CISA Certification
CISA Network Security Audit ConsultingThe CISA credential is an internationally recognized qualification that signifies expertise in IS security auditing. Accredited by the American National Standards Institute, the CISA credential requires consultants to undergo a comprehensive examination administered by the ISACA professional group. Progent can provide the services of a CISA-qualified security engineer able to assist companies in the areas of information systems audit process, IT administration, systems and infrastructure lifecycle, IT service delivery, safeguarding information assets, and business continuity preparedness. Progent's security engineers can provide expert services in these areas remotely anywhere in the U.S. or onsite at select cities throughout the country. With affordable rates and world-class expertise, Progent offers small and mid-size businesses the same level of network security and information protection once reserved for only the largest IT organizations.

Progent's CISA-certified security audit experts can help your company enhance information security through a variety of services in key areas covered by Certified Information Systems Auditor qualification program. Progent can help you with any or all of these services:

Information System Audit Process
Progent can provide IS audit services in accordance with IS audit standards, guidelines, and best practices to assist your company in ensuring that your information technology and business systems are protected and controlled. Services available from Progent include:

  • Develop and implement a risk-based IS audit strategy for your company in compliance with IS audit standards, guidelines and best practices.
  • Plan specific audits to ensure that your IT and business systems are protected and controlled.
  • Conduct audits in accordance with IS audit standards, guidelines and best practices to meet your planned audit objectives.
  • Communicate emerging issues, potential risks, and audit results to your key stakeholders.
  • Advise on the implementation of risk management and control practices within your company.
Information Technology Governance
Progent can help ensure that your company has the structure, policies, accountability, mechanisms, and monitoring practices in place to achieve the requirements of business-wide governance of IT.
  • Assess the effectiveness of your IT governance structure to ensure adequate board control over the decisions, directions, and performance of IT so that it supports your company’s strategies and objectives.
  • Review your IT organizational structure and employee management to ensure that they support your company’s strategies and objectives.
  • Evaluate your IT strategy and the process for its development, approval, implementation, and maintenance to ensure that it supports your company’s strategies and objectives.
  • Examine your company’s IT policies, standards, and procedures as well as the processes for their development, approval, implementation, and maintenance to ensure that they support your IT strategy and comply with regulatory and legal requirements.
  • Analyze management practices to ensure compliance with your company’s IT strategy, policies, standards, and procedures.
  • Evaluate IT resource investment, use, and allocation practices to ensure their alignment with your company’s strategies and objectives.
  • Analyze IT contracting strategies and policies and contract management practices to ensure that they support your business strategies and objectives.
  • Evaluate your risk management practices to ensure that your company’s IT related risks are properly managed.
  • Assess monitoring and assurance practices to ensure your executive management team receives sufficient and timely information about IT performance.
Systems and Infrastructure Lifecycle
Progent can help make sure that your management practices for the development/acquisition, testing, implementation, maintenance, and disposal of systems and infrastructure will meet your company’s objectives.

  • Evaluate the business case for proposed system developments/acquisitions to ensure that they meet your company’s business goals.
  • Analyze your project management framework and project governance practices to ensure that your business objectives are achieved in a cost-effective manner while managing risks to your company.
  • Perform reviews to ensure that a project is progressing in accordance with your project plans, is adequately supported by documentation, and is accurately reported in status updates.
  • Review proposed control mechanisms for systems and/or infrastructure during specification, development/acquisition, and testing to ensure that they will provide safeguards and comply with your company’s policies and other requirements.
  • Assess the processes by which your systems and/or infrastructure are developed/acquired and tested to ensure that the deliverables meet your company’s objectives.
  • Evaluate the readiness of your system and/or infrastructure for implementation and migration into production.
  • Perform post-implementation review of systems and/or infrastructure to ensure that they meet your company’s objectives and are subject to effective internal control.
  • Perform periodic reviews of systems and/or infrastructure to ensure that they continue to meet your company’s objectives and are subject to effective internal control.
  • Analyze the process by which your systems and/or infrastructure are maintained to ensure the continued support of your company’s objectives and are subject to effective internal control.
  • Evaluate the process by which your systems and/or infrastructure are disposed of to ensure that they comply with your company’s policies and procedures.
IT Service Delivery and Support
Progent can help provide assurance that your IT service management practices will ensure the delivery of the level of services required to meet your company’s objectives.
  • Review your service level management practices to ensure that the level of service from internal and external service providers is defined and managed.
  • Assess your operations management to ensure that IT support functions effectively meet your business needs.
  • Evaluate your data administration practices to ensure the integrity and optimization of databases.
  • Analyze your use of capacity and performance monitoring tools and techniques to ensure that IT services meet your company’s objectives.
  • Evaluate your change, configuration, and release management practices to ensure that changes made to your company’s production environment are adequately controlled and documented.
  • Examine your problem and incident management practices to ensure that incidents, problems, or errors are recorded, analyzed, and resolved in a timely manner.
  • Evaluate the functionality of your IT infrastructure (e.g., network components, hardware, system software) to ensure that it supports your company’s objectives.
Protection of Information Assets
Progent can make sure that your security architecture (policies, standards, procedures, and controls) preserves the confidentiality, integrity, and availability of information assets.
  • Analyze the design, implementation, and monitoring of logical access controls to ensure the confidentiality, integrity, availability and authorized use of your information assets.
  • Evaluate your network infrastructure security to ensure confidentiality, integrity, availability and authorized use of your network and the information transmitted.
  • Assess the design, implementation, and monitoring of your environmental controls to prevent or minimize loss.
  • Review the design, implementation, and monitoring of your physical access controls to ensure that your information assets are adequately safeguarded.
  • Evaluate the processes and procedures your company uses to store, retrieve, transport, and dispose of confidential information assets.
Business Continuity and Disaster Recovery
Progent can help ensure that in the event of a disruption your business continuity and disaster recovery processes will ensure the timely resumption of your IT services while minimizing the impact on your business.
  • Evaluate the adequacy of your backup and restore provisions to ensure the availability of information required to resume processing.
  • Examine your company’s disaster recovery plan to ensure that it enables the recovery of your IT processing capabilities in the event of a disaster.
  • Assess your company’s business continuity plan to ensure your ability to continue essential business operations during the period of an IT disruption.
Additional Industry Certifications Earned by Progent's Security Engineers
In addition to providing the assistance of security experts with CISA Certified Information Systems Auditor credentials, Progent also offers the expertise of CISM-certified security management consultants, CISSP-certified cybersecurity experts, CISSP-ISSAP-certified security architecture professionals, GIAC-certified information assurance consultants, and CRISC-certified risk management consultants.

For more information about Progent's network security engineering help, telephone Progent at 800-993-9400 or refer to Contact Progent.

© 2002- 2019 Progent Corporation. All rights reserved.

More topics of interest:

An index of content::

Arnold, CA Consultancy Solaris Network Engineer
BlackBerry BES Server Administration BlackBerry Email Software Outsourcing Consultant in Las Vegas Nevada
Boston Computer Network Consultant Cisco Expert Boston, Massachusetts Support Consultants
Burlingame Computer Network Support Group Burlingame Network Design and Configuration Northern California
CISA Certified Auditor Security Consultant in Birmingham, AL Systems Consultant
CISA Certified Computer Security Specialist in San Jose, CA Fedora Linux, Sun Solaris, UNIX Support Services in Inland Empire Riverside
CISA Certified Cybersecurity Audit Consulting Services in San Diego, California Cisco Design Louisiana
CISA Certified Security Audit Consultancy Winston-Salem St. Paul Computer Network Companies
CISA Certified Security Audit Consultants Information Technology Outsourcing Company in Fresno, CA
CISA Certified Security Audit Consulting Services in Norfolk, VA Linux Engineer Arizona
CISA Certified Security Audit Engineers Yonkers, New York Microsoft Certified Spokane Computer Network Consultants
CISA Cybersecurity Audit Consulting CISM Engineer Subcontractor Job
CISA Security Audit Engineer Long Beach, California Migration Consultants
Case Studies for Operations Manager Operations Manager Case Study
Cisco Computer Consulting Group Cisco Network Architect Boston Cambridge
Colocation Consulting Organization Data Center Colo Technical Consultants Philadelphia, PA
Computer Consultancy Group for Denver Colorado Colorado IT Manager
Consultancy Services Company for Microsoft Computer Small Business Network Remote Support Charleston, SC
Denver CISA Cybersecurity Audit Consultants Small Business Computer Consulting Firm
Denver, CO Remote Support Colorado Information Technology Consultant
Engineer Tacoma Cisco Small Office IT Consulting Services in Atlanta, GA, Augusta, GA, Columbus, GA, Savannah, GA
Exchange 2013 Data Loss Prevention Support Exchange 2013 Compliance Integration Support
Exchange Server 2013 Migration Exchange 2010 Server Network Repair Service Dallas
Grand Rapids, MI Computer Network Service Company MCSE Expert Certified Small Business Network Consulting Firms for Grand Rapids, Michigan
Help Desk Support Group Remote Help Desk Recovery Services
IT Consulting for Anchorage Alaska Alaska - Anchorage, AK, Juneau, AK, Fairbanks, AK, Ketchikan, AK Small Business Network Consulting Firm
Jacksonville, Miami, Dade County, Broward County, Florida Networking Firms Jacksonville Florida Small Business Network Consulting Services
Linux Remote Technical Support Sun Solaris Onsite Technical Support Colorado
Maryland Computer Network Support Company Baltimore Maryland Networking Group
Maryland IT Outsourcing Company Maryland Technical Support Companies
Meraki Access Point Online Support Services Network Consultants
Microsoft Computer Networking Specialist Microsoft and Apple Computer Systems Consulting
Microsoft Excel for Mac Classes Mac Office Outlook Learning
Microsoft Exchange Help and Support Exchange 2016 Edge Transport Server Professionals
Microsoft Exchange Network Consulting Service New York Exchange 2016 Computer Network Support Companies
Microsoft MCA Engineer Job Opening Microsoft MCITP Consulting Job in Vacaville, CA
Microsoft SQL 2008 Software Security Consultant Microsoft SQL 2008 Information Technology Outsourcing Fort Worth, TX
Microsoft SQL Server 2012 Consultancy Firm Technical Support for Microsoft SQL 2008
Microsoft SQL Server 2012 Migration Help Designers
Microsoft SQL Server 2012 Tech Outsourcing Microsoft SQL Server 2012 Computer Support Consultant Dallas, TX
Microsoft SharePoint Server Integration Services SharePoint Server 2010 Network Consulting
Napa, CA Security Audit Specialists Cisco Consultancy Services Company in Dallas, TX
Network Consulting Organization for Windows Server 2012 R2 Miami Windows Server 2016 Small Business IT Support Firm
Network Security Consultant for Windows Server 2016 Experts Colorado Springs, CO
Networking Group for Tucson, AZ Microsoft and Cisco Authorized Expert Tucson, AZ Technical Support Firm
Oklahoma City Computer Specialists Cisco Expert Oklahoma City, OK Small Business IT Consulting Companies
On-site Support for Windows Server 2012 Ontario Canada Setup and Support for Microsoft Windows 2008
Online Support Services Online Technical Support for Networking
PCLinuxOS Linux Consultant Consulting Services
Phoenix CISA Certified Auditor Firewall Configure BlackBerry BES Network Security Consulting
Phone Support BlackBerry Exchange Consulting Service in Indianapolis International Airport IND
Private Cloud Virtual Datacenter Hosting Consultant Services Consultant for ProSight Hosting for Virtual Servers
Red Hat Linux, Solaris, UNIX Remote Troubleshooting Global Mandrake Linux, Sun Solaris, UNIX Remote Support in Toledo, OH
Redhat Consulting Services Redhat Computer Consulting
Repairing for Citrus Heights System Consultants in California
SQL 2012 System Consulting Services SQL 2012 Network Specialist Columbus
SQL Server 2014 Migration SQL 2012 Small Office IT Outsourcing
Security Auditor for Firewall Los Angeles, CA, San Diego, CA, Long Beach, CA, Fresno, CA, Santa Ana, CA, Anaheim, CA, Riverside, CA, Bakersfield, CA Technology Consulting for CISSP
Security Information systems Security Outsourcing Security Cybersecurity Organizations in Phoenix - Tempe - Mesa
Security Network Security Auditor Security Security Certification Los Angeles California
Services Jersey City Newport Centre Data Center Upgrading
Specialist St Paul, MN Online Support Services for Microsoft SharePoint
Specialists Technical Support Services for Redhat Linux, Sun Solaris, UNIX
Support and Help for SMS Upgrade Consulting Services for SMS Upgrade
Tacoma, Washington Designer Computer Network Consultant for Tacoma, WA
Technical Support for Red Hat Linux, Sun Solaris, UNIX Debian Linux, Solaris, UNIX IT Consulting
Technical Support for Tampa, Florida Tampa, FL Technicians