CISM Security Management ConsultingProgent offers the services of security consultants who have earned Certified Information Security Manager (CISM) Certification. CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management and consulting services.

CISM measures expertise in the areas of information security management including information security governance, information risk management, information security program development and management, and information security incident management. CISM certification also requires five years of professional experience in information management.

Information Security Governance:
Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Tasks include:

  • Develop the information security strategy in support of business strategy and direction.
  • Obtain senior management commitment and support for information security throughout the enterprise.
  • Ensure that definitions of roles and responsibilities throughout the enterprise include information security governance activities.
  • Establish reporting and communication channels that support information security governance activities.
  • Establish and maintain information security policies that support business goals and objectives.
  • Ensure the development of procedures and guidelines that support information security policies.
  • Develop business case and enterprise value analysis that support information security program investments.
Risk Management:
Identify and manage information security risks to achieve business objectives. Tasks include:
  • Develop a systematic, analytical and continuous risk management process.
  • Ensure that risk identification, analysis and mitigation activities are integrated into life cycle processes.
  • Apply risk identification and analysis methods.
  • Define strategies and prioritize options to mitigate risk to levels acceptable to the enterprise.
  • Report significant changes in risk to appropriate levels of management on both a periodic and event-driven basis.
Information Security Program Management:
Design, develop and manage an information security program to implement the information security governance framework. Tasks include:
  • Create and maintain plans to implement the information security governance framework.
  • Develop information security baseline.
  • Develop procedures and guidelines to ensure business processes address information security risk.
  • Develop procedures and guidelines for IT infrastructure activities to ensure compliance with information security policies.
  • Integrate information security program requirements into the organization's life cycle activities.
  • Develop methods of meeting information security policy requirements that recognize impact on end users.
  • Promote accountability by business process owners and other stakeholders in managing information security risks.
  • Establish metrics to manage the information security governance framework.
  • Ensure that internal and external resources for information security are identified, appropriated and managed.
Information Security Management:
Oversee and direct information security activities to execute the information security program. Tasks include:
  • Ensure that the rules of use for information systems comply with the enterprise's information security policies.
  • Ensure that the administrative procedures for information systems comply with the enterprise's information security policies.
  • Ensure that services provided by other enterprises, including outsourced providers, are consistent with established information security policies.
  • Use metrics to measure, monitor and report on the effectiveness of information security controls and compliance with information security policies.
  • Ensure that information security is not compromised throughout the change management process.
  • Ensure that vulnerability assessments are performed to evaluate effectiveness of existing controls.
  • Ensure that noncompliance issues and other variances are resolved in a timely manner.
  • Ensure the development and delivery of activities that can influence culture and behavior of staff including information security education and awareness.
Response Management:
Develop and manage a capability to respond to and recover from disruptive and destructive information security events. Tasks include:
  • Develop and implement processes for detecting, identifying and analyzing security related events.
  • Develop response and recovery plans including organizing, training and equipping the teams.
  • Ensure periodic testing of the response and recovery plans where appropriate.
  • Ensure the execution of response and recovery plans as required.
  • Establish procedures for documenting an event as a basis for subsequent action, including forensics when necessary.
  • Manage post-event reviews to identify causes and corrective actions.
Additional Certifications Earned by Progent's Security Consultants
In addition to offering the services of security specialists with CISM security manager credentials, Progent can also provide your business with access to CISSP-certified cybersecurity experts, ISSAP-certified network architecture security consultants, CISA-certified information security audit engineers, GIAC-certified information assurance consultants, and CRISC-certified risk management consultants.

Contact Progent for Access to a CISM-certified Information Security Consultant
If you're trying to find network security support services, call Progent at 800-993-9400 or refer to Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is designed to guide you to complete the urgent first phase in responding to a ransomware assault by putting out the fire. Progent's remote ransomware expert can help businesses to identify and quarantine infected devices and guard undamaged assets from being compromised. If your network has been penetrated by any strain of ransomware, act fast. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For details, visit Progent's Ransomware 24x7 Hot Line.



An index of content::

  • 24 Hour Windows Server 2008 Security Remote Support Consultant Windows Server 2008 DirectAccess
  • 24x7 Private Cloud Solutions Engineers Private Cloud Solutions Consult
  • Anaheim Remote Workforce Support Assistance Anaheim, Orange County After Hours Telecommuters Anaheim Guidance - Integration Assistance
  • CISSP Cybersecurity Team Oakdale, Riverbank CA Security Cybersecurity Tech Services Modesto, CA
  • Computer Remote Engineer Work From Home Job Research Triangle North Carolina Raleigh Wake Forest Garner Cary Emergency Telecommute Job Network Security Engineer
  • Consulting Windows Plano Dallas, United States Windows Server 2016 System Engineers
  • Conti Ransomware Hot Line Alberta Ransomware Hot Line
  • Des Moines Network Architect Immediate Des Moines, Iowa Network Providers
  • Dynamics GP VAR - El Paso - Installation Experts El Paso, TX El Paso Microsoft Dynamics GP (Great Plains) Migration Consultant El Paso County Texas

  • MCSE Expert Certified Design .NET Software
    .NET Linux Design Firm

    Progent's application developers have worked for 20 years with .NET technologies and the Visual Studio development environment and are able to create or enhance .NET applications quickly and affordably.

  • Egregor Ransomware Hot Line Philadelphia Pennsylvania MongoLock Ransomware Hot Line Philadelphia, PA
  • Eugene DopplePaymer Ransomware Settlement Negotiation Consultants 24x7x365 Eugene Ransomware Negotiation Services Eugene Springfield
  • Exchange Server 2000 Upgrade Remote Consulting Microsoft Exchange 2000 Upgrade Consultant
  • Firewall Security Certification Salinas, CA Castroville, CA Consulting Firewall

  • Altaro VM Backup Troubleshooting Technology Consulting Services
    Altaro VM Backup Live Backup Information Technology Consulting

    Altaro VM Backup from Hornetsecurity provides small businesses a dependable and affordable platform for backing up and restoring Microsoft Hyper-V and VMware-based virtual machines. Altaro VM Backup can be deployed in local, offsite, distributed, and cloud-hosted environments and also enables cost-effective backup to Azure storage. Altaro VM Backup defends against ransomware via Immutable Cloud Storage. This produces tamper-proof backup data that cannot be erased or modified by anyone including administrators. Progent is a certified Hornetsecurity/Altaro partner and offers a broad range of remote or on-premises services to assist you to design, install, manage and debug a modern backup/restore solution powered by Altaro VM Backup. With ProSight Data Protection Services Altaro VM Backup, Progent delivers a managed backup/restore service powered by on Altaro VM Backup technology.

  • IT Outsourcing Examples Whitepapers IT Outsourcing and Co-sourcing White Paper
  • Idaho - Boise City, ID, Pocatello, ID, Idaho Falls, ID, Lewiston, ID Setup Service Boise City Idaho Computer Consultancy Firms
  • Immediate Network Consulting Firewall Mississippi, U.S.A. Firewall Protect Jackson, Mississippi

  • Database Development Specialists
    Database Programming Support

    Progent's certified relational database consultants offer small and midsize businesses remote DBA and programming services for leading RDBMS products such as Microsoft SQL Server, Oracle, MySQL, and Microsoft Access. Support services available from Progent include software installation and integration, database architecture and coding, management services, replication and synchronization strategies, storage management, performance tuning, data migration, security and compliance, backup and recovery options, problem solving, and webinar training.

  • Information Technology Consulting Firms Microsoft Exchange Parsippany-Fairfield Exchange 2010 Server Consulting Services Parsippany

  • Cisco and Microsoft Support Desk Sharing Integration Support
    Top Quality Co-managed Service Desk Specialist

    Progent's Microsoft and Cisco authorized experts offer three service programs to help medium-size and large businesses develop an efficient and successful internal Network Support Help Desk Call Center. Progent's help desk consulting services include ROI analysis, process study and improvement, management reporting, training of in-house staff, and documentation of processes. Progent's Software Evaluation and Integration Services help companies sift through the various top level Help Desk application programs on the market and determine which products might be too costly, lack key features, or align badly with your company's business goals. Progent also provides temporary staffing for businesses who need to reinforce their internal Help Desk team for occasional tasks or to fill in for vacationing or indisposed personnel.

  • Integration Consulting BlackBerry BES Akron, Summit County Akron Ohio Networking Consultancy Services BlackBerry BES Server
  • Juniper Junos Configuration Cybersecurity Company Juniper Junos Management Security Firms
  • Lincoln Remote Workers Security Solutions Guidance Lincoln, NE Remote Workforce Lincoln Consulting - Network Security Systems Expertise Lincoln Nebraska

  • Microsoft Windows Server 2019 Network Engineer
    Support Windows Server 2019 USB Drive Witness

    Progent's certified Windows Server 2019 experts can help your organization to design and carry out an efficient migration to Windows Server 2019 using your current system architecture or a cloud-based or hybrid model. Windows Server 2019 offers major improvements in scale, speed, ease of management, virtualization, security and compliance, hybrid local/cloud integration, resilience, and container support.

  • Microsoft Certified Partner Walnut Creek-Concord Help Walnut Creek, California Network Consulting Experts
  • Microsoft SQL Server 2016 Computer Consultancy Company Santiago Best Network Specialists Microsoft SQL 2008 Providencia, Metropolitan Region

  • Integration Support Meraki WiFi 6E AP Migration
    Computer Consultants Meraki MR18 Access Point

    Progent's Cisco-certified Wi-Fi networking experts can provide online and on-premises consulting and support services to help you to design, install, manage, optimize, and repair Wi-Fi networks that incorporate Cisco's Meraki APs. Progent can also help you to plan and implement hybrid networks that combine on-premises and cloud-hosted services and that deliver easy access, advanced security and compliance, streamlined management, and dependable performance for all your wired and wireless endpoints.

  • Modesto Offsite Workforce Management Solutions Assistance Turlock, CA Modesto At Home Workforce Management Systems Consulting and Support Services Modesto California
  • CISM Security Contractors
  • Nagios for Linux Consulting MRTG Network Engineer
  • Panama City Ryuk Ransomware Removal Panamá Panama City MongoLock Crypto-Ransomware File-Recovery
  • Raleigh Remote Workforce Call Desk Augmentation Consulting Experts Raleigh Wake Forest Garner Cary At Home Workers Consultants nearby Raleigh - Call Desk Augmentation Consulting and Support Services Research Triangle North Carolina, USA
  • Remote Grand Rapids At Home Workforce Integration Consulting Experts Work at Home Employees Expertise in Grand Rapids - Connectivity Assistance Glendale California
  • Remote Workforce Consulting Experts nearby Adelaide - Backup/Recovery Solutions Consultants Adelaide Adelaide Remote Workforce Backup/Restore Systems Guidance
  • Ryuk Ransomware Hot Line Dallas County Texas 24/7/365 Ransomware Cleanup and Restore Irving, Dallas County
  • Consulting Services Certified Cybersecurity Management
  • SQL Server 2012 Computer Network Companies Phoenix Microsoft SQL Server 2016 Networking Consultants Phoenix Arizona

  • Onsite Technical Support Colocation
    Data Center Colocation IT Consultants

    Progent's data center support services are designed for companies with equipment housed at Internet Data Centers or data center colocation hosting facilities and in need of on-demand in-person service at the colo facility plus remote help from Microsoft and Cisco Certified professionals. Progent offers a full range of data center and IDC and colo consulting services including network topology evaluation, Windows and Linux server integration and maintenance, tech support for server and communications infrastructure, development and installation of non-stop systems, architecting and implementing layered security structures, firewall integration and troubleshooting, designing load balancing solutions, and creating high-availability server and storage cluster systems.

  • CISM Certified Cybersecurity Management Consultant
  • SQL Server 2014 Network Support Group Manaus Microsoft SQL Server 2016 Integration Specialist Manaus, AM
  • SQL Server 2019 Server Migration Specialists SQL 2014 Server Integrators Napa

  • Microsoft Access development Consultants
    Microsoft Access desktop Developer Firm

    Progent can provide economical remote consulting services for all releases of Microsoft Access including Access desktop and Access Web App and offers expert help for application development, database migration, performance optimization, BI reporting, and maintenance. Progent also can provide custom online training for Office Access development and DBA services.

  • Salt Lake City At Home Workforce Video Conferencing Systems Consulting Salt Lake City Utah Telecommuters Salt Lake City Guidance - Voice/Video Conferencing Systems Guidance Salt Lake City, UT
  • San Francisco Egregor Crypto-Ransomware Forensics San Francisco California San Francisco California San Francisco Ransomware Regulatory Reporting
  • Scottsdale Immediate Scottsdale Crypto-Ransomware Recovery Consultants Scottsdale Crypto-Ransomware Cleanup Help Scottsdale, Maricopa County

  • On-site Technical Support Apple OSX Tiger
    OS X Support

    Progent's consultants offer Apple macOS and OS X users a range of services including desktop support, Apple macOS and OS X consulting, Mac integration with Windows environments, Entourage and Exchange Server expertise, security services, and one-on-one education. Progent can assist clients to upgrade to macOS from Mac OS X or other earlier editions of Mac OS X and Progent can provide help with Apple macOS and Mac OS X application software. Progent can also assist you with iPhone support and Apple iPad management, or migrating to Apple's iCloud services. For computer networks based solely on Apple macOS or OS X or for networks incorporating a mix of Mac, Linux and Windows based servers and workstations, Progent's Apple, Cisco, and Microsoft consultants have the experience and depth to deal with the difficulty of designing, configuring and supporting a network environment that is available, secure, fast and aligned with your company's objectives.

  • Scottsdale Ryuk Ransomware Prevention Scottsdale, AZ, United States Scottsdale Ryuk Crypto-Ransomware Prevention Scottsdale, Maricopa County, United States
  • Security Network Security Auditor Ciudad de México, Venustiano Carranza Security Security Consulting

  • Specialists Sodinokibi ransomware hot line
    ransomware removal and data recovery Specialist

    Progent's Ransomware Hot Line provides 24x7 access to a seasoned ransomware recovery expert who can help your business to halt the progress of an ongoing ransomware attack. Call 800-462-8800

  • Slackware Linux, Solaris, UNIX Troubleshooting Colorado Springs Fort Carson Fedora Linux, Solaris, UNIX Professionals Colorado Springs, CO
  • Snatch Ransomware Hot Line San Diego - La Jolla Ransomware Rebuild San Diego Carlsbad San Marcos
  • St. Paul DopplePaymer Ransomware Forensics Investigation St. Paul-Oakdale St. Paul Ransomware Regulatory Reporting St Paul-Mendota Heights
  • St. Paul Telecommuters VoIP Solutions Consulting and Support Services Saint Paul-Inver Grove Heights Work from Home Employees St. Paul Consulting and Support Services - VoIP Solutions Consulting Services St. Paul-Oakdale, Minnesota
  • System Consulting IT Outsourcing Penetration Testing Networking Consultancy Services
  • Top Computer Support Consultants Cisco CCIE Fairfield CA, United States IT Consulting Microsoft Windows Vacaville, CA
  • Urgent Remote Help Desk Small Business Network Consultant Madison County Alabama Microsoft Exchange Networking Specialist Huntsville, Limestone County

  • 24 Hour Article IT Outsourcing Example
    IT Outsourcing and Co-sourcing Whitepapers

    Progent's IT outsourcing services offer budget-friendly computer consulting for medium-size companies. Whether it involves designing system infrastructure, setting up an in-house Help Desk or outsourcing a one, rolling out a new email platform, monitoring your system, or developing an on-line eCommerce application, outsourcing your network technical services can reduce expenses and minimize risks, allowing IT service budgets to increase in a more linear and controlled manner than is possible by amassing a bulky, knowledgeable internal network support organization. Progent's Outsourcing White Paper and datasheets show how Progent can help you create a secure and highly available system architecture for your critical Windows-based applications such as Windows Server 2008, Exchange Server, and Microsoft SQL Server.

  • Waltham, MA Offsite Workforce Waltham Consulting - Cloud Integration Solutions Expertise Waltham Remote Workers Cloud Integration Solutions Expertise Waltham-Brightone

  • Firewall Audit Juniper NetScreen
    IT Services Juniper Firewalls

    Progent's Juniper-certified NetScreen consultants can help your company to install and optimize NetScreen 5000 series routers, migrate from older NetScreen products to more current Juniper products, and repair network infrastructure problems in Juniper-only or mixed-technology systems.

  • ransomware negotiation Consulting Services Hermes ransomware settlement negotiation Specialists
  • CISM information Systems Audit

  • © 2002-2025 Progent Corporation. All rights reserved.