CISM Security Management ConsultingProgent offers the services of security consultants who have earned Certified Information Security Manager (CISM) Certification. CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management and consulting services.

CISM measures expertise in the areas of information security management including information security governance, information risk management, information security program development and management, and information security incident management. CISM certification also requires five years of professional experience in information management.

Information Security Governance:
Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Tasks include:

  • Develop the information security strategy in support of business strategy and direction.
  • Obtain senior management commitment and support for information security throughout the enterprise.
  • Ensure that definitions of roles and responsibilities throughout the enterprise include information security governance activities.
  • Establish reporting and communication channels that support information security governance activities.
  • Establish and maintain information security policies that support business goals and objectives.
  • Ensure the development of procedures and guidelines that support information security policies.
  • Develop business case and enterprise value analysis that support information security program investments.

Risk Management:
Identify and manage information security risks to achieve business objectives. Tasks include:

  • Develop a systematic, analytical and continuous risk management process.
  • Ensure that risk identification, analysis and mitigation activities are integrated into life cycle processes.
  • Apply risk identification and analysis methods.
  • Define strategies and prioritize options to mitigate risk to levels acceptable to the enterprise.
  • Report significant changes in risk to appropriate levels of management on both a periodic and event-driven basis.

Information Security Program Management:
Design, develop and manage an information security program to implement the information security governance framework. Tasks include:

  • Create and maintain plans to implement the information security governance framework.
  • Develop information security baseline.
  • Develop procedures and guidelines to ensure business processes address information security risk.
  • Develop procedures and guidelines for IT infrastructure activities to ensure compliance with information security policies.
  • Integrate information security program requirements into the organization’s life cycle activities.
  • Develop methods of meeting information security policy requirements that recognize impact on end users.
  • Promote accountability by business process owners and other stakeholders in managing information security risks.
  • Establish metrics to manage the information security governance framework.
  • Ensure that internal and external resources for information security are identified, appropriated and managed.

Information Security Management:
Oversee and direct information security activities to execute the information security program. Tasks include:

  • Ensure that the rules of use for information systems comply with the enterprise’s information security policies.
  • Ensure that the administrative procedures for information systems comply with the enterprise’s information security policies.
  • Ensure that services provided by other enterprises, including outsourced providers, are consistent with established information security policies.
  • Use metrics to measure, monitor and report on the effectiveness of information security controls and compliance with information security policies.
  • Ensure that information security is not compromised throughout the change management process.
  • Ensure that vulnerability assessments are performed to evaluate effectiveness of existing controls.
  • Ensure that noncompliance issues and other variances are resolved in a timely manner.
  • Ensure the development and delivery of activities that can influence culture and behavior of staff including information security education and awareness.

Response Management:
Develop and manage a capability to respond to and recover from disruptive and destructive information security events. Tasks include:

  • Develop and implement processes for detecting, identifying and analyzing security related events.
  • Develop response and recovery plans including organizing, training and equipping the teams.
  • Ensure periodic testing of the response and recovery plans where appropriate.
  • Ensure the execution of response and recovery plans as required.
  • Establish procedures for documenting an event as a basis for subsequent action, including forensics when necessary.
  • Manage post-event reviews to identify causes and corrective actions.

Additional Certifications Earned by Progent's Security Consultants
In addition to offering the services of security specialists with CISM security manager credentials, Progent can also provide your business with access to CISSP-certified cybersecurity experts, ISSAP-certified network architecture security consultants, CISA-certified information security audit engineers, GIAC-certified information assurance consultants, and CRISC-certified risk management consultants.

If you're trying to find security consulting, phone Progent at 800-993-9400 or refer to Contact Progent.

© 2002- 2019 Progent Corporation. All rights reserved.

More topics of interest:

An index of content::

Altaro VM Backup Verification Integration Support Altaro VM Backup Planning Setup and Support
Anaheim Computer Specialists Best Anaheim Troubleshoot
Aurora, CO Consultant Services Gilroy Integration Company California
Bakersfield Network Design and Consulting Bakersfield, California Tech Consulting
BlackBerry Desktop Manager Integration Consultant IT Consulting Companies for BlackBerry Exchange
BlackBerry Email Computer Support For Small Offices BlackBerry Enterprise Server Migration Consulting in San Jose - Sana Clara
BlackBerry Email Design Firm BlackBerry Professional Software Technician Indianapolis, Marion County
Branch Location Support Outsourcing Branch Location Technical Support Services
CISM Certified Security Management Consultant in SF Bay Area Microsoft and Apple Small Business IT Outsourcing Firms in Orange San Clemente Tustin
CISM Certified Security Management Professional in Virginia Beach, VA Pacifica Manager California
CISM Certified Security Management Services in Newark, CA San Diego, California Information Technology Consulting Firm
CISM Cybersecurity Firms Technical Support Company California
CISM Network Consultant Winston-Salem, NC Battery Park, New York City Configuration
CISM Security Management Consulting Services Microsoft Consulting Telecommuting Jobs Sacramento - North Highlands
CISSP Consultant Security Cybersecurity Contractor Denver, Colorado Springs, Aurora, Fort Collins
CISSP Cybersecurity Organizations Testing Newark
CISSP Security Contractor Security Security Evaluation Adams County Colorado
Certified Cybersecurity Management Professional Dallas Texas Windows Server 2012 Network Architect Firms
Certified Cybersecurity Management Professional Small Business Computer Consulting Firm for Cisco Washington DC
Cisco Computer Network Service Company Arlington, Kennedale, Grand Prairie Cisco Integration Specialists
Cisco Information Technology Outsourcing Companies Outsourcing Services for Cisco Jacksonville, Duval County
Cisco Richmond, Virginia Server Migration Specialists Network Consulting Firm for Richmond, VA
Cisco Security Consulting Services Computer Consultancy Companies in Madison, WI
Cisco Server Troubleshoot Expert Cisco IT Management in Denver International Airport
Cisco Service Providers Local Cisco Network Management Services in Winston-Salem North Carolina
Citrix OpenCloud Access Support and Help desktop and application virtualization Consulting Services
Colorado IT Consultants Support Consultant
Consultant for CISM Certified Cybersecurity Management in Winston-Salem, NC Cisco Installation Chicago, IL
Consultant in Fort Worth, TX Emergency Phone Support Integration Services in Pasadena Texas
Consulting for NetApp N-Series Top NetApp Consult
Database Application Development Engineers Consulting
Denver, Colorado Networking Consultancy Denver Service Providers
Exchange 2007 Installation Small Business Network Consulting Firms for Microsoft Exchange Server 2013
Exchange Server 2013 Outsourcing Company Microsoft Exchange Server 2013 Outsourcing in Chicago, IL
Full-Time Jobs for Home Based Microsoft Consulting Home Based Cisco Consulting Job Opening
Internet Networking Consultants Network Installation for Windows Security
Jacksonville IT Outsourcing Jacksonville, Florida IT Specialists
Los Angeles, California Migrations Los Angeles, California Computer Specialists
Macintosh Virus Protection Specialist Consult
Microsoft Access application programming Consultants Microsoft Office Access Contract Development
Microsoft Forefront TMG 2010 Remote Support Forefront Network Inspection System Integration Services
Microsoft MCP Consulting Part-Time Jobs Job Opportunity
Microsoft MCSA Remote Support Jobs Microsoft MCA Remote Consulting Telecommuter Job
Microsoft SharePoint 2013 Consultant SharePoint 2013 IT Services in Phoenix
Microsoft Support Careers Castroville, CA Microsoft MCDBA Engineer Employment
Microsoft Support Jobs Available Contractor Jobs in Milwaukee, WI
Microsoft Support Organization Urgent Concord Network Design Consultant in Northern California
Microsoft Windows Server 2016 Onsite Computer Services Research Triangle North Carolina Windows Server 2012 R2 Consultancy Services Group
Mississippi Consulting Company Small Business Computer Consulting Firm
National CISM Security Firms Denver, Colorado CISSP Security Organization New Orleans
Network Consultants for Live Communications Server Microsoft LCS Server IM Remote Technical Support
Network Security Auditor for CISSP Independent Security Security Consulting
New Orleans Consultant Services Information Technology Consultant for New Orleans, Louisiana
New York Computer Consultation New York Phone Support Services
Online Support Services for Microsoft SharePoint Server 2007 Microsoft SharePoint Server 2010 Outsourcing in Fresno
Online Troubleshooting for SQL Server 2016 Microsoft SQL Server 2012 Small Business IT Support Firms Akron Ohio
Onsite Support Microsoft Windows 2008 Outsourcing Companies in Georgia
Professionals San Pablo, CA Exchange Server 2007 Computer Support Company
Professionals for Windows Server 2016 Hybrid Microsoft Certified Windows Server 2016 Just In Time PAM Network Engineer
Progent's Management Remote Troubleshooting Progent's Management Software Consulting Firm
Red Hat Linux, Sun Solaris, UNIX Integration Services Redhat Linux, Solaris, UNIX Computer Consultants
Remote Help Desk Networking Firm Emergency Phone Support Software Consulting Provo
Rhode Island Technology Consultancy Firm Providence, RI Guru
San Francisco IT Specialists California Computer Network Service Company for Bay Area
Santa Clara County Network Manager Northern California Cisco and Microsoft Certified Expert Silicon valley Outsourced IT Management Services
Seattle, WA IT Consultant Washington Computer Consulting Group
Security Management Engineers Northern California Open Positions for Microsoft MCSA Consultant Livermore
Security Vulnerability Evaluation Engineer Computer Security Vulnerability Assessment Consultant
SharePoint Computer Engineer South Plains Lubbock Support and Help for Microsoft SharePoint Server
Small Business Network Consulting Firm for Cisco Cisco Planning Software Security Consultant
Small Business Network Outsource Small Office Computer Service
Small Office IT Support for Microsoft Windows 2008 Service Providers
Specialist for Linux Sun Solaris Computer Consultants
Sunnyvale Design Consultants California San Jose Computer Network Companies
System Center 2016 Configuration Manager Online Consulting SCCM 2016 and Exchange 2016 Consultant
Tacoma, Washington Consulting Services Tacoma, Washington Software Recovery
Tech Expert for Windows Server 2012 Windows Server 2016 Technical Support Group in Tulsa Oklahoma
Telecommute Job for ISSAP Consulting CISSP Engineer Virtual Office Job
Telecommute Jobs Computer Consultant Careers
Windows Server 2016 IT Outsourcing Companies Windows 2016 Server Networking Companies Bakersfield, Kern County
Wyoming Technical Support Companies Cisco Expert Computer Services
information Systems Audit for CISM Missouri BlackBerry Enterprise Server IT Solution Providers Cincinnati, Hamilton County