CISM Security Management ConsultingProgent offers the services of security consultants who have earned Certified Information Security Manager (CISM) Certification. CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management and consulting services.

CISM measures expertise in the areas of information security management including information security governance, information risk management, information security program development and management, and information security incident management. CISM certification also requires five years of professional experience in information management.

Information Security Governance:
Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Tasks include:

  • Develop the information security strategy in support of business strategy and direction.
  • Obtain senior management commitment and support for information security throughout the enterprise.
  • Ensure that definitions of roles and responsibilities throughout the enterprise include information security governance activities.
  • Establish reporting and communication channels that support information security governance activities.
  • Establish and maintain information security policies that support business goals and objectives.
  • Ensure the development of procedures and guidelines that support information security policies.
  • Develop business case and enterprise value analysis that support information security program investments.
Risk Management:
Identify and manage information security risks to achieve business objectives. Tasks include:
  • Develop a systematic, analytical and continuous risk management process.
  • Ensure that risk identification, analysis and mitigation activities are integrated into life cycle processes.
  • Apply risk identification and analysis methods.
  • Define strategies and prioritize options to mitigate risk to levels acceptable to the enterprise.
  • Report significant changes in risk to appropriate levels of management on both a periodic and event-driven basis.
Information Security Program Management:
Design, develop and manage an information security program to implement the information security governance framework. Tasks include:
  • Create and maintain plans to implement the information security governance framework.
  • Develop information security baseline.
  • Develop procedures and guidelines to ensure business processes address information security risk.
  • Develop procedures and guidelines for IT infrastructure activities to ensure compliance with information security policies.
  • Integrate information security program requirements into the organization's life cycle activities.
  • Develop methods of meeting information security policy requirements that recognize impact on end users.
  • Promote accountability by business process owners and other stakeholders in managing information security risks.
  • Establish metrics to manage the information security governance framework.
  • Ensure that internal and external resources for information security are identified, appropriated and managed.
Information Security Management:
Oversee and direct information security activities to execute the information security program. Tasks include:
  • Ensure that the rules of use for information systems comply with the enterprise's information security policies.
  • Ensure that the administrative procedures for information systems comply with the enterprise's information security policies.
  • Ensure that services provided by other enterprises, including outsourced providers, are consistent with established information security policies.
  • Use metrics to measure, monitor and report on the effectiveness of information security controls and compliance with information security policies.
  • Ensure that information security is not compromised throughout the change management process.
  • Ensure that vulnerability assessments are performed to evaluate effectiveness of existing controls.
  • Ensure that noncompliance issues and other variances are resolved in a timely manner.
  • Ensure the development and delivery of activities that can influence culture and behavior of staff including information security education and awareness.
Response Management:
Develop and manage a capability to respond to and recover from disruptive and destructive information security events. Tasks include:
  • Develop and implement processes for detecting, identifying and analyzing security related events.
  • Develop response and recovery plans including organizing, training and equipping the teams.
  • Ensure periodic testing of the response and recovery plans where appropriate.
  • Ensure the execution of response and recovery plans as required.
  • Establish procedures for documenting an event as a basis for subsequent action, including forensics when necessary.
  • Manage post-event reviews to identify causes and corrective actions.
Additional Certifications Earned by Progent's Security Consultants
In addition to offering the services of security specialists with CISM security manager credentials, Progent can also provide your business with access to CISSP-certified cybersecurity experts, ISSAP-certified network architecture security consultants, CISA-certified information security audit engineers, GIAC-certified information assurance consultants, and CRISC-certified risk management consultants.

For more information about Progent's computer security engineering help, telephone Progent at 800-993-9400 or see Contact Progent.

An index of content::

  • 24-7 External Cybersecurity Scan Consultant Services Consulting Services External Network Security Inventory
  • 24/7 Cisco Computer Network Support Companies Morgan Hill Santa Clara County 24x7x365 Cisco Small Business IT Consultant Morgan Hill Santa Clara County, America
  • 24 Hour CISM Certified Cybersecurity Cybersecurity Organizations
  • 24/7 SQL Server 2012 Help Center San Carlos, CA Microsoft SQL 2008 Computer Network Support Burlingame CA
  • 24x7x365 Consulting Expertise for Computer Support Firms in Long Beach - Transparent Temporary Support Team Assistance Long Beach Southern California Long Beach Southern California, United States Long Beach Specialists for Network Service Organizations
  • 800 Series ISR Router Help and Support ISR Routers Online Troubleshooting

  • Computer Consulting Exchange Online Archiving
    Microsoft 365 AD Connect Support and Help

    Microsoft 365 Exchange Online allows you to utilize cloud-resident virtual machines, mailboxes and associated Exchange infrastructure to reduce capital expense and administrative overhead. You can deploy Exchange Online to host all your mailboxes, or you can integrate a hybrid solution that incorporates on-premises and cloud-hosted mailboxes. Progent's Microsoft-certified consultants offer affordable remote support to assist your organizations to assess the benefits of Microsoft 365 Exchange Online, design a solution that makes sense for your functional requirements and budget, carry out an efficient move from your current Exchange system to one that incorporates Exchange Online, train your management team and users, and provide as-needed consulting and troubleshooting.

  • Addison-Richardson, TX Remote Workforce Expertise near Addison - Cloud Technology Consultants At Home Workers Consulting nearby Addison - Cloud Systems Assistance Addison-Richardson, TX, United States

  • MSP360 Backup Consultants
    MSP360 Desktop Backup Online Help

    Progent's data protection experts can assist your company to design, implement and troubleshoot a backup/restore solution based on MSP360 software. MSP360 enables file/folder or image backup/restore for virtual machines and physical machines, supports all popular public clouds, and allows you to build a backup solution with a low RTO and a defined Recovery Point Objective (RPO). With ProSight DPS 360 Backup, Progent offers end-to-end monitoring and remote management of your backup system to prevent data loss resulting from human miscues, computer errors, malicious users, and external attacks such as ransomware.

  • After Hours Microsoft DPM Offsite Data Backup Service Remote Troubleshooting 24 Hour Offsite DPM Backup Service Technology Professional
  • Albany Remote Workforce Collaboration Technology Consulting Albany-Clifton Park, NY Work at Home Employees Consulting Experts in Albany - Collaboration Systems Consulting and Support Services Albany
  • At Home Workers Broomfield Expertise - Security Systems Consulting Services Broomfield Broomfield Teleworkers Cybersecurity Systems Consulting Experts Broomfield Colorado

  • Engineer Windows Server 2022 Encrypted Networks
    Windows Server 2022 Live Migration Online Technical Support

    Progent's certified Windows Server 2022 experts can assist your company to plan and carry out an efficient migration to Windows Server 2022 using a self-hosted system architecture or a hybrid model that combines cloud-hosted Windows Server on Azure with a datacenter-based implementation of Windows Server 2022.

  • At Home Workers Consulting in Stamford - Network Security Solutions Consulting Experts Stamford, CT At Home Workers Consulting Experts - Stamford - Security Systems Guidance Stamford
  • Best Santos Spora Ransomware Business Recovery Santos, SP Urgent Santos Conti Ransomware System-Restoration Santos, Sao Paulo

  • 24x7 Radvision Video Conferencing Professional
    Professionals Cisco VTC

    Progent offers the support of a senior specialist with extensive experience configuring, managing, and upgrading telepresence platforms from top-tier suppliers such as Cisco, TANDBERG, Polycom, and LifeSize. Progent can coordinate with your in-house IT management group, your ISP, and your video conferencing platform supplier to help your company maximize the strategic value of your telepresence ecosystem.

  • Consultants CISM Certified Cybersecurity Management
  • Boise Idaho, US Supplemental Network Support Staffing Help Consulting Experts IT Staff Temps for IT Service Organizations Boise
  • Cisco PC Consulting Stamford, CT Cisco Network Recovery Stamford, CT
  • Computer Network Specialists Cisco Boston, Suffolk County Boston, MA Cisco Implementation Support
  • Consulting Expertise for Midtown Manhattan Network Support Companies Midtown Manhattan Consultants for Midtown Manhattan IT Service Organizations Manhattan NY
  • CISM Certified Cybersecurity Management Consultant Services
  • Emergency Reno, NV Outsource IT Reno Computer Support Consultants

  • Exchange 2013 In-Place Hold Support Outsourcing
    Exchange 2013 Project Planning Setup and Support

    Microsoft Exchange Server 2013 incorporates major improvements to the capabilities of its predecessor Exchange Server 2010 and delivers important new features as well as a revamped structure. These improvements affect vital facets of IT including manageability, high availability (HA), security, operational costs, teamwork, expandability, throughput, cross-version interoperability, and the user experience. Progent's certified Exchange 2013 consulting professionals can help you evaluate the possible business benefits of upgrading to Microsoft Exchange Server 2013, design an efficient validation and deployment strategy, and educate your IT team to maintain your Microsoft Exchange 2013 environment. Progent also offers affordable remote consulting and management for Microsoft Exchange Server 2013.

  • CISM Certified Security Management Professionals
  • Exchange 2016 PC Consulting Port Newark Newark Installer Microsoft Exchange 2016
  • Exchange Integration Specialists South Texas San Antonio Top Exchange Management San Antonio Airport SAT
  • Greensboro, Guilford County Microsoft Dynamics GP (Great Plains) Greensboro Solution Provider - SQL Server Expert Award Winning Greensboro Dynamics GP (Great Plains) Upgrade Consultants Greensboro Piedmont Triad
  • IT Consultants Belo Horizonte-Santa Luzia Belo Horizonte, DF Support Firms
  • Information Technology Consulting Companies Exchange 2019 Akron Canton Network Service Exchange Server 2013 Akron
  • Security Consulting CISM
  • Irving WannaCry Crypto-Ransomware Operational Recovery Irving Dallas Plano Irving Locky Ransomware System-Restoration Irving
  • Lima-La Victoria On-Call Services Network Assessments Lima, Lima Metropolitan Area
  • Louisville Dynamics GP Training Consultants Louisville Dynamics GP Upgrades Help Louisville, Jefferson County
  • Lubbock Nephilim Ransomware Restoration Lubbock, TX Emergency Lubbock Snatch Ransomware File-Recovery Lubbock

  • VMware VirtualCenter Consultant
    VMware Consultancy

    Progent can provide the assistance of a certified VMware VCDX expert to help your organization design, configure, manage and troubleshoot VMware vSphere-powered virtualization ecosystem for local datacenters, private and public clouds, or hybrid systems. Progent offers advanced expertise for deploying and configuring VMware Site Recovery Manager and VMware's NSX virtual network system for disaster recovery and business continuity. Progent has in-depth experience of VMware vCloud Director (vCD), vRealize Automation, vRealize Orchestrator (vRO) and vCloud tools for managing private and public cloud and hybrid cloud environments that deliver maximum availability, fault tolerance, and disaster recovery.

  • MSP360 B2 Backup Storage Online Support Services Top Ranked MSP360 GSuite Backup Onsite Technical Support
  • Manchester Avaddon Ransomware Mitigation City of Manchester Manchester Spora Ransomware Data-Recovery Sheffield
  • Mandrake Linux, Sun Solaris, UNIX Setup and Support Sacramento - Folsom, US Open Now Mandrake Linux, Sun Solaris, UNIX Technology Consulting Services Sacramento - Citrus Heights

  • Small Office IT Manager
    Small Office Design Companies

    Progent offers businesses of all sizes enterprise-class IT online or in-person consulting services for networks based on Microsoft Windows technology and Microsoft's .NET servers including MS Exchange Server 2013 and MS SQL Server 2012. Progent's Microsoft and Cisco Certified network consulting experts also offer security expertise for businesses varying in size from the small office to the worldwide enterprise.

  • Melbourne Phobos Crypto-Ransomware Settlement Experts Melbourne Melbourne Ransomware Negotiation Services Melbourne
  • Meraki Air Marshal Consultant Services Meraki Wi-Fi 6 AP Support Services
  • Meraki Outdoor Wi-Fi Access Point Professionals Meraki Wireless Access Point Integration Services

  • Security Evaluation Juniper Junos J-Web
    Juniper Junos CLI Information Technology Consulting

    Progent's Juniper-certified network engineers can help you utilize Junos OS and the Junos platform of network management applications to configure, administer, and monitor Junos-powered devices; migrate to the Junos OS operating system from other Juniper software platforms such as ScreenOS; and upgrade your Juniper routers, switches, and gateways to the latest version of Junos OS.

  • Microsoft 365 AD Connect Computer Engineer Hybrid Microsoft 365 and Exchange Onsite Technical Support
  • Microsoft Dynamics GP-Software Indianapolis Dealer - Recovery Experts Indianapolis Indianapolis MS Dynamics GP-Great Plains Customization Experts Indianapolis
  • Microsoft Dynamics GP-Software Reno Supplier - Upgrades Development Reno, Washoe County, United States Washoe County Nevada Reno MS Dynamics GP Upgrade Consultant
  • Microsoft Network Information Technology Consulting Company Visalia, San Joaquin Valley Visalia California Windows Security On-site IT Support

  • Juniper SRX210 Router Security Group
    Top Quality Juniper SRX220 Router Intrusion Detection

    Progent's Juniper-certified network engineers can help you evaluate the business case for adopting Juniper's SRX Series gateways, plan and execute cost-effective deployments, configure equipment to reflect your security strategy, and provide ongoing consulting services to help you monitor, manage, update, and troubleshoot your environment in order to maximize the business value of your SRX gateway solution.

  • Migration Riverside, CA 24/7 Cisco Certified Riverside-Norco Network Recovery
  • Minnetonka Consulting Support for IT Support Organizations Minnetonka-Plymouth, USA 24x7x365 Minnetonka Consulting for IT Service Companies Minnetonka

  • Emergency Cisco Network Management Outsourced IT Management Services
    Cisco Network Management Integration Services

    Progent's Cisco-Certified network engineers can assist you to use Cisco's management utilities along with a variety of specialized third-party products to build a comprehensive network management solution to keep your network operating reliably, fully utilize limited resources, guard your data, recover rapidly from device breakdown or deliberate assaults, and allow you to add or repurpose network resources sensibly and economically as your business evolves.

  • Mission Viejo Conti Crypto-Ransomware Remediation Mission Viejo-Laguna Niguel 24x7 Mission Viejo Hermes Ransomware Cleanup Mission Viejo-Dana Point, CA
  • Montgomery Conti Crypto-Ransomware Remediation Montgomery, AL Montgomery Snatch Crypto-Ransomware Data-Recovery Montgomery Mobile
  • CISM Certified Cybersecurity Management Consulting
  • New Orleans At Home Workforce Conferencing Solutions Consulting and Support Services New Orleans, LA 24-7 New Orleans Remote Workers Voice/Video Conferencing Solutions Consultants
  • Nuevo Leon IT Staff Augmentation for Computer Support Groups Monterrey IT Staffing Support Services San Pedro Garza García
  • 24x7 CISM Security Audit Services
  • Oxford-Worcester Engineers Integration Specialist Oxford-Worcester
  • ProSight client credential management Technology Professional ProSight domain management Consulting Services
  • Remote Workers Consulting Experts - Salt Lake City - Backup Systems Consulting Services Summit County Utah Salt Lake City Remote Workforce Data Protection Solutions Consulting Salt Lake City Ogden Clearfield
  • Reston-Ashburn Largest Windows Computer Service Providers Windows 2008 Server Software Consultants Reston-McLean, VA
  • Santa Cruz Remote Workers Cybersecurity Solutions Consulting Services Santa Cruz At Home Workforce Santa Cruz Consulting Services - Security Solutions Expertise Aptos, CA

  • After Hours Consultants Microsoft Exchange Server Upgrade
    Top Rated Exchange 2007 to Exchange 2010 Upgrade Engineer

    Progent's Microsoft and Cisco-certified consulting experts can assist your organization to determine the benefits of Exchange 2010 for your company and can assist your IT staff to design and carry out an efficient upgrade to Exchange Server 2010 from Exchange Server 2003 or Microsoft Exchange 2007 that will offer fast ROI by increasing your productivity, lowering the cost of hardware and support, streamlining administration, and integrating your key communications technologies.

  • Santa Rosa Spora Ransomware Restoration Cotati, Windsor CA Biggest Santa Rosa Netwalker Crypto-Ransomware Repair Santa Rosa

  • Expert Microsoft Certified Exchange 2003 to Exchange 2010 Upgrade Consulting
    Microsoft Exchange 2010 Migration Specialists

    Progent's Microsoft-certified engineers can deliver affordable online and on-premises support to implement your upgrade to Exchange Server 2010, generate comprehensive documentation of your upgraded messaging environment, educate your network support staff and users to get them ramped up rapidly on Exchange 2010, and provide continuing administrative services and engineering support. Progent's consultants can also assist you to upgrade from Microsoft Exchange 2010 to Exchange 2013 or Exchange 2016.

  • Security Protection Bulletins Cybersecurity Organization Emergency Critical Security Alerts Security Audit Services

  • SCCM 2012 Asset Management Online Technical Support
    SCCM 2012 Intune Integration Specialist

    Progent can help your organization to prepare for, implement, and administer System Center 2012 R2 Configuration Manager. Progent can help you to migrate smoothly to SCCM 2012 from an older device management platform or assist you to modify your current SCCM 2012 ecosystem to support your evolving business requirements. In addition, Progent can help you to create an infrastructure that extracts the most value from SCCM by providing advanced consulting support for related Microsoft platforms including Active Directory Domain Services (ADDS), SQL SSRS, and Internet Information Services (IIS).

  • Security Security Firms Las Vegas CISSP Security Firms Henderson Nevada
  • Short Term IT Staffing for Network Service Organizations Portland, OR, America Temporary IT Staffing Help Consultants Portland, United States
  • Silicon Valley Cisco Onsite and Remote Support Cisco Consultancy Services Group Fremont California
  • Solaris Remote Support Services Idaho Redhat Professionals Boise City, Ada County, Idaho
  • Specialist CISM Certified Cybersecurity Management
  • Telecommuters Augusta-Richmond County Consulting - Infrastructure Guidance Augusta Telecommuters Augusta-Richmond County Guidance - Infrastructure Consulting and Support Services Augusta, US
  • Telecommuters Consulting in Uniondale - Integration Solutions Consulting Services Uniondale Immediate At Home Workforce Uniondale Guidance - Connectivity Consulting and Support Services Uniondale-Hempstead, NY
  • Top Harrisburg At Home Workers Voice/Video Conferencing Systems Guidance Harrisburg PA Work from Home Employees Consulting - Harrisburg - Conferencing Technology Consultants Harrisburg-Lancaster, PA
  • Tulsa Ubuntu Linux, Solaris, UNIX Consulting Online Support Services Ubuntu Linux, Solaris, UNIX Tulsa
  • Urgent Reading Nephilim Crypto-Ransomware Forensics Investigation Reading Ryuk Crypto-Ransomware Reporting
  • Urgent Work at Home Employees Expertise nearby San Juan - Connectivity Solutions Consultants San Juan-Caribbean Telecommuters Consulting near me in San Juan - Integration Consultants San Juan
  • Urgent Work from Home Employees Consultants - Cleveland - Data Protection Technology Consulting and Support Services Cleveland At Home Workforce Cleveland Guidance - Data Protection Technology Guidance
  • Vacaville Crypto-Ransomware Removal Fairfield, USA Emergency Vacaville Crypto-Ransomware Removal Consulting Vacaville, CA
  • Vacaville-Dixon Information Technology Consulting Firms Support Team Vacaville Solano County
  • Valencia At Home Workforce Endpoint Management Solutions Consulting Experts Valencia-Santa Clarita Valencia-Santa Clarita, CA 24/7 Valencia Offsite Workforce Management Tools Consultants
  • Washington Hermes Crypto-Ransomware Recovery City of Washington Washington Netwalker Ransomware System-Rebuild DC
  • Wilmington IT Staff Temps Help Wilmington, Delaware Supplemental Staffing Help Consulting Specialist Wilmington
  • Windows Information Technology Outsource Boston, Worcester, Springfield, MA Windows Network Specialist Boston, MA, United States
  • Windows Server 2012 Manage Wilmington-New Castle Wilmington, Delaware, USA Windows Server 2016 Network Assessment

  • Consulting Egregor ransomware recovery
    24-Hour Avaddon ransomware recovery Engineers

    Progent's experienced ransomware recovery experts can assist you to reconstruct an IT network breached by a ransomware attack like Ryuk, Maze, Sodinokibi, DopplePaymer, Snatch or Nephilim.

  • Windows Server 2019 Hybrid Configuration Specialist Windows Server 2019 Live Migration IT Consulting
  • Work from Home Endpoint Security Support and Integration Remote Employees Endpoint Security IT Consulting

  • © 2002-2022 Progent Corporation. All rights reserved.