CISM Security Management ConsultingProgent offers the services of security consultants who have earned Certified Information Security Manager (CISM) Certification. CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management and consulting services.

CISM measures expertise in the areas of information security management including information security governance, information risk management, information security program development and management, and information security incident management. CISM certification also requires five years of professional experience in information management.

Information Security Governance:
Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Tasks include:

  • Develop the information security strategy in support of business strategy and direction.
  • Obtain senior management commitment and support for information security throughout the enterprise.
  • Ensure that definitions of roles and responsibilities throughout the enterprise include information security governance activities.
  • Establish reporting and communication channels that support information security governance activities.
  • Establish and maintain information security policies that support business goals and objectives.
  • Ensure the development of procedures and guidelines that support information security policies.
  • Develop business case and enterprise value analysis that support information security program investments.
Risk Management:
Identify and manage information security risks to achieve business objectives. Tasks include:
  • Develop a systematic, analytical and continuous risk management process.
  • Ensure that risk identification, analysis and mitigation activities are integrated into life cycle processes.
  • Apply risk identification and analysis methods.
  • Define strategies and prioritize options to mitigate risk to levels acceptable to the enterprise.
  • Report significant changes in risk to appropriate levels of management on both a periodic and event-driven basis.
Information Security Program Management:
Design, develop and manage an information security program to implement the information security governance framework. Tasks include:
  • Create and maintain plans to implement the information security governance framework.
  • Develop information security baseline.
  • Develop procedures and guidelines to ensure business processes address information security risk.
  • Develop procedures and guidelines for IT infrastructure activities to ensure compliance with information security policies.
  • Integrate information security program requirements into the organization's life cycle activities.
  • Develop methods of meeting information security policy requirements that recognize impact on end users.
  • Promote accountability by business process owners and other stakeholders in managing information security risks.
  • Establish metrics to manage the information security governance framework.
  • Ensure that internal and external resources for information security are identified, appropriated and managed.
Information Security Management:
Oversee and direct information security activities to execute the information security program. Tasks include:
  • Ensure that the rules of use for information systems comply with the enterprise's information security policies.
  • Ensure that the administrative procedures for information systems comply with the enterprise's information security policies.
  • Ensure that services provided by other enterprises, including outsourced providers, are consistent with established information security policies.
  • Use metrics to measure, monitor and report on the effectiveness of information security controls and compliance with information security policies.
  • Ensure that information security is not compromised throughout the change management process.
  • Ensure that vulnerability assessments are performed to evaluate effectiveness of existing controls.
  • Ensure that noncompliance issues and other variances are resolved in a timely manner.
  • Ensure the development and delivery of activities that can influence culture and behavior of staff including information security education and awareness.
Response Management:
Develop and manage a capability to respond to and recover from disruptive and destructive information security events. Tasks include:
  • Develop and implement processes for detecting, identifying and analyzing security related events.
  • Develop response and recovery plans including organizing, training and equipping the teams.
  • Ensure periodic testing of the response and recovery plans where appropriate.
  • Ensure the execution of response and recovery plans as required.
  • Establish procedures for documenting an event as a basis for subsequent action, including forensics when necessary.
  • Manage post-event reviews to identify causes and corrective actions.
Additional Certifications Earned by Progent's Security Consultants
In addition to offering the services of security specialists with CISM security manager credentials, Progent can also provide your business with access to CISSP-certified cybersecurity experts, ISSAP-certified network architecture security consultants, CISA-certified information security audit engineers, GIAC-certified information assurance consultants, and CRISC-certified risk management consultants.

Contact Progent for Access to a CISM-certified Information Security Consultant
For more information about Progent's security engineering help, call Progent at 800-993-9400 or visit Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is intended to guide you to take the time-critical first step in mitigating a ransomware attack by putting out the fire. Progent's online ransomware expert can help you to locate and isolate breached servers and endpoints and protect clean resources from being compromised. If your system has been penetrated by any version of ransomware, act fast. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For more information, see Progent's Ransomware 24x7 Hot Line.



An index of content::

  • .NET iOS Developer .NET Framework Contract Development

  • Part-Time Jobs Recruit Home Based Network Consultant
    Home Based Virtual Office Home Based Network Engineer

    Progent is convinced that a carefully designed and implemented network is a pivotal piece for enabling a company's growth, and we apply this credo in our own network infrastructure. Progent has created a non-stop virtual office infrastructure that enables Progent's in-house consultants and certified contractors to deliver rapid and efficient service, collaborate closely on challenging jobs, and gain from career and personal maturity by being part of a dynamic business ethos of self motivation and freedom.

  • 24 Hour Microsoft MCTS Consultant Job Opportunities Jobs Available Microsoft Consulting Monterey California

  • SCCM 2016 Reporting Technical Support Services
    SCCM 2016 Migration Remote Support Services

    Configuration Manager 2016 automates software deployment and updating, simplifies compliance settings management, keeps track of network resources, protects against company data leakage, performs network health reporting, enables secure self service, and offers a single point of control for administering multi-OS networks based on on-prem, cloud, or hybrid deployment topologies. Progent's Microsoft-certified Configuration Manager 2016 consultants and Azure cloud specialists can assist your organization with any aspect of designing, installing, operating and repairing a System Center 2016 Configuration Manager solution for on-premises, cloud-based, or hybrid environments.

  • 24x7 At Home Workforce Madison Consulting - Backup/Recovery Solutions Assistance Madison, Dane County Teleworkers Consulting and Support Services - Madison - Backup/Restore Systems Consulting Experts Madison Wisconsin, US
  • 24x7 IT Staff Augmentation for Network Support Groups Alpharetta Alpharetta IT Staff Temps Support Alpharetta-Cumming, GA
  • 24x7 Slackware Linux, Solaris, UNIX Online Troubleshooting Colorado Springs Fort Carson Ubuntu Linux, Solaris, UNIX Professional Colorado Springs, CO
  • Cambridge Open Now CISSP Firewall Support Security Information systems Security Outsourcing
  • Cisco Small Business IT Consultant Computer Consultancy Company Cisco Waltham
  • Dallas Staffing Help Dallas Fort Worth Short Term IT Staffing for Network Support Groups Dallas
  • Dayton Remote Workers Cloud Integration Solutions Consulting Services Dayton Huber Heights Kettering Top Ranked At Home Workforce Consulting near Dayton - Cloud Technology Consulting and Support Services Woodland County Ohio
  • Specialist Certified Cybersecurity Management
  • Dynamics NAV MRP Development Firm Integration Support Dynamics NAV

  • Comprehensive Event Management Integration
    24/7/365 System Center MOM Engineer

    Small to mid-sized companies can now enjoy all the advantages of Operations Manager and also have quick access to Progent's Microsoft and Cisco certified network support professionals. With Progent's affordably priced network support packages, mid-size organizations can select a basic co-sourcing service program based on Microsoft Operations Manager 2007 with server monitoring, reporting, Help Desk and online troubleshooting or a comprehensive round-the-clock outsourcing package. Progent supports System Center Operations Manager 2007 to offer small business networks world-class availability, security and productivity.

  • Emergency Hayward Ransomware Cleanup Hayward Biggest Hayward Urgent Crypto-Ransomware Repair Consultants Hayward, CA
  • Engineer Progent in the News Progent in the News Professional
  • Exchange 2003 Server Assessment Reston Top Rated Business Computer Server Companies Microsoft Exchange 2010 Reston-Sterling, VA, United States
  • Exchange Server 2016 Small Business Computer Consulting Firms Palo Alto Exchange Server 2019 Phone Support Palo Alto
  • Guadalajara Small Office IT Support Guadalajara-Zapopan Information Technology Consulting Firms

  • Microsoft Expert SharePoint 2019 Modern Search Information Technology Consulting
    SharePoint 2019 On Prem IT Services

    Progent's certified SharePoint 2019 and SharePoint Online consultants can provide affordable remote and on-premises expertise, software development, and troubleshooting services for organizations of all sizes who intend to upgrade to SharePoint 2019 or SharePoint Online from legacy releases of SharePoint. Progent can help you plan and execute a cost-effective upgrade to SharePoint 2019 on prem, SharePoint Online, or a hybrid network model that combines onsite and cloud-based components into a cohesive information management system.

  • Louisville International Airport SDF CISSP Security Services Firewall Security Firm

  • Online Cisco Certified CCIE Network Support Companies
    Computer Network Providers Cisco Certified CCIE

    Progent offers fast remote access to Cisco-certified CCIE network infrastructure consultants. Progent's CCIE consultants can link to your environment via powerful remote support utilities to provide fast and affordable analysis and repair of urgent network infrastructure problems.

  • Manchester Windows Server 2016 IT Consultants Manchester Computer Service Providers Windows Server 2012

  • Spora ransomware recovery Consulting
    WannaCry ransomware recovery Consultant

    Progent's experienced ransomware recovery consultants can help your business to restore an IT network victimized by a ransomware virus like Ryuk, WannaCry, NotPetya, or Locky.

  • Memphis, Shelby County, United States Supplemental Staffing Services Consulting Memphis IT Staffing Temps Support Memphis Bartlett Germantown Collierville
  • Meraki MR55 Access Point Remote Support Services Technology Consulting Services Meraki Outdoor Wi-Fi Access Point

  • Exchange Server 2010 Migration Specialists
    Consultants Exchange Upgrade

    Progent can provide expert support for each phase of your Microsoft Exchange 2010 migration with services that include outsourced or co-sourced project management services, site analysis, project planning, cost estimates of all new software and hardware required, recommended sourcing, pilot testing at customer location or at Progent's test lab, setting up temporary coexistence between Exchange 2010 and Exchange 2003 or 2007, deployment of the solution, deactivating the old servers, and webinar training for customer's IT group and end users.

  • Microsoft Certified Stockton Computer Support Company Installer Stockton
  • Microsoft Computer Technical Support Outsource Urgent Network Server Setup
  • Microsoft Dynamics GP (Great Plains) Premier Partner nearby Monterrey - SQL Server Development Monterrey, N. L. Microsoft Dynamics GP (Great Plains) Supplier - Monterrey - Installation Expert Nuevo Leon
  • Microsoft SQL Server 2016 IT Service Providers Des Moines, IA 24-7 On-site IT Support Microsoft SQL 2014
  • Microsoft SharePoint Server 2013 Engineer Mesa, Maricopa County Microsoft SharePoint Professional Mesa, Maricopa County

  • Urgent Integration Support Cisco IP phones
    VoIP Phone System Remote Support Services

    Progent's Cisco certified networking consultants can provide high-level support for Cisco Unified Communications Manager (CUCM) (previously CallManager). Progent can assist you to integrate VoIP phones, design dial plans, set up SIP trunking and PSTN connections, deploy Cisco ISR G2 routers with CUBE support, and deploy UCS server high availability solutions.

  • Morgan Hill, CA Morgan Hill Telecommuters Management Solutions Consulting and Support Services Morgan Hill Work at Home Employees Endpoint Management Solutions Consulting Services Morgan Hill
  • Consultant CISM
  • New Haven Connecticut New Haven Telecommuters Network Security Systems Guidance New Haven, CT 24-7 New Haven Telecommuters Security Solutions Expertise
  • Ontario-Pomona Outsourcing Company CISSP Certified Expert Ontario, CA IT Support

  • Remote Consulting Barracuda Backup Local
    24x7x365 Barracuda Backup Integration Support

    Barracuda Backup is an affordable, subscription-based backup and disaster recovery platform for small and mid-size organizations. A Barracuda Backup solution can include a custom-designed hardware appliance built by Barracuda or a software-based appliance with similar features but which utilizes your own storage hardware. Barracuda Backup protects critical business data generated locally, at one or multiple remote locations, or in the cloud. For disaster preparedness, you can replicate data to the Barracuda Cloud, to Amazon AWS, or to any site with a Barracuda appliance. Progent is a certified Barracuda partner and Progent's Barracuda Backup consultants can provide a broad range of consulting services to assist your business to design, integrate, manage and repair a backup and disaster recovery system based on Barracuda Backup.

  • Parsippany Work from Home Employees Voice/Video Conferencing Systems Consultants Remote Workforce Parsippany Consulting Services - Video Conferencing Solutions Expertise Parsippany-Troy Hills, New Jersey
  • Philadelphia NotPetya Ransomware Negotiation Services 24-7 Philadelphia Ryuk Crypto-Ransomware Negotiation Consultants
  • Remote Integration SCCM Application Management SCCM Asset Inventory Technical Consultant
  • Top CISM Security Evaluation
  • Remote Support Hornetsecurity Altaro VM Backup Restore Computer Consulting Altaro VM Backup Encryption
  • Salt Lake City Maze Ransomware Settlement Negotiation Consulting Salt Lake City Ryuk Ransomware Negotiation Guidancen

  • Online Support Hyper-V 2016 Shielded VMs
    Windows Server Hyper-V 2016 Failover Clusters IT Services

    Windows Hyper-V 2016 utilizes key technologies first designed for and proven on Microsoft Azure, among the world's largest public clouds. This dramatically enhances the suitability of the Windows Server platform to run private cloud and hybrid cloud/on-premises environments by improving security, uptime, expandability, manageability, dependability and recoverability. Progent's Microsoft-certified consulting team can assist you to assess the advantages of Hyper-V 2016 for your business, set up test environments to confirm the ability of Hyper-V 2016 to run your vital applications, design a cost-effective network architecture for a cloud-centric or hybrid installation, develop and execute a smooth upgrade plan, train your IT management and support staff, and provide ongoing consulting and troubleshooting support to ensure that your Hyper-V 2016 investment delivers the highest possible business benefit.

  • San Francisco Teleworkers Management Systems Consultants San Francisco Airport SFO San Francisco Bay Area Remote Workforce San Francisco Consulting - Management Solutions Expertise
  • Shreveport Remote Workers Shreveport Consulting Experts - Cloud Integration Systems Assistance Offsite Workforce Consulting Experts - Shreveport - Cloud Technology Guidance Shreveport Barksdale Air Force Base
  • Spartanburg Ransomware Mitigation Spartanburg-Roebuck, South Carolina Spartanburg Spora Ransomware Remediation Spartanburg-Duncan, South Carolina
  • Windows 7 64-bit Upgrade IT Consulting Firm Microsoft Windows 7 Upgrade Support Consultants
  • Windows and UNIX Professionals Top Rated UNIX with Windows Computer Consultants
  • Work from Home Employees Louisville Assistance - Collaboration Systems Expertise Louisville Kentucky At Home Workforce Louisville Consulting and Support Services - Collaboration Systems Consultants Louisville, Jefferson County, United States
  • Zapopan Information Technology Consulting Firms Cisco Cisco IT Outsourcing Firm
  • Security Management Consultant

  • © 2002-2025 Progent Corporation. All rights reserved.