooting Windows Server 2012 R2 Las Vegas Nevada
  • Yonkers Crypto-Ransomware Snatch Readiness Checkup Yonkers Manhattan White Plains Yonkers Crypto-Ransomware Ryuk Preparedness Consultation Westchester County New York
  • Yonkers Manhattan White Plains Cisco Consultants Cisco Migration Consulting Yonkers, Westchester County

  • © 2002-2023 Progent Corporation. All rights reserved.