CISM Security Management ConsultingProgent offers the services of security consultants who have earned Certified Information Security Manager (CISM) Certification. CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management and consulting services.

CISM measures expertise in the areas of information security management including information security governance, information risk management, information security program development and management, and information security incident management. CISM certification also requires five years of professional experience in information management.

Information Security Governance:
Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Tasks include:

  • Develop the information security strategy in support of business strategy and direction.
  • Obtain senior management commitment and support for information security throughout the enterprise.
  • Ensure that definitions of roles and responsibilities throughout the enterprise include information security governance activities.
  • Establish reporting and communication channels that support information security governance activities.
  • Establish and maintain information security policies that support business goals and objectives.
  • Ensure the development of procedures and guidelines that support information security policies.
  • Develop business case and enterprise value analysis that support information security program investments.
Risk Management:
Identify and manage information security risks to achieve business objectives. Tasks include:
  • Develop a systematic, analytical and continuous risk management process.
  • Ensure that risk identification, analysis and mitigation activities are integrated into life cycle processes.
  • Apply risk identification and analysis methods.
  • Define strategies and prioritize options to mitigate risk to levels acceptable to the enterprise.
  • Report significant changes in risk to appropriate levels of management on both a periodic and event-driven basis.
Information Security Program Management:
Design, develop and manage an information security program to implement the information security governance framework. Tasks include:
  • Create and maintain plans to implement the information security governance framework.
  • Develop information security baseline.
  • Develop procedures and guidelines to ensure business processes address information security risk.
  • Develop procedures and guidelines for IT infrastructure activities to ensure compliance with information security policies.
  • Integrate information security program requirements into the organization's life cycle activities.
  • Develop methods of meeting information security policy requirements that recognize impact on end users.
  • Promote accountability by business process owners and other stakeholders in managing information security risks.
  • Establish metrics to manage the information security governance framework.
  • Ensure that internal and external resources for information security are identified, appropriated and managed.
Information Security Management:
Oversee and direct information security activities to execute the information security program. Tasks include:
  • Ensure that the rules of use for information systems comply with the enterprise's information security policies.
  • Ensure that the administrative procedures for information systems comply with the enterprise's information security policies.
  • Ensure that services provided by other enterprises, including outsourced providers, are consistent with established information security policies.
  • Use metrics to measure, monitor and report on the effectiveness of information security controls and compliance with information security policies.
  • Ensure that information security is not compromised throughout the change management process.
  • Ensure that vulnerability assessments are performed to evaluate effectiveness of existing controls.
  • Ensure that noncompliance issues and other variances are resolved in a timely manner.
  • Ensure the development and delivery of activities that can influence culture and behavior of staff including information security education and awareness.
Response Management:
Develop and manage a capability to respond to and recover from disruptive and destructive information security events. Tasks include:
  • Develop and implement processes for detecting, identifying and analyzing security related events.
  • Develop response and recovery plans including organizing, training and equipping the teams.
  • Ensure periodic testing of the response and recovery plans where appropriate.
  • Ensure the execution of response and recovery plans as required.
  • Establish procedures for documenting an event as a basis for subsequent action, including forensics when necessary.
  • Manage post-event reviews to identify causes and corrective actions.
Additional Certifications Earned by Progent's Security Consultants
In addition to offering the services of security specialists with CISM security manager credentials, Progent can also provide your business with access to CISSP-certified cybersecurity experts, ISSAP-certified network architecture security consultants, CISA-certified information security audit engineers, GIAC-certified information assurance consultants, and CRISC-certified risk management consultants.

Contact Progent for Access to a CISM-certified Information Security Consultant
To learn more about Progent's security expertise, call Progent at 800-993-9400 or refer to Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to help organizations to complete the urgent first steps in mitigating a ransomware assault by putting out the fire. Progent's online ransomware engineer can help you to locate and quarantine infected servers and endpoints and protect undamaged assets from being compromised. If your system has been penetrated by any strain of ransomware, act fast. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For details, visit Progent's Ransomware 24x7 Hot Line.



An index of content::

  • 24-7 Offsite Workforce Consultants near Chattanooga - Endpoint Security Systems Consultants Hamilton County Tennessee Remote Workers Chattanooga Assistance - Network Security Solutions Consultants Chattanooga East Ridge
  • After Hours Skokie WannaCry Ransomware Forensics Skokie-Buffalo Grove, Illinois Skokie DopplePaymer Crypto-Ransomware Forensics Investigation Skokie Illinois, United States
  • Android and Windows 8.1 integration Information Technology Consulting Android VPN Consultant
  • Biggest Juniper Junos J-Web Cybersecurity Team Juniper Junos os Security Companies
  • Biggest Security Contractor Security Akron Ohio CISSP Security Contractors

  • Microsoft Exchange Server Migration Consultant Services
    Exchange 2003 to Exchange 2010 Upgrade Professional

    Progent can provide comprehensive help for every step of your Microsoft Exchange 2010 upgrade with services that include end-to-end project management, site analysis, project design and documentation, specification of all new software and hardware required, recommended sourcing, pilot verification at customer location or at Progent's testing facility, managing transitional coexistence of Exchange Server 2010 and Exchange 2003 or 2007, deployment of the solution, deactivating the old system, and training for client's IT staff and end users.

  • BlackBerry Consulting Firm Durham, NC BlackBerry Desktop Manager Support Team Durham
  • Bridgeport, CT, New Haven, CT, Hartford, CT, Stamford, CT Online Support Bridgeport, CT, New Haven, CT, Hartford, CT, Stamford, CT Upgrading
  • Bristol Conti Crypto-Ransomware System-Restore Bristol, Britain Bristol Locky Ransomware Recovery Bristol
  • Centennial IT Staffing Temps Support Centennial-Littleton Staffing for IT Support Organizations Centennial-Englewood, Colorado

  • 802.11x Wi-Fi Site Survey Information Technology Consulting
    WLAN Site Survey IT Services

    Progent's Wi-Fi site survey services assist you to design, install and debug a Wi-Fi LAN optimized for your environment, providing your business a WLAN that has the coverage, speed, density, data protection, and hand-off ability your business needs.

  • Cisco Design Consultants NYC-Lower Manhattan Help Cisco Manhattan-Tribeca
  • Computer Consultancy Firms Pittsburgh Pittsburgh Professional
  • Computer System Consultant San Ramon San Ramon Small Business Computer Consulting Services
  • CISM Firewall Configure
  • Configuration Microsoft Windows 7 Upgrade Windows 7 Integration Consultants

  • Cisco Engineers Home Based Virtual Office
    Microsoft Consulting Career

    If you are a network engineer with system support experience, teaming with Progent and assisting our clients will enhance your skills via interaction with our staff of mutually supportive, high-output consultants. Progent's concentration on offering network consulting and computer support to small and midsize businesses will offer you the chance to work in depth with business leaders and contribute tangibly to the success of exciting companies. Also, Progent's virtual office network offers state-of-the-art tools for off-site service and wireless connectivity to help you to come up with speedy solutions when you take on mission-critical issues.

  • Debian Linux, Sun Solaris, UNIX Support Services Los Angeles California 24x7x365 Mandrake Linux, Sun Solaris, UNIX Online Support Services Reseda
  • Decatur - Buckhead - Norcross Atlanta Work at Home Employees Endpoint Management Tools Assistance Atlanta Remote Workers Management Tools Consulting Services Fulton County Georgia

  • High Availability Networks Technical Support
    24/7 Fault Tolerant Data Center Online Technical Support

    Progent's high availability system consultants offer non-stop computing consulting, disaster recovery planning, system load balancing, 24x7 interoffice connectivity, 24x7 Internet architecture design, non-stop data center services, and other fault-tolerant networking consulting to help your organization create a non-stop environment for line-of-business applications. Progent has the background to develop affordable, high-availability systems by utilizing the expanding suite of Windows Cluster servers including Microsoft Windows Cluster Server 2003, Microsoft SQL Cluster Server, and Exchange Cluster Server. Progent's Microsoft and Cisco authorized consultants can help you build a fault tolerant mutli-site network with a fully mirrored Internet connection and efficient network load balancing.

  • Duo Zero Trust Cybersecurity Configuration Duo Two-factor Authentication IT Consultants
  • Certified Cybersecurity Management Engineers
  • Fremont-Alameda Computer Network Support Firms Fremont-Milpitas IT Consulting Services
  • Guarulhos WannaCry Crypto-Ransomware Forensics Tatuapé, Guarulhos Guarulhos Maze Ransomware Forensics
  • 24x7 CISM Certified Cybersecurity Management Services
  • Ipanema-Botafogo IT Specialist 24/7 Ipanema-Tijuca Computer Consulting Company
  • CISM Certified Security Management Consulting
  • Joinville Joinville Emergency Crypto Repair Consulting Joinville Emergency Crypto-Ransomware Cleanup Support Services Joinville, State of Santa Catarina
  • Lexington Blue Grass Airport LEX Emergency Teleworkers Assistance nearby Lexington-Fayette - Integration Consulting Experts Lexington-Fayette Remote Workers Integration Consulting Experts Lexington Blue Grass Airport LEX
  • Network Designers Windows Server 2016 Beverly Hills-Bel Air, California Windows Implementation Support Beverly Hills-Westwood, CA
  • SQL 2012 Maintenance SQL 2012 Computer Installation Spartanburg-Greer, South Carolina
  • Salem Ransomware Egregor Readiness Audit Salem, OR Salem Crypto-Ransomware Ryuk Susceptibility Consultation Salem, OR

  • Server Virtualization Technical Support
    Server Consolidation Specialists

    Server growth puts pressure on IT budgets and administrative resources. Server reduction via a virtual infrastructure promises lower TCO of hardware and quicker ROI, more efficient use of physical computers, simplified operations, increased network uptime, and easier management. Typical uses for virtual machines include resource consolidation, economical platforms for line-of-business legacy applications running on outdated operating systems, and inexpensive quarantine of software development or evaluation systems from on-line systems.

  • SharePoint Computer Consulting Companies Illinois, U.S.A. Information Systems Firms SharePoint Illinois
  • Small Office Server Support Stabilizing Phase: Design Tuning Project Methodology Information Technology Outsourcing
  • Snatch Ransomware Hot Line Ransomware Removal and Data Restore
  • Support Outsourcing Services Manchester-Bolton Manchester, U.K. Consultancies

  • After Hours Consulting Services Linux
    Network Architect Firms NetBSD

    Progent's UNIX platform support services provide small businesses and developers help with administering and maintaining UNIX, Linux or Solaris systems that coexist with Microsoft-powered networks. Progent can give your organization access to UNIX experts, consulting professionals certified by Microsoft and Cisco, and security specialists with CISSP certification. This wide array of experience offers you a convenient one-stop consulting firm to help you build and maintain a secure and reliable cross-platform network and communications infrastructure that supports UNIX and Microsoft coexistence by integrating Windows with major versions of UNIX including Apple macOS and OS X, Sun Solaris, IBM AIX, HP-UX (Hewlett Packard UNIX), BSD, SCO UNIX and SGI/Irix or major Linux platforms such as RedHat Linux, SuSE, Debian GNU/Linux and Slackware.

  • Teleworkers Santa Rosa Consulting and Support Services - Connectivity Solutions Consulting Services Healdsburg CA Santa Rosa At Home Workforce Connectivity Solutions Consulting Services Santa Rosa Sonoma County
  • Top Ranked Midtown Manhattan Telecommuters Endpoint Management Systems Expertise NYC-Upper West Side, NY Teleworkers Midtown Manhattan Assistance - Endpoint Management Systems Consulting Experts NYC-Hells Kitchen

  • Small Office Small Business Network Consultant
    Small Business Solution Provider

    Progent is a leading innovator in affordably delivering world-class IT support to small businesses. Progent's success in handling the network support requirements of the historically underserviced small business sector is the cumulative outcome of key technical and operational breakthroughs that have eliminated much of the traditional expenses out of administering IT service, added unprecedented professional expertise into the IT service system, and significantly streamlined the repair cycle.

  • Windows 2008 Server Phone Support Services Long Island City-Flushing, NY Windows Server 2012 Support Specialist Long Island City, Queens NY
  • Windows 2019 Server Consulting Company Novato, Larkspur, U.S.A. Windows Server 2012 R2 Design Firm San Rafael Marin County
  • Windows Server 2012 Small Business Network Consulting Firm Essex County New Jersey Windows Server 2016 Consulting Service Essex County New Jersey

  • Remote Consulting Gentoo Linux
    Gentoo Linux Remote Consulting

    Progent's Linux consulting experts offer small and mid-size businesses and developers support for managing and supporting Linux computers that operate with Microsoft-powered technology. Progent can give your organization access to Linux experts, consulting professionals certified by Microsoft and Cisco, and security experts with CISM credentials. This broad range of expertise provides you with a convenient one-stop source to show you how to build and maintain a secure and robust mixed-platform network and communications environment that allows Linux and Microsoft coexistence by integrating Windows with leading Linux variations such as RedHat, SUSE, CentOS, Ubuntu Linux, PCLinuxOS, fedora Linux, Gentoo, Mandriva Linux, Debian GNU/Linux, and Slackware.

  • CISM Firewall Setup
  • Work at Home Employees Consulting Services - Parsippany - Infrastructure Consulting Experts Parsippany-Pine Brook Teleworkers Parsippany Consulting and Support Services - Infrastructure Consulting Services Parsippany-Fairfield, New Jersey
  • ransomware preparedness Services Consultancy ransomware vulnerability review

  • SQL Server 2016 R Services Specialist
    Microsoft SQL Server 2016 Consulting Services

    SQL Server 2016 offers major improvements in performance, capacity, security, availability, mobile computing support, and built-in business intelligence. New features include PolyBase for processing structured and unstructured files in one appliance for data warehousing, Jason support, Always Encrypted mode, Mobile Reports, and centralized management of on-premises and cloud resources. Progent's Microsoft-certified consulting team can deliver online and onsite expertise to assist businesses of all sizes to implement, manage or troubleshoot any edition of SQL Server 2016. Progent can also assist you to interface SQL Server 2016 with all key Microsoft platforms including Windows Server, Exchange Server 2016, SharePoint Server, Dynamics GP, Lync or Skype for Business, and SCOM.


    © 2002-2026 Progent Corporation. All rights reserved.