CISM Security Management ConsultingProgent offers the services of security consultants who have earned Certified Information Security Manager (CISM) Certification. CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management and consulting services.

CISM measures expertise in the areas of information security management including information security governance, information risk management, information security program development and management, and information security incident management. CISM certification also requires five years of professional experience in information management.

Information Security Governance:
Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Tasks include:

  • Develop the information security strategy in support of business strategy and direction.
  • Obtain senior management commitment and support for information security throughout the enterprise.
  • Ensure that definitions of roles and responsibilities throughout the enterprise include information security governance activities.
  • Establish reporting and communication channels that support information security governance activities.
  • Establish and maintain information security policies that support business goals and objectives.
  • Ensure the development of procedures and guidelines that support information security policies.
  • Develop business case and enterprise value analysis that support information security program investments.
Risk Management:
Identify and manage information security risks to achieve business objectives. Tasks include:
  • Develop a systematic, analytical and continuous risk management process.
  • Ensure that risk identification, analysis and mitigation activities are integrated into life cycle processes.
  • Apply risk identification and analysis methods.
  • Define strategies and prioritize options to mitigate risk to levels acceptable to the enterprise.
  • Report significant changes in risk to appropriate levels of management on both a periodic and event-driven basis.
Information Security Program Management:
Design, develop and manage an information security program to implement the information security governance framework. Tasks include:
  • Create and maintain plans to implement the information security governance framework.
  • Develop information security baseline.
  • Develop procedures and guidelines to ensure business processes address information security risk.
  • Develop procedures and guidelines for IT infrastructure activities to ensure compliance with information security policies.
  • Integrate information security program requirements into the organization's life cycle activities.
  • Develop methods of meeting information security policy requirements that recognize impact on end users.
  • Promote accountability by business process owners and other stakeholders in managing information security risks.
  • Establish metrics to manage the information security governance framework.
  • Ensure that internal and external resources for information security are identified, appropriated and managed.
Information Security Management:
Oversee and direct information security activities to execute the information security program. Tasks include:
  • Ensure that the rules of use for information systems comply with the enterprise's information security policies.
  • Ensure that the administrative procedures for information systems comply with the enterprise's information security policies.
  • Ensure that services provided by other enterprises, including outsourced providers, are consistent with established information security policies.
  • Use metrics to measure, monitor and report on the effectiveness of information security controls and compliance with information security policies.
  • Ensure that information security is not compromised throughout the change management process.
  • Ensure that vulnerability assessments are performed to evaluate effectiveness of existing controls.
  • Ensure that noncompliance issues and other variances are resolved in a timely manner.
  • Ensure the development and delivery of activities that can influence culture and behavior of staff including information security education and awareness.
Response Management:
Develop and manage a capability to respond to and recover from disruptive and destructive information security events. Tasks include:
  • Develop and implement processes for detecting, identifying and analyzing security related events.
  • Develop response and recovery plans including organizing, training and equipping the teams.
  • Ensure periodic testing of the response and recovery plans where appropriate.
  • Ensure the execution of response and recovery plans as required.
  • Establish procedures for documenting an event as a basis for subsequent action, including forensics when necessary.
  • Manage post-event reviews to identify causes and corrective actions.
Additional Certifications Earned by Progent's Security Consultants
In addition to offering the services of security specialists with CISM security manager credentials, Progent can also provide your business with access to CISSP-certified cybersecurity experts, ISSAP-certified network architecture security consultants, CISA-certified information security audit engineers, GIAC-certified information assurance consultants, and CRISC-certified risk management consultants.

If you're trying to find computer security expertise, telephone Progent at 800-993-9400 or refer to Contact Progent.

An index of content::

  • 24 Hour Garland-Mesquite On Site service Garland-Rowlett Information Technology Consultant
  • 24-7 Wichita At Home Workforce Collaboration Systems Consulting Sedgwick County Kansas Work at Home Employees Wichita Expertise - Collaboration Technology Consulting Experts Wichita

  • Android security Help and Support
    Android Active Directory Computer Consultant

    Progent's veteran group of IT consultants and application experts have extensive background delivering online and onsite assistance for organizations of all sizes who want to incorporate Android phones and tablets into their information networks so that mobile clients can communicate and collaborate from virtually anywhere. Progent has the range of know-how to solve technical problems that involve numerous vendors and that entail a combination of older and current technology. Progent offers affordable online expertise to assist you with any aspect of planning, configuring, managing and troubleshooting your Bring-Your-Own-Device (BYOD) solution. Progent can provide as-needed support to help you to resolve especially stubborn technical problems, or Progent can provide outsourced or co-sourced project management services to ensure that you complete strategic IT initiatives on time and within budget. Progent can help with on-premises, cloud-based, or hybrid networks and can provide support for operating systems, applications, management tools and hardware infrastructure. Progent also can provide customized group or individual training to show you how to manage and use Android phones and tablets to maximize their business value.

  • 24x7 Alexandria Crypto Remediation Experts Alexandria, Capital Beltway CryptoLocker Cleanup Consultants Alexandria Virginia
  • CISM Security Management Engineer
  • 24x7x365 Indianapolis Crypto Remediation Services Indianapolis, Marion County Urgent Indianapolis Crypto Cleanup Support Services Indianapolis Indiana
  • 802.11ax Upgrade Online Technical Support Setup and Support Mobile Connectivity
  • At Home Workforce Chatsworth Consulting Experts - Collaboration Solutions Consulting Services Chatsworth-Thousand Oaks, America At Home Workforce Chatsworth Consulting and Support Services - Collaboration Solutions Consulting Chatsworth
  • BlackBerry Wireless Information Technology Consulting Group Polk County Iowa BlackBerry BPS Migration Firm Polk County Iowa
  • Brasília Remote Workforce Management Solutions Consulting Services Work at Home Employees Brasília Guidance - Endpoint Management Tools Guidance Brasilia, Federal District
  • CISSP Certified Security Consultancy Services Company Guadalajara Guadalajara Technology Support
  • Cheyenne Microsoft Expert Exchange Server 2019 Tech Consultants Remote Support Exchange Server 2010 Cheyenne, Wyoming
  • Cisco Small Office Network Consultants Burlington, Vermont Server Recovery Cisco Vermont - Burlington, VT, Rutland, VT, Montpelier, VT

  • ISSAP Certified Security Contractor
    ISSAP Certified Security Architecture Consulting Services

    Progent's ISSAP Certified security consultants, or Information Systems Security Architecture Professionals, are consultants who have earned ISSAP Certification as a result of rigorous testing and significant work with information security architecture. ISSAP security experts have in-depth understanding of access management systems and methodologies, telecommunications and network infrastructure protection, cryptography, needs evaluation, BCP and disaster recovery planning (DRP), and physical security integration. Progent's ISSAP-premier security consultants can help your company with all aspects of secure network architecture.

  • Cisco Support Organization Providence, Warwick, Cranston, RI 24-7 Cisco Consulting Providence, Providence County, Rhode Island
  • Consultant Services Microsoft SQL 2008 Naples-North Naples Naples, FL Emergency Assessment Microsoft SQL 2014
  • Consultants CISM Certified Cybersecurity Management
  • Consulting Experts for IT Support Organizations near Milwaukee - Seamless Short-Term Staff Expansion Milwaukee Racine Waukesha Milwaukee Consulting Support for Network Support Firms Milwaukee Racine Waukesha
  • Emergency UNIX Computer Engineer Arlington, TX Solaris Computer Consultant Texas
  • Immediate CISM Certified Cybersecurity Management Consult
  • Home Based Microsoft Consultants Telecommute Jobs From Home Job Benefits for Certified

  • Top Online Technical Support Aironet Wireless AP
    Aironet Access Point Management Technical Support Services

    Progent's Cisco certified Wi-Fi experts can provide economical remote and onsite help for both legacy and current Wave 2 Aironet wireless access points (APs) and Progent can help your business to plan and maintain Wi-Fi environments that incorporate indoor and outside/ruggedized Aironet APs.

  • Immediate Baltimore Teleworkers Conferencing Systems Assistance Port of Baltimore At Home Workers Consulting Experts - Baltimore - Conferencing Systems Expertise
  • Lincoln WannaCry Crypto-Ransomware Forensics Investigation Lincoln, Lancaster County Lincoln MongoLock Crypto-Ransomware Forensics Investigation Lincoln, NE
  • Locky Ransomware Hot Line Fort Collins Colorado Ransomware Rebuild Fort Collins Colorado
  • MS Dynamics GP (Great Plains) Rancho Cordova Partner - Upgrade Expert Rancho Cordova-Folsom Dynamics GP Rancho Cordova Gold Partner - SQL Server Consultants
  • Miami Beach Telecommuters Backup Technology Consulting Services Miami Beach Florida Miami Beach Offsite Workforce Backup Systems Expertise Miami Beach
  • Microsoft MCA Support Employment Opportunities Suisun City CA, United States Microsoft Support Job Opportunity Suisun City CA
  • Consulting CISM Certified Cybersecurity Management
  • Microsoft SQL 2008 Computer Consultants Vacaville Solano County 24/7 SQL Server Repair Solano County
  • Microsoft SharePoint Server 2010 Technology Consulting Services Microsoft SharePoint Server 2013 Remote Support Services Jardim Camburi

  • Exchange 2013 Migration Consulting
    Setup and Support Exchange 2013 Management

    Microsoft Exchange 2013 includes major improvements to the capabilities of Exchange Server 2010 and delivers important new features as well as a redesigned architecture. These improvements affect key areas like ease of administration, high availability (HA), compliance, cost of ownership, collaboration, extensibility, throughput, cross-version interoperability, and the user experience. Progent's Microsoft-certified Exchange 2013 consulting experts can assist your organization to evaluate the possible advantages of migrating to Exchange Server 2013, design a cost-effective validation and deployment strategy, and educate your IT staff to manage your Microsoft Exchange Server 2013 solution. Progent also offers affordable online support and management services for Exchange 2013.

  • Milwaukee, WI, Madison, WI, Green Bay, WI, Kenosha, WI Small Business Network Consulting Services Network Consultants Wisconsin
  • CISM Security Team
  • Office 365 Exchange Online and on-premises Exchange On-site Support After Hours Microsoft Certified Hybrid Office 365 integration Engineer
  • Orinda Outsourcing Companies 24-Hour Concord Small Business IT Support Firm
  • Pleasanton Spora Ransomware Cleanup Dublin, CA Pleasanton, Alameda County, United States Pleasanton Crypto-Ransomware Attack Operational Recovery
  • Technology Professional Certified Cybersecurity Management
  • Rancho Cordova PC Consulting IT Outsourcing Rancho Cordova

  • Wi-Fi IP phone integration IT Services
    Online Help wireless IP phones and Aironet APs

    Progent's Cisco Wi-Fi VoIP phone configuration and troubleshooting consultants offer online and onsite assistance to help you build and maintain a Cisco Wi-Fi IP phone deployment by delivering integration services that can range from troubleshooting the configuration of an IP phone or access point to offering comprehensive project management outsourcing or co-sourcing for modernizing the wireless infrastructure of a campus.

  • Ransomware Business Recovery Cambridge Ransomware Rebuild

  • Technical Support Services Lync Server 2013
    After Hours Microsoft Lync Server Instant Messaging Online Support Services

    Lync Server 2010 provides IM, Real Presence, audio and video conferencing, desktop collaboration, and both VoIP and traditional PSTN calling. Microsoft Lync 2010 can enhance the functionality of Microsoft Exchange Server, SharePoint Server and Office desktop or Office 365 and streamlines management via integration with Active Directory. Lync can also cut expenses by eliminating Voice-over-IP equipment and subscription services, PBX gear, or conventional video conferencing technology. Progent's certified IM and Presence consultants can provide remote and on-premises support to assist you to manage and troubleshoot your current Lync 2010 environment or assess the benefits of upgrading from Lync to Skype for Business, which is the renamed and revamped version of the product. Progent can also assist your organization to design and carry out a smooth Skype for Business migration.

  • Security Contractor Security Jundiai, State of Sao Paulo Security Organizations Firewall Jundiai, State of São Paulo
  • Security Cybersecurity Firm Lexington-Fayette Kentucky Security Security Evaluation Lexington-Fayette
  • Sioux Falls Locky Crypto-Ransomware Forensics Sioux Falls, SD Minnehaha County South Dakota Sioux Falls Spora Ransomware Forensics Investigation
  • Small Business Small Office Computer Consultants Remote Small Offices Integration Group
  • Technology Consulting Services Microsoft Proxy Server Microsoft Proxy Server Onsite Technical Support
  • Technology Consulting Windows 7 Evaluation Microsoft Windows 7 Technical Support Services
  • Top Ranked Offsite Workforce San Francisco Guidance - Security Systems Consulting San Francisco Bay Area Top Remote Workforce Expertise nearby San Francisco - Endpoint Security Solutions Assistance San Francisco Bay Area
  • Top Rated SQL Migration Consultant Top Quality SQL Small Business Server Support Charlotte, NC, Raleigh-Durham, NC, Greensboro, NC, Winston-Salem, NC

  • ProSight Duo MFA Technology Consulting Services
    24-7 ProSight Duo MFA Information Technology Consulting

    Progent's Duo services incorporate Cisco's Duo cloud technology to defend against stolen passwords through the use of two-factor authentication. Duo supports single-tap identity confirmation with Apple iOS, Android, and other out-of-band devices.

  • Uniondale Work from Home Employees Connectivity Solutions Assistance Uniondale-Farmingdale Remote Workforce Uniondale Expertise - Connectivity Consultants Uniondale-Long Island, New York
  • Urgent Offsite Workforce Austin Guidance - Backup/Recovery Systems Consulting Austin-Bergstrom Airport AUS 24x7x365 Offsite Workforce Consultants nearby Austin - Backup/Recovery Technology Consultants
  • Vancouver Work from Home Employees Video Conferencing Technology Consulting Experts British Columbia At Home Workforce Vancouver Expertise - Video Conferencing Systems Consulting Vancouver
  • Wichita Egregor Ransomware Mitigation Sedgwick County Kansas Wichita Ransomware Operational Recovery Wichita Kansas
  • Work at Home Employees Consulting near Winston-Salem - Backup/Recovery Technology Consulting Services Winston-Salem North Carolina, U.S.A. Winston-Salem Remote Workforce Backup/Recovery Technology Guidance Winston-Salem Piedmont Triad, United States
  • Work at Home Employees Expertise near Jersey City - Help Desk Augmentation Consulting Services Jersey City Jersey City New Jersey Jersey City At Home Workforce Call Desk Augmentation Consultants
  • Work at Home Employees Guidance near me in Manhattan Beach - IP Voice Technology Consulting Experts Manhattan Beach-Inglewood Manhattan Beach Work from Home Employees VoIP Solutions Assistance Manhattan Beach, America

  • © 2002-2021 Progent Corporation. All rights reserved.