CISM Security Management ConsultingProgent offers the services of security consultants who have earned Certified Information Security Manager (CISM) Certification. CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management and consulting services.

CISM measures expertise in the areas of information security management including information security governance, information risk management, information security program development and management, and information security incident management. CISM certification also requires five years of professional experience in information management.

Information Security Governance:
Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Tasks include:

  • Develop the information security strategy in support of business strategy and direction.
  • Obtain senior management commitment and support for information security throughout the enterprise.
  • Ensure that definitions of roles and responsibilities throughout the enterprise include information security governance activities.
  • Establish reporting and communication channels that support information security governance activities.
  • Establish and maintain information security policies that support business goals and objectives.
  • Ensure the development of procedures and guidelines that support information security policies.
  • Develop business case and enterprise value analysis that support information security program investments.
Risk Management:
Identify and manage information security risks to achieve business objectives. Tasks include:
  • Develop a systematic, analytical and continuous risk management process.
  • Ensure that risk identification, analysis and mitigation activities are integrated into life cycle processes.
  • Apply risk identification and analysis methods.
  • Define strategies and prioritize options to mitigate risk to levels acceptable to the enterprise.
  • Report significant changes in risk to appropriate levels of management on both a periodic and event-driven basis.
Information Security Program Management:
Design, develop and manage an information security program to implement the information security governance framework. Tasks include:
  • Create and maintain plans to implement the information security governance framework.
  • Develop information security baseline.
  • Develop procedures and guidelines to ensure business processes address information security risk.
  • Develop procedures and guidelines for IT infrastructure activities to ensure compliance with information security policies.
  • Integrate information security program requirements into the organization's life cycle activities.
  • Develop methods of meeting information security policy requirements that recognize impact on end users.
  • Promote accountability by business process owners and other stakeholders in managing information security risks.
  • Establish metrics to manage the information security governance framework.
  • Ensure that internal and external resources for information security are identified, appropriated and managed.
Information Security Management:
Oversee and direct information security activities to execute the information security program. Tasks include:
  • Ensure that the rules of use for information systems comply with the enterprise's information security policies.
  • Ensure that the administrative procedures for information systems comply with the enterprise's information security policies.
  • Ensure that services provided by other enterprises, including outsourced providers, are consistent with established information security policies.
  • Use metrics to measure, monitor and report on the effectiveness of information security controls and compliance with information security policies.
  • Ensure that information security is not compromised throughout the change management process.
  • Ensure that vulnerability assessments are performed to evaluate effectiveness of existing controls.
  • Ensure that noncompliance issues and other variances are resolved in a timely manner.
  • Ensure the development and delivery of activities that can influence culture and behavior of staff including information security education and awareness.
Response Management:
Develop and manage a capability to respond to and recover from disruptive and destructive information security events. Tasks include:
  • Develop and implement processes for detecting, identifying and analyzing security related events.
  • Develop response and recovery plans including organizing, training and equipping the teams.
  • Ensure periodic testing of the response and recovery plans where appropriate.
  • Ensure the execution of response and recovery plans as required.
  • Establish procedures for documenting an event as a basis for subsequent action, including forensics when necessary.
  • Manage post-event reviews to identify causes and corrective actions.
Additional Certifications Earned by Progent's Security Consultants
In addition to offering the services of security specialists with CISM security manager credentials, Progent can also provide your business with access to CISSP-certified cybersecurity experts, ISSAP-certified network architecture security consultants, CISA-certified information security audit engineers, GIAC-certified information assurance consultants, and CRISC-certified risk management consultants.

To learn more about Progent's security consulting expertise, telephone Progent at 800-993-9400 or see Contact Progent.

An index of content::

  • 24-Hour Fargo Remote Workforce Infrastructure Consulting and Support Services Fargo-Minot Offsite Workforce Consulting in Fargo - Infrastructure Consulting Experts
  • 24/7 Remote Workforce Midtown Manhattan Consulting - Endpoint Management Systems Assistance Manhattan New York Emergency At Home Workers Consulting in Midtown Manhattan - Management Tools Guidance NYC-East Village, New York
  • Security Management Professional
  • After Hours Adelaide Maze Crypto-Ransomware Operational Recovery Adelaide Adelaide MongoLock Crypto-Ransomware System-Restoration Adelaide, SA
  • Award Winning Work at Home Employees New Haven Consulting - Help Desk Outsourcing Consulting New Haven Offsite Workforce New Haven Consultants - Help Desk Call Center Outsourcing Assistance New Haven County CT
  • Bellevue NotPetya Crypto-Ransomware Forensics Analysis Bellevue Kirkland, USA Bellevue MongoLock Ransomware Forensics Investigation King County Washington
  • Building-to-building Wireless Technical Support WiFi Management Support Services
  • CISM Consulting Contract Jobs Greensboro, NC Cisco CCIP Network Consulting Career Opportunities Greensboro, NC
  • CISSP Security Companies Houston 24 Hour Security Security Contractors Houston, Harris County, U.S.A.

  • Intune Endpoint Protection Remote Support
    24-Hour Computer Consultants Microsoft Intune Migration

    Progent's Microsoft-certified Intune consultants can help your organization to understand the business value of utilizing Microsoft Intune for configuring and managing your portable computers including notebooks, smartphones, and tablets based on Windows, iOS, and Android. Progent's Intune consultants can help you to define security and compliance policies, set up pilot environments to evaluate the appropriateness of Microsoft Intune for your environment, deploy Intune across your enterprise, combine Intune with System Center Configuration Manager for single-console change management, and provide ongoing support for your Intune solution.

  • Cabo Frio Ryuk Ransomware Malware Mitigation Cabo Frio, Rio de Janeiro Cabo Frio Hermes Crypto-Ransomware Operational-Recovery Cabo Frio, RJ
  • Cisco Certified Expert Miami Beach Manager Miami Beach Specialists
  • Cisco Small Business Computer Consulting Companies South Dakota Cisco Technology Consulting Sioux Falls, SD, Rapid City, SD, Aberdeen, SD, CITY4, SD
  • Computer Help Windows Server 2012 R2 Parsippany-Wayne Microsoft Windows Server 2019 Onsite Computer Services
  • Computer Specialists BlackBerry Professional Software Chandler, AZ IT Consultant BlackBerry Exchange Chandler Tempe Mesa Gilbert
  • Dallas Sodinokibi Ransomware Cleanup Dallas, TX Dallas Dharma Crypto-Ransomware Mitigation Dallas Texas
  • El Paso Ransomware NotPetya Readiness Evaluation El Paso, TX Top Rated El Paso Ransomware Egregor Preparedness Report El Paso Texas
  • Exchange 2013 Upgrade Online Consulting Exchange 2013 Server Consultants
  • Fort Lauderdale Nephilim Crypto-Ransomware Negotiation Support Fort Lauderdale Florida Fort Lauderdale Sodinokibi Ransomware Settlement Expertise Fort Lauderdale Florida

  • Windows Server 2012 R2 Configuration Manager Professional
    Windows 2012 R2 Technology Consulting

    Progent's Microsoft-certified professionals can assist you to assess the advantages of Windows Server 2012 R2 for your company, develop pilot systems and migration plans, tune your network infrastructure for on-premises, multi-location, private or public cloud-based, and hybrid environments, train your IT management staff, create a corporate-wide security plan, automate IT management, help with creating applications, and generate and test a DR/BC plan.

  • Harrisburg Remote Workforce Voice/Video Conferencing Solutions Consulting and Support Services Harrisburg-Lancaster, Pennsylvania Harrisburg Teleworkers Conferencing Systems Consulting and Support Services Harrisburg-Mechanicsburg, Pennsylvania
  • Hialeah Egregor Crypto-Ransomware Repair Miami-Dade County Hialeah DopplePaymer Ransomware Rollback Hialeah Florida
  • ISA 2004 Standard Edition Server Engineer ISA 2004 Standard Edition Server Consultant Services
  • IT Outsourcing Migration Consultant Warren Chesterfield Microsoft and Cisco Service Warren Clinton Township

  • Amazon enterprise hybrid cloud solutions Contract Programmer
    Microsoft and Cisco Certified Amazon S3 integration Design Firms

    Progent can provide affordable online support to help businesses of any size to access Amazon AWS cloud services including Amazon EC2 for virtual server hosting, Amazon S3 for scalable cloud storage, and Glacier for low-cost long-term archiving. Progent can help your IT team with every phase of Amazon AWS migration and troubleshooting including needs analysis, readiness evaluation, system design and review, testing, configuration, administration, performance tuning, software license management, disaster recovery solutions, and security strategies. Progent can provide advanced expertise with firewalls and VPN access and can show you how to deploy all-cloud or hybrid cloud ecosystems that efficiently incorporate Amazon AWS services. Progent offers occasional consulting to assist you to overcome complex technical issues or Progent can deliver project management outsourcing services to help you migrate to the Amazon AWS cloud on schedule and on budget.

  • Immediate Columbus Crypto-Ransomware Repair Consulting Immediate Columbus Crypto-Ransomware Repair Support Services Columbus
  • Liverpool Microsoft Dynamics GP-Great Plains Liverpool Supplier - Upgrade Expert Liverpool Liverpool MS Dynamics GP Implementation Support Services

  • Hyper-V 3.0 Virtual Server Consult
    Support Hyper-V 3.0 Shared Nothing Live Migration

    Microsoft Windows Server 2012 R2 Hyper-V advances the power of server virtualization in critical areas such as multitenancy, flexible network infrastructure, cloud readiness, expandability and throughput, and fault tolerance. Progent's Microsoft-certified consulting experts can help your business to benefit from Hyper-V to deploy and manage virtual servers to reduce network costs and enhance availability.

  • Manaus Crypto-Ransomware Settlement Negotiation Services Manaus, Amazonas Manaus Hermes Crypto-Ransomware Negotiation Expertise Amazonas
  • Manchester Telecommuters Management Systems Guidance Manchester, NH After Hours Work from Home Employees Guidance near me in Manchester - Endpoint Management Systems Guidance
  • Security Management Services
  • Miami-Dade County Hialeah IT Staff Temps Support Hialeah IT Staffing Temps Services Hialeah
  • 24-Hour Certified Cybersecurity Management Consultancy
  • Microsoft Exchange 2010 Migration Consult Top Exchange Server 2010 Upgrade Engineers
  • Security Management Services
  • Microsoft SharePoint Server Integration Support Jardim da Penha, Vitoria SharePoint Server 2013 Remote Consulting
  • Microsoft and Mac Desktop Computer Consultancy Biggest Desktop Technology Technical Support Organizations
  • Napa California Napa WannaCry Crypto-Ransomware Forensics Napa DopplePaymer Crypto-Ransomware Forensics Analysis Napa Valley

  • SQL Server Replication Consultants
    Security Audits MS SQL

    SQL Server 2005 offers powerful, standardized tools to IT professionals and network users, lessening the complexity of creating, integrating, managing, and accessing enterprise information and analytical applications in environments ranging from mobile devices to enterprise data systems. The sophistication and integration demands of Microsoft SQL Server 2005 require an IT consultant with hands-on expertise and broad knowledge in planning and deploying data-driven, comprehensive business IT applications. The knowledge and experience of Progent's Microsoft-certified technical team, with an average of over 10 years of professional work supporting Microsoft technology, assures you success in planning, deploying and managing Microsoft SQL Server 2005 applications that are seamlessly integrated with the Microsoft .NET platform.

  • New Jersey Networking Services Microsoft Newark New Jersey IT Consulting
  • On-site Support Ubuntu Linux, Solaris, UNIX Anchorage Muldoon Mall Ubuntu Linux, Solaris, UNIX Remote Support
  • Ontario Crypto Removal Ontario Rialto Hesperia Chino Ontario WannaCry Crypto Removal Ontario, San Bernardino County
  • CISM Forensics Services
  • Remote Teleworkers Consultants in Toledo - Endpoint Management Solutions Consulting Experts Toledo Bowling Green Toledo Remote Workforce Endpoint Management Solutions Consulting Toledo, U.S.A.
  • Remote Workforce Consulting Experts in Fort Worth - IP Voice Technology Consulting Services Fort Worth Texas Fort Worth Work from Home Employees VoIP Systems Consulting and Support Services Fort Worth, Tarrant County

  • Juniper Netscreen Testing
    Watchguard Information systems Security Outsourcing

    Progent provides small and mid-size businesses expert support for Intrusion Protection products and IPsec VPN products from leading firewall and Virtual Private Network security companies including WatchGuard, Juniper Networks, and Symantec. Progent can help you design a detailed security plan and select the right products from multiple suppliers to achieve your security goals while sticking within your spending restraints.

  • Rhode Island - Providence, RI, Warwick, RI, Cranston, RI Exchange Small Business IT Consultant Exchange Computer Consulting Rhode Island
  • Salt Lake City, UT IT Outsourcing Firm Salt Lake City Design Company
  • San Diego UCSD Ransomware Attack Recovery San Diego-La Jolla San Diego UCSD Egregor Crypto-Ransomware Removal San Diego-La Jolla
  • Seattle, WA Network Consulting Seattle, Washington Consulting Services Firm

  • Support and Help Remote Workers
    Helpdesk for Remote Workforce Remote Support

    Progent has 20 years of background helping small and mid-size businesses to design, implement, optimize, manage, and debug IT networks that support at-home workers.

  • Security Security Team Newark New Jersey CISSP Network Consulting New Jersey
  • Small Business Networking Denver Denver, CO Computer Network Support Group

  • Help and Support At Home Workers Endpoint Security
    Open Now Teleworker Cybersecurity Specialist

    Progent can assist small and medium-size organizations to configure endpoint security protection systems and provide response expertise for remote workers.

  • Professionals CISM Security Management
  • Solaris Support Services Vermont - Burlington, VT, Rutland, VT, Montpelier, VT Vermont, United States Sun Solaris Specialists
  • Southlake Texas Southlake Crypto-Ransomware NotPetya Susceptibility Review Southlake Crypto-Ransomware MongoLock Susceptibility Consultation Southlake-Grapevine
  • St. Louis MongoLock Crypto-Ransomware File-Recovery St Louis Forest Park 24/7 St. Louis Hermes Ransomware Remediation St Louis Forest Park

  • Specialist Online Acrobat Writer Training
    Microsoft Office 365 Webinar Engineer

    Progent offers live online training for popular desktop applications and operating systems including Office and Microsoft 365 Excel, Word, PowerPoint and Visio plus Adobe Acrobat Writer, Photoshop, Crystal Reports, and Windows 10. Remote training provides the advantages of conventional in-person instruction, including instant interaction between students and teachers, but avoids the costs of transportation and the challenge of trying to synchronize the availability of multiple trainees. Available to single students or classes of any size, Progent's live online training allows the trainer to run the seminar from a remote office and the clients can be dispersed throughout an office or across the country. Virtual education utilizes powerful learning aids such as broadcast white boards, real-time questions, and shared applications. Sessions can be brief and targeted to specialized subjects or extended in duration and wider in coverage.

  • Stockton Spora Ransomware Settlement Negotiation Experts Tracy CA, America Stockton Ryuk Ransomware Negotiation Experts Stockton, United States

  • System Center 2016 Orchestrator Network Consulting
    Microsoft System Center 2016 Consultants

    Progent's Microsoft-certified consulting experts have over a decade of background designing, deploying, enhancing and troubleshooting System Center Operations Manager solutions and offer companies of all sizes expert online or on-premises consulting services for System Center 2012 Operations Manager. Progent can assist you to plan a topology for SCOM 2012 servers that provides the responsiveness and availability required to monitor your datacenter effectively, whether your datacenters are on-premises, in the cloud, or a mixed solution. Progent's SCOM consultants can also help you to install and set up System Center 2012 Operations Manager management packs according to best practices for tracking network fabric and both Microsoft and third-party applications and services. Also, Progent can provide fast remote or on-premises technical support to assist you to remediate critical problems detected by SCOM 2012.

  • Support Services Microsoft SharePoint 2010 Vancouver SharePoint Remote Troubleshooting Vancouver
  • Tampa-Hillsborough County Outsourced IT Services Tampa Computer Network Support
  • Telecommuters Joinville Consultants - Backup/Recovery Systems Consulting Services Joinville At Home Workforce Joinville Expertise - Backup/Restore Technology Consultants Joinville, State of Santa Catarina

  • Office Word for Mac Development
    Microsoft Word Web App Consultants

    Progent's Microsoft Office Word and Microsoft 365 Word consultants can provide a broad range of economical online support services to help your organization to manage your existing Microsoft Word solution or help you to move to a current version of Microsoft Office Word. Services offered by Progent's experts include VBA programming, isolating and fixing compatibility issues between various releases of Word, integrating Office Word with other Microsoft Office applications like Excel and Outlook or with 3rd-party platforms and add-ons,network enhancements for dependable. reliable cloud access, security consulting, smart phone and tablet synchronization, and online training sessions customized for individuals or groups.

  • Teleworkers Consulting and Support Services near Sorocaba - Help Desk Solutions Consulting Sorocaba, Sao Paulo Sorocaba At Home Workforce Call Desk Solutions Consulting and Support Services Sorocaba
  • Top Security Consultants Microsoft Exchange 2010 Computer Network Support Firms Exchange Server 2019 Orange County Southern California

  • Microsoft Operations Manager Help and Support
    MOM 2007 Support and Setup

    Small to middle size companies can now enjoy all the advantages of Microsoft System Center Operations Manager and also have fast access to Progent's Microsoft and Cisco certified IT consulting experts. With Progent's economically priced IT support packages, mid-size organizations can choose a simple co-sourcing service program built around Operations Manager with network monitoring, reporting, Help Desk and remote service or a comprehensive round-the-clock outsourcing package. Progent supports System Center Operations Manager to offer small and midsize company information systems world-class availability, security and performance.

  • Top Walnut Creek-Concord Consulting Services Company Walnut Creek-Alamo Technical Support Company
  • WannaCry Ransomware Hot Line Gilroy CA Snatch Ransomware Hot Line Gilroy CA, United States
  • West Palm Beach-Boynton Beach West Palm Beach Crypto-Ransomware Ryuk Preparedness Assessment West Palm Beach Crypto-Ransomware Egregor Susceptibility Review West Palm Beach-Lake Worth, United States
  • Open Now Consult CISM Certified Cybersecurity Management
  • Windows 2008 Server Networking Help Manaus Immediate Network Administration Windows Server 2016 Manaus, Amazonas
  • Work at Home Employees Cincinnati Assistance - Connectivity Guidance Cincinnati Teleworkers Consulting Experts in Cincinnati - Integration Solutions Consulting Services Cincinnati Milford, United States
  • Work at Home Employees Consultants near me in Glendale - Cloud Solutions Consulting Dallas County Work at Home Employees Glendale Consulting and Support Services - Cloud Systems Assistance Garland Centerville
  • Work at Home Employees Denver Guidance - Endpoint Management Solutions Consulting Denver Mile High City Denver Colorado Telecommuters Denver Consulting Services - Management Systems Consulting Services

  • © 2002-2022 Progent Corporation. All rights reserved.