CISM Security Management ConsultingProgent offers the services of security consultants who have earned Certified Information Security Manager (CISM) Certification. CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management and consulting services.

CISM measures expertise in the areas of information security management including information security governance, information risk management, information security program development and management, and information security incident management. CISM certification also requires five years of professional experience in information management.

Information Security Governance:
Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Tasks include:

  • Develop the information security strategy in support of business strategy and direction.
  • Obtain senior management commitment and support for information security throughout the enterprise.
  • Ensure that definitions of roles and responsibilities throughout the enterprise include information security governance activities.
  • Establish reporting and communication channels that support information security governance activities.
  • Establish and maintain information security policies that support business goals and objectives.
  • Ensure the development of procedures and guidelines that support information security policies.
  • Develop business case and enterprise value analysis that support information security program investments.
Risk Management:
Identify and manage information security risks to achieve business objectives. Tasks include:
  • Develop a systematic, analytical and continuous risk management process.
  • Ensure that risk identification, analysis and mitigation activities are integrated into life cycle processes.
  • Apply risk identification and analysis methods.
  • Define strategies and prioritize options to mitigate risk to levels acceptable to the enterprise.
  • Report significant changes in risk to appropriate levels of management on both a periodic and event-driven basis.
Information Security Program Management:
Design, develop and manage an information security program to implement the information security governance framework. Tasks include:
  • Create and maintain plans to implement the information security governance framework.
  • Develop information security baseline.
  • Develop procedures and guidelines to ensure business processes address information security risk.
  • Develop procedures and guidelines for IT infrastructure activities to ensure compliance with information security policies.
  • Integrate information security program requirements into the organization's life cycle activities.
  • Develop methods of meeting information security policy requirements that recognize impact on end users.
  • Promote accountability by business process owners and other stakeholders in managing information security risks.
  • Establish metrics to manage the information security governance framework.
  • Ensure that internal and external resources for information security are identified, appropriated and managed.
Information Security Management:
Oversee and direct information security activities to execute the information security program. Tasks include:
  • Ensure that the rules of use for information systems comply with the enterprise's information security policies.
  • Ensure that the administrative procedures for information systems comply with the enterprise's information security policies.
  • Ensure that services provided by other enterprises, including outsourced providers, are consistent with established information security policies.
  • Use metrics to measure, monitor and report on the effectiveness of information security controls and compliance with information security policies.
  • Ensure that information security is not compromised throughout the change management process.
  • Ensure that vulnerability assessments are performed to evaluate effectiveness of existing controls.
  • Ensure that noncompliance issues and other variances are resolved in a timely manner.
  • Ensure the development and delivery of activities that can influence culture and behavior of staff including information security education and awareness.
Response Management:
Develop and manage a capability to respond to and recover from disruptive and destructive information security events. Tasks include:
  • Develop and implement processes for detecting, identifying and analyzing security related events.
  • Develop response and recovery plans including organizing, training and equipping the teams.
  • Ensure periodic testing of the response and recovery plans where appropriate.
  • Ensure the execution of response and recovery plans as required.
  • Establish procedures for documenting an event as a basis for subsequent action, including forensics when necessary.
  • Manage post-event reviews to identify causes and corrective actions.
Additional Certifications Earned by Progent's Security Consultants
In addition to offering the services of security specialists with CISM security manager credentials, Progent can also provide your business with access to CISSP-certified cybersecurity experts, ISSAP-certified network architecture security consultants, CISA-certified information security audit engineers, GIAC-certified information assurance consultants, and CRISC-certified risk management consultants.

Contact Progent for Access to a CISM-certified Information Security Consultant
For more information about Progent's computer security engineering help, telephone Progent at 800-993-9400 or visit Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is designed to guide you to complete the urgent first step in responding to a ransomware attack by stopping the bleeding. Progent's remote ransomware expert can help you to identify and isolate breached servers and endpoints and guard undamaged resources from being penetrated. If your network has been penetrated by any version of ransomware, act fast. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For more information, see Progent's Ransomware 24x7 Hot Line.



An index of content::

  • 24-Hour On-site Technical Support SQL Server 2017 Mobile Reports SQL Server 2017 Development Professionals
  • 24/7 Active Directory Cleanup Engineer Network Infrastructure Health Review Consultants
  • 24/7 Edmonton Offsite Workforce Cloud Systems Expertise Edmonton, Alberta Work from Home Employees Consultants near me in Edmonton - Cloud Technology Consulting and Support Services
  • After Hours Security Management Consulting
  • Aironet Outdoor APs Technology Consulting Services Aironet 802.11ac AP Upgrade Technical Consultant
  • Anaheim IT Staff Temps Services Anaheim Anaheim IT Staffing Support Anaheim
  • At Home Workforce Glendale Consultants - Integration Solutions Consultants At Home Workers Glendale Consulting Experts - Connectivity Guidance Garland Centerville
  • Information systems Security Outsourcing CISM
  • Boston Cambridge, United States After Hours Boston 24/7 Ransomware Removal Boston CryptoLocker Remediation
  • Botafogo, Ipanema Telecommuters Ipanema Guidance - Cybersecurity Solutions Consultants Offsite Workforce Ipanema Consulting - Security Systems Consulting Services Ipanema

  • Co-managed Helpdesk Costs Network Consulting
    24x7 Service Desk Sharing Economics On-site Support

    Progent's Help Desk Call Center outsourcing and co-sourcing services help organizations to reduce costs, increase productivity, and adjust rapidly to sudden changes in economic circumstances.

  • CISSP Consulting Services Santiago Firewall Configure Firewall Providencia

  • Computer Consulting Companies Work at Home Integration
    Configure WiFi Site Surveys

    Progent's computer outsourcing services for small businesses include planning 2003 Server, .NET Server, and BackOffice environments, coordinating upgrades to XP, Windows Server 2003, Active Directory, and Exchange 2003 Server, Help Desk Call Center, online and in-person repair, fixing chronic integration problems, and creating a comprehensive security plan. Progent can show you how to enhance network reliability and throughput with fault-tolerant configuration, resilient network topology, and proactive network monitoring. Progent also offers project management help for large-scale migrations and can assist with requirements definition, resource inventory, bill of materials production, sourcing selection, procurement coordination, and full documentation. Progent's IT outsourcing service also includes education for office productivity products such as Office XP.

  • Cisco Certified Expert Davis Network Support Consultants Yolo County Small Business Computer Consulting Companies
  • Cisco Expert Roseville Computer Consulting Firms Roseville Security Consulting Firm
  • Cisco and Microsoft Edmonton-Calgary Networking Firm Biggest Edmonton Canada Small Business IT Consulting
  • Consulting Services for Durham Network Support Firms Durham Consulting for IT Service Firms in Durham - Transparent Temporary Support Team Help
  • Cybersecurity Penetration Testing Cybersecurity Companies Security Penetration Testing IT Services
  • Federal District Brasília Sodinokibi Crypto-Ransomware Settlement Negotiation Guidance Best Brasília Ryuk Ransomware Settlement Guidance Brasília, DF
  • Federal Way, WA Tacoma Nephilim Ransomware System-Rebuild Tacoma Netwalker Ransomware Restoration Federal Way, WA, America
  • Firewall Information systems Security Outsourcing Sioux Falls Security Security Firm Sioux Falls
  • Forefront TMG Firewall Information Technology Consulting Support and Setup Forefront TMG Firewall
  • Gentoo Linux, Sun Solaris, UNIX Consulting Services CentOS Linux, Solaris, UNIX Online Troubleshooting
  • Glendale Nephilim Ransomware System-Restoration Glendale Snatch Ransomware Operational Recovery Garland

  • Hybrid cloud integration Specialists
    Largest MCSE Expert Certified Enterprise hybrid cloud integration Professionals

    Progent can help your IT team to plan and manage cost-effective environments that can include Windows and Linux operating systems and apps in either cloud-based solutions or in hybrid architectures that seamlessly combine physical resources along with one or more public cloud services. To assist you to integrate public cloud services with physical datacenters, Progent can provide a range of cloud integration services that include Azure enterprise hybrid cloud planning and integration consulting, Amazon AWS cloud migration, and Amazon Web Marketing Service development and troubleshooting. Progent has two decades of background delivering high-level consulting support remotely, and Progent can make sure you complete your cloud migration projects quickly and affordably.

  • Grand Rapids, MI Microsoft SQL 2008 Network Support Group Gerald Ford International Airport SQL 2012 Small Office Computer Consulting Services
  • Hillsborough County New Hampshire, United States Help Desk Small Business Computer Consulting Top Rated Outsource Urgent Network

  • MFA and Single Sign-on Consultants
    Urgent MFA and Single Sign-on (SSO) Technical Support

    Progent's Duo service plans incorporate Cisco's Duo technology to protect against stolen passwords by using two-factor authentication. Duo supports one-tap identity confirmation on iOS, Google Android, and other personal devices.

  • Indianapolis Conti Crypto-Ransomware Forensics Investigation Indianapolis Indiana Indianapolis Snatch Crypto-Ransomware Forensics Investigation
  • Las Vegas Nevada Integration Specialist Las Vegas, NV, Henderson, NV, Paradise, NV, Reno, NV Small Business IT Consulting Firms
  • Liverpool Liverpool Telecommuters VoIP Systems Consulting Experts Work at Home Employees Expertise near Liverpool - VoIP Solutions Assistance Birkenhead, United Kingdom
  • Louisville Dharma Crypto-Ransomware Forensics Investigation Louisville, Jefferson County Louisville Ryuk Crypto-Ransomware Reporting Louisville, Jefferson County

  • Windows Server 2012R2 Setup and Support
    Windows Server 2012 R2 Hyper-V Computer Engineer

    Progent's certified professionals can assist you to assess the advantages of Windows Server 2012 R2 for your organization, create pilot systems and migration plans, tune your network infrastructure for local, multi-location, cloud-based, and hybrid environments, educate your IT support staff, develop an enterprise-wide security strategy, automate IT administration, assist with application development, and generate and validate a disaster recovery/business continuity plan.

  • MS Dynamics GP-Great Plains Londrina Solution Provider - Reporting Outsourcing Londrina Microsoft Dynamics GP Londrina Vendor - Installation Support State of Parana
  • Maze Ransomware Hot Line Cabo Frio Cabo Frio, Rio de Janeiro Ransomware Cleanup and Restore
  • Melbourne Work at Home Employees Setup Assistance Melbourne Melbourne Offsite Workforce Infrastructure Consultants Melbourne
  • Consultants CISM Security Management
  • Microsoft SharePoint 2010 Support and Integration Rancho Cordova Microsoft SharePoint Server 2013 Online Technical Support Rancho Cordova
  • Milwaukee Ryuk Crypto-Ransomware Virus System-Restore Case Study General Mitchell Airport Milwaukee MKE Milwaukee Hermes Ransomware Operational-Recovery Milwaukee Racine Waukesha
  • Montgomery County, Alabama Telecommuters Montgomery Consulting Services - Integration Consulting Experts At Home Workers Montgomery Consultants - Setup Consulting Services Montgomery Huntsville
  • Network Consult Raleigh, North Carolina Raleigh, North Carolina Support Specialist
  • North Dakota Network Consult Top Ranked North Dakota Computer Consultancy Group
  • Phoenix Small Business Network Consulting Firms Phoenix-Goodyear Network Specialist
  • Security Consultant CISM Certified Cybersecurity
  • Professional Work at Home IP Voice Remote Troubleshooting At Home Workforce VoIP
  • Rancho Cordova Computer Network Specialist Consultancy Sacramento
  • Redhat Remote Consulting Technical Support Linux Utah
  • Remote Design Consultant Indiana - Indianapolis, IN, Fort Wayne, IN, Gary, IN, Evansville, IN Technical Consultant Indiana
  • Remote Workers Assistance nearby Mission Viejo - Set up Consulting Services Mission Viejo-Laguna Hills, California Offsite Workforce Consulting and Support Services nearby Mission Viejo - Support Expertise Mission Viejo-Lake Forest, CA
  • Remote Workers Consulting Experts nearby Sarasota - VoIP Solutions Consulting Fargo-Fargo, North Dakota At Home Workforce Consulting Experts - Sarasota - IP Voice Systems Consulting Experts Fargo-Cass County, ND
  • Ryuk Online Ransomware Mitigation Experts Adelaide Adelaide Adelaide Maze Crypto-Ransomware System-Restoration
  • Security Security Contractor Albany NY Security Audit Services CISSP Albany New York

  • Exchange 2019 Hybrid Deployment Support Outsourcing
    Exchange 2019 Hybrid Integation Integration

    Progent can help your organization in any facet of your upgrade to Microsoft Exchange 2019 including deploying Windows Server 2019 Core for hosting Exchange; planning high availability (HA) infrastructure for an on-premises, cloud-based or hybrid environment; migrating mailboxes; planning and implementing Hyper-V virtualization; setting up hardware load balancing; setting up DAG groups with MCDB caching; integrating with Skype for Business 2019 for voicemail; integration with SharePoint; preparing firewalls; integration with Microsoft 365; and configuring Outlook clients.

  • Server Consultant Microsoft SQL 2014 Lawrence, Massachusetts SQL 2012 Software Support Lawrence-Essex County, MA

  • Upgrading Solaris to Windows
    Solaris Upgrade

    Progent can assist you to design and execute a smooth migration from a Solaris-based IT system to a network powered by MS Windows and capable of running Microsoft's powerful office productivity products, commercial applications, and developer tools. Progent's Sun Solaris, Windows and Cisco consultants and software development specialists can help you preserve your information and minimize business discontinuity by designing an efficient transition plan that preserves your current investments in Solaris software and technology. UNIX-to-Windows migration support services offered by Progent include evaluation of existing infrastructure, transition planning and validation, Microsoft Exchange migration services, data and application software transition, and server and mass storage migration and economization.

  • St. Louis IT Staff Augmentation Support Services Supplemetary IT Staffing for IT Service Organizations Lambert International Airport STL
  • Symantec Security Team Firewall and VPN Computer Security Specialist
  • São Paulo, Brazil Computer Consultancy Services São Paulo, Brazil Technical Support Firms
  • Tacoma Offsite Workforce Voice/Video Conferencing Solutions Assistance Tacoma Puyallup Auburn WA Tacoma Top Rated At Home Workers Tacoma Consultants - Voice/Video Conferencing Systems Consulting and Support Services
  • The Woodlands BlackBerry BPS Support Consultants BlackBerry Redirector Computer Outsourcing Montgomery County
  • Tukwila Ransomware Lockbit Preparedness Consultation Tukwila-Federal Way, WA Tukwila Crypto-Ransomware Avaddon Preparedness Assessment
  • CISM Cybersecurity Firm
  • Urgent SQL Server 2008 Computer Consulting MS SQL 2008 IT Services
  • Windows Server 2012 Small Office Network Consulting Services Shreveport Bossier City Windows Server 2016 IT Outsourcing Companies Shreveport Louisiana
  • CISM Certified Security Management Consult
  • Windows and Solaris Support Solaris with Windows Consultant Services
  • Winston-Salem Sodinokibi Crypto-Ransomware Business Recovery Greensboro Winston-Salem High Point Winston-Salem Nephilim Ransomware Removal Winston-Salem North Carolina
  • Work At Home Job Microsoft MCSA Engineer Newark, CA Remote Support Job Microsoft MCSA Engineer Fremont, CA

  • Juniper Junos os Firewall Audit
    24 Hour Network Security Audit Juniper Junos BGT

    Progent's Juniper-certified network engineers can help you utilize Junos OS and the Junos platform of network management applications to configure, administer, and monitor Junos-powered devices; migrate to the Junos OS operating system from other Juniper software platforms such as ScreenOS; and upgrade your Juniper routers, switches, and gateways to the latest version of Junos OS.

  • Work from Home Employees Consulting and Support Services near Irving - VoIP Solutions Consultants Irving Remote Workers IP Voice Systems Guidance Irving, TX, United States
  • Yonkers Crypto-Ransomware Reporting Westchester County New York Yonkers Maze Ransomware Forensics Yonkers New York

  • © 2002-2024 Progent Corporation. All rights reserved.