CISM Security Management ConsultingProgent offers the services of security consultants who have earned Certified Information Security Manager (CISM) Certification. CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management and consulting services.

CISM measures expertise in the areas of information security management including information security governance, information risk management, information security program development and management, and information security incident management. CISM certification also requires five years of professional experience in information management.

Information Security Governance:
Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Tasks include:

  • Develop the information security strategy in support of business strategy and direction.
  • Obtain senior management commitment and support for information security throughout the enterprise.
  • Ensure that definitions of roles and responsibilities throughout the enterprise include information security governance activities.
  • Establish reporting and communication channels that support information security governance activities.
  • Establish and maintain information security policies that support business goals and objectives.
  • Ensure the development of procedures and guidelines that support information security policies.
  • Develop business case and enterprise value analysis that support information security program investments.
Risk Management:
Identify and manage information security risks to achieve business objectives. Tasks include:
  • Develop a systematic, analytical and continuous risk management process.
  • Ensure that risk identification, analysis and mitigation activities are integrated into life cycle processes.
  • Apply risk identification and analysis methods.
  • Define strategies and prioritize options to mitigate risk to levels acceptable to the enterprise.
  • Report significant changes in risk to appropriate levels of management on both a periodic and event-driven basis.
Information Security Program Management:
Design, develop and manage an information security program to implement the information security governance framework. Tasks include:
  • Create and maintain plans to implement the information security governance framework.
  • Develop information security baseline.
  • Develop procedures and guidelines to ensure business processes address information security risk.
  • Develop procedures and guidelines for IT infrastructure activities to ensure compliance with information security policies.
  • Integrate information security program requirements into the organization's life cycle activities.
  • Develop methods of meeting information security policy requirements that recognize impact on end users.
  • Promote accountability by business process owners and other stakeholders in managing information security risks.
  • Establish metrics to manage the information security governance framework.
  • Ensure that internal and external resources for information security are identified, appropriated and managed.
Information Security Management:
Oversee and direct information security activities to execute the information security program. Tasks include:
  • Ensure that the rules of use for information systems comply with the enterprise's information security policies.
  • Ensure that the administrative procedures for information systems comply with the enterprise's information security policies.
  • Ensure that services provided by other enterprises, including outsourced providers, are consistent with established information security policies.
  • Use metrics to measure, monitor and report on the effectiveness of information security controls and compliance with information security policies.
  • Ensure that information security is not compromised throughout the change management process.
  • Ensure that vulnerability assessments are performed to evaluate effectiveness of existing controls.
  • Ensure that noncompliance issues and other variances are resolved in a timely manner.
  • Ensure the development and delivery of activities that can influence culture and behavior of staff including information security education and awareness.
Response Management:
Develop and manage a capability to respond to and recover from disruptive and destructive information security events. Tasks include:
  • Develop and implement processes for detecting, identifying and analyzing security related events.
  • Develop response and recovery plans including organizing, training and equipping the teams.
  • Ensure periodic testing of the response and recovery plans where appropriate.
  • Ensure the execution of response and recovery plans as required.
  • Establish procedures for documenting an event as a basis for subsequent action, including forensics when necessary.
  • Manage post-event reviews to identify causes and corrective actions.
Additional Certifications Earned by Progent's Security Consultants
In addition to offering the services of security specialists with CISM security manager credentials, Progent can also provide your business with access to CISSP-certified cybersecurity experts, ISSAP-certified network architecture security consultants, CISA-certified information security audit engineers, GIAC-certified information assurance consultants, and CRISC-certified risk management consultants.

Contact Progent for Access to a CISM-certified Information Security Consultant
If you need computer security expertise, phone Progent at 800-993-9400 or see Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is designed to assist organizations to take the time-critical first phase in responding to a ransomware assault by containing the malware. Progent's online ransomware engineer can help you to identify and isolate breached servers and endpoints and guard undamaged resources from being penetrated. If your network has been penetrated by any strain of ransomware, act fast. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For details, see Progent's Ransomware 24x7 Hot Line.



An index of content::

  • 24-Hour Microsoft Expert SharePoint Business Connectivity Services Consulting Services SharePoint Business Connectivity Services Specialist

  • Microsoft System Center Operations Manager Engineer
    24x7 Network Consultants

    Even if your company has a small computer services staff and a limited technology budget, your information network can still have the same high reliability and performance that once required a large internal service organization. Progent's 24x7 Network Support Services for small businesses combine the experience of skilled Microsoft-expert and Cisco-certified network professionals, the latest network management products for proactive monitoring and alerts, and economical service programs such as a help desk call center to keep your mission-critical business applications and servers up and running.

  • 24x7 Boise Ryuk Remote Ransomware Operational Recovery Experts Immediate Boise Lockbit Ransomware Repair Ada County Idaho
  • Security Firm CISM Certified Cybersecurity
  • 24x7 Seattle Crypto-Ransomware Ryuk Susceptibility Evaluation Seattle Ransomware Sodinokibi Readiness Evaluation
  • 24x7x365 Microsoft, Cisco and Security Certified Experts MySQL database Upgrade Help MySQL development Services

  • Altaro VM Backup with Exchange Remote Support
    Altaro VM Backup and Hyper-V Setup and Support

    Altaro VM Backup from Hornetsecurity offers small organizations a reliable and affordable solution for backing up and recovering Hyper-V and VMware-powered VMs. Altaro VM Backup can be used for on-premises, offsite, multi-site, and cloud architectures and also supports low-cost backup to Microsoft Azure storage. Altaro VM Backup protects against ransomware attacks by leveraging Immutable Cloud Storage. This produces tamper-proof data that cannot be modified by any user including administrators. Progent is a certified Hornetsecurity/Altaro partner and can provide a broad range of remote or onsite consulting services to help you to plan, install, manage and troubleshoot a comprehensive backup/restore system based on Altaro VM Backup. With ProSight Data Protection Services Altaro VM Backup, Progent offers a managed backup/recovery service based on Altaro VM Backup technology.

  • At Home Workforce Cheyenne Consulting Services - Setup Assistance Cheyenne-Casper Work from Home Employees Consulting Experts near me in Cheyenne - Infrastructure Assistance Cheyenne Wyoming
  • Award Winning Outsourcing Company Cisco Cisco Networking Services Kansas City, Jackson County
  • Award Winning Scottsdale IT Staff Augmentation Support Scottsdale Scottsdale Supplemetary IT Staffing Help Scottsdale Arizona
  • Barueri-Alphaville 24/7 Crypto-Ransomware Remediation Barueri-Alphaville Crypto Repair Support Services Estado de São Paulo
  • Chattanooga Networking Consultant Chattanooga IT Management
  • Cisco installation and Administration Perth Network Management Cisco Perth
  • Consultancy MongoLock ransomware recovery Snatch ransomware recovery Professionals
  • Crypto Cleanup Help Woodland County Ohio Dayton, OH Award Winning Dayton 24x7x365 Ransomware Remediation Services
  • Design Firm Windows Server 2016 Austin, TX Networking Company Windows Austin-Bergstrom Airport AUS
  • CISM Certified Cybersecurity Management Professionals
  • Dynamics GP (Great Plains) Akron Reseller - Installation Expert Akron, OH Akron, Summit County Akron MS Dynamics GP Customization Experts

  • Top Recruit Network Consultant Job Opportunities
    Emergency Telecommuting Cisco Consulting Remote Support Jobs

    If you are an information technology consultant with system support experience, teaming with Progent and working for our clients will expand your skills via interaction with our team of mutually supportive, high-output consultants. Progent's commitment to providing network expertise and computer support to small and midsize companies will give you the opportunity to work closely with decision makers and contribute tangibly to the growth of exciting companies. In addition, Our virtual office network provides the most advanced technology for remote service and wireless access to allow you to come up with speedy solutions when you take on business-critical issues.

  • Dynamics GP-Great Plains Premier Partner in Vancouver - Upgrades Experts MS Dynamics GP Reseller in Vancouver - Reporting Support Services Vancouver , British Columbia
  • Dynamics GP-Software Partner in Shreveport - Implementation Development Shreveport Louisiana Dynamics GP Vender - Shreveport - Database Support Services Shreveport, LA
  • Emergency Manhattan Beach Crypto-Ransomware Cleanup Manhattan Beach-Inglewood, California Manhattan Beach Dharma Crypto Repair Manhattan Beach-Inglewood, California
  • CISM Certified Cybersecurity Security Tech Services
  • Emergency Spartanburg Crypto Remediation Spartanburg-Greer, SC, U.S.A. Spartanburg Crypto-Ransomware Remediation
  • Expertise for Valencia IT Service Organizations Valencia-San Fernando, CA Consulting Services for Valencia Network Service Organizations Valencia-Santa Clarita, California
  • Certified Cybersecurity Management Technology Professional
  • Fargo Fargo Ransomware Infection Consultation Fargo Crypto-Ransomware Spora Susceptibility Consultation Fargo-Fargo, North Dakota

  • After Hours SentinelOne Malware Forensics Experts Troubleshooting
    24x7 SentinelOne Endpoint Protection and Response Consultant Services

    Progent is a reseller and consulting firm for SentinelOne's Singularity product family, a subscription-based, cloud-first cyberthreat management platform that incorporates machine learning technology and expert services to deliver comprehensive endpoint detection and response.

  • Firepower Network Consultants After Hours Cisco Firepower 9300 Series Firewalls Technical Support
  • Firewall Firewall Network Install Montana Security Consulting Services Montana
  • Folsom Small Business IT Outsourcing Group Rancho Cordova Computer Network Consulting company
  • Fort Myers MongoLock Crypto-Ransomware Forensics Investigation Fort Myers-Lehigh Acres Fort Myers Lockbit Ransomware Forensics Analysis Fort Myers-Lehigh Acres
  • Hartford, CT Offsite Workforce Consulting Experts near Hartford - Collaboration Solutions Consulting and Support Services Work at Home Employees Hartford Consulting and Support Services - Collaboration Solutions Consulting Services Hartford Enfield Bristol Farmington
  • Hyper-V 2016 Failover Clusters Network Consultants Hyper-V 2016 Migration Remote Technical Support
  • IT Services Microsoft Operations Manager MOM 2016 Information Technology Consulting
  • CISM Certified Cybersecurity Management Professional
  • Immediate Professional Ubuntu Linux, Sun Solaris, UNIX Computer Consultant Slackware Linux, Solaris, UNIX Denver, CO
  • Information Technology Consulting Wilmington, DE IT Outsourcing Companies Wilmington, Delaware

  • Wi-Fi 6 wireless controller Support Services
    3504 wireless controller Professionals

    Cisco's Catalyst family of wireless controllers streamline the administration of wireless LANs by unifying the provisioning and control of wireless access points, tuning wireless performance by reducing the impact of radio frequency congestion, improving Wi-Fi uptime with fast auto-failover, and hardening security by identifying cyber threats and filtering traffic content according to user type and locale. Progent's Wi-Fi consultants can help your business to deploy Cisco Wi-Fi controller appliances to manage and monitor wireless networks of all sizes. Progent can help you to maintain and debug your existing Cisco Wi-Fi solution or implement an efficient transition to Cisco's modern Wi-Fi controller solutions.

  • Jacksonville Consulting Support for Network Service Providers Jacksonville Consulting Expertise for IT Service Companies near me in Jacksonville - Temporary Staff Help
  • Largest SharePoint Server 2019 Remote Consulting Panamá Microsoft SharePoint Server Consulting
  • Microsoft Exchange Server 2016 Upgrade On-site Support Technology Consulting Services Exchange Server 2016 Upgrade Planning
  • Microsoft Exchange Software Recovery Mesquite Texas, United States Cisco CCIE Small Business IT Consulting Companies Mesquite Lancaster Duncanville, United States
  • Microsoft Forefront TMG Online Consulting Microsoft Forefront TMG Network Consultants

  • Antivirus Consulting
    Anti-Virus Small Business Subscription

    E-Mail Guard is Progent's economical anti-spam and anti-virus service that gives small companies enterprise-quality protection against spam, viruses, DHA attacks, and other varieties of email-borne attacks on IT systems. E-Mail Guard is based on Postini's perimeter management technology, a full suite of web-based anti-spam and antivirus services that ward off email assaults before they can penetrate the company firewall. Perimeter Manager also lets administrators monitor and control their email systems, regardless of server vendor, hardware type, or data center location.

  • Microsoft SQL Server Security Consulting Services Fort Myers-Cape Coral, United States SQL Server 2014 Computer Network Consultants Fort Myers, United States

  • Top Microsoft Office SharePoint Server 2019 Online Technical Support
    Top Quality SharePoint Server 2007 IT Consultant

    Progent's Microsoft-authorized consultants can help you evaluate the business case for deploying SharePoint 2007, advise you on the most appropriate version of SharePoint Server for your application, offer setup and integration services, assist you to set up Microsoft SQL Server as a back-end DBM, optimize your network integrity, integrate your standard and custom application software to work with SharePoint Server 2007, develop a company-wide security strategy that includes portal solutions, and deliver maintenance and Help Desk services.

  • Microsoft SharePoint Server 2013 Engineer Sandy Springs-Cobb County Microsoft SharePoint Server 2010 Technical Support
  • Netwalker Ransomware Hot Line New Haven County CT Nephilim Ransomware Hot Line New Haven
  • Network Engineer Urgent Network Sunnyvale California Small Business Network Business Computer Server Companies Sunnyvale California
  • New Orleans At Home Workforce Backup Systems Consulting and Support Services New Orleans, Kenner New Orleans Remote Workforce Backup Systems Consulting Services New Orleans Louisiana
  • New Orleans, Baton Rouge, Shreveport, LA Computer Firms Computer Systems Consulting New Orleans Louisiana
  • CISM Certified Security Management Consult
  • Online Help SharePoint 2013 Saddle Brook-Bergen County, NJ Microsoft SharePoint Online Support
  • Ontario Remote Workforce Ottawa Consulting Services - Data Protection Solutions Consulting Work from Home Employees Consulting and Support Services near me in Ottawa - Backup/Restore Systems Consulting Experts
  • Ransomware Hot Line Indianapolis, US Ransomware Removal and Data Restore Indianapolis, Marion County
  • Ransomware Removal and Data Restore San Jose - Sana Clara San Jose, US Ransomware System Rebuild
  • Remote Workers Consulting - Scottsdale - Network Security Solutions Consultants Scottsdale, Maricopa County Scottsdale, Maricopa County Scottsdale Telecommuters Security Systems Guidance
  • Remote Workforce Consultants near Durham - Support Consulting Durham North Carolina Remote Workers Assistance in Durham - Integration Assistance Raleigh Durham Cary
  • Remote Workforce Guidance near Alexandria - Collaboration Technology Consulting Experts Alexandria, Capital Beltway At Home Workforce Alexandria Consultants - Collaboration Systems Assistance Alexandria Virginia
  • Remote Workforce Miami Expertise - Infrastructure Consulting MIA Remote Work from Home Employees Consulting near Miami - Integration Expertise Coral Gables
  • SQL Server Network Assessment El Paso, Fort Bliss, United States El Paso, TX Network Engineers Microsoft SQL Server 2016
  • San Mateo Netwalker Crypto-Ransomware Settlement Negotiation Expertise San Mateo, CA San Mateo Dharma Crypto-Ransomware Settlement Negotiation Services San Mateo County
  • Server Recovery Cisco Carlsbad-San Marcos, California Cisco Configure
  • CISM Certified Cybersecurity Management Services
  • SharePoint 2013 Technical Support Austin-Bergstrom Airport AUS, United States Microsoft SharePoint 2010 Consultant Austin, Travis County, U.S.A.
  • Small Business Network Consulting Companies Sandy Springs Best Consulting Group Sandy Springs, Georgia
  • Spartanburg, South Carolina Top Rated Spartanburg Ransomware Virus Mitigation Spartanburg Avaddon Ransomware Data-Recovery Spartanburg
  • Springfield Ryuk Ransomware Malware Data-Recovery Springfield Springfield Netwalker Ransomware Data-Recovery Springfield Massachusetts
  • Telecommuters Consulting Services near me in The Woodlands - Network Security Systems Consultants Montgomery County The Woodlands At Home Workforce Endpoint Security Solutions Consulting Services The Woodlands
  • Tulsa Offsite Workforce VoIP Systems Consulting Tulsa County Oklahoma Offsite Workforce Guidance near Tulsa - VoIP Systems Consulting Tulsa County Oklahoma
  • Windows 2008 Server Setup Winston-Salem North Carolina Forsyth County North Carolina Windows Server 2019 Consulting Firms
  • Top CISM Certified Cybersecurity Auditor
  • Work at Home Employees Assistance near Minnetonka - Integration Expertise Minnetonka-St Louis Park Minnetonka Teleworkers Setup Guidance Minnetonka-Hennepin County, MN, USA

  • Configuration wireless IP phone integration
    Professionals wireless IP phones and Meraki APs

    Cisco's wireless IP phones are industrial-grade wireless devices designed for professionals who are mobile within office, warehouse, health-care or other venues where management requires user endpoints that provide more control, security and ruggedness than is possible with the BYOD (Bring-Your-Own-Device) mode of mobile collaboration. Integration of Cisco's wireless VoIP phones usually demands that IT teams set up and optimize numerous key pieces of your Wi-Fi environment such as APs, routers, Cisco wireless LAN controllers, and call management software. Progent's Cisco-certified consultants can provide online and on-premises assistance to help your organization build and administer a Cisco wireless VoIP phone solution by delivering integration services that range from debugging the configuration of an IP phone or AP to offering project management outsourcing or co-sourcing services for updating the Wi-Fi architecture of a campus.

  • Work at Home Employees Oklahoma CIty Expertise - Conferencing Solutions Consulting Oklahoma City Teleworkers Oklahoma CIty Consulting - Voice/Video Conferencing Technology Guidance Oklahoma County
  • Work at Home Employees San Diego Consulting Experts - Help Desk Call Center Solutions Consulting and Support Services San Diego - La Jolla Open Now At Home Workers San Diego Consulting and Support Services - Call Desk Augmentation Expertise San Diego - La Mesa
  • Work from Home Employees Expertise near San Juan - Management Tools Consultants Puerto Rico, U.S.A. At Home Workers Consulting nearby San Juan - Management Systems Consulting Services San Juan, America

  • Remote Workforce Security Specialists
    Work from Home Endpoint Security Engineer

    Progent can help small and mid-size businesses to configure cybersecurity defense systems and provide cleanup expertise needed to support remote workers.


    © 2002-2024 Progent Corporation. All rights reserved.