CISM Security Management ConsultingProgent offers the services of security consultants who have earned Certified Information Security Manager (CISM) Certification. CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management and consulting services.

CISM measures expertise in the areas of information security management including information security governance, information risk management, information security program development and management, and information security incident management. CISM certification also requires five years of professional experience in information management.

Information Security Governance:
Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Tasks include:

  • Develop the information security strategy in support of business strategy and direction.
  • Obtain senior management commitment and support for information security throughout the enterprise.
  • Ensure that definitions of roles and responsibilities throughout the enterprise include information security governance activities.
  • Establish reporting and communication channels that support information security governance activities.
  • Establish and maintain information security policies that support business goals and objectives.
  • Ensure the development of procedures and guidelines that support information security policies.
  • Develop business case and enterprise value analysis that support information security program investments.
Risk Management:
Identify and manage information security risks to achieve business objectives. Tasks include:
  • Develop a systematic, analytical and continuous risk management process.
  • Ensure that risk identification, analysis and mitigation activities are integrated into life cycle processes.
  • Apply risk identification and analysis methods.
  • Define strategies and prioritize options to mitigate risk to levels acceptable to the enterprise.
  • Report significant changes in risk to appropriate levels of management on both a periodic and event-driven basis.
Information Security Program Management:
Design, develop and manage an information security program to implement the information security governance framework. Tasks include:
  • Create and maintain plans to implement the information security governance framework.
  • Develop information security baseline.
  • Develop procedures and guidelines to ensure business processes address information security risk.
  • Develop procedures and guidelines for IT infrastructure activities to ensure compliance with information security policies.
  • Integrate information security program requirements into the organization's life cycle activities.
  • Develop methods of meeting information security policy requirements that recognize impact on end users.
  • Promote accountability by business process owners and other stakeholders in managing information security risks.
  • Establish metrics to manage the information security governance framework.
  • Ensure that internal and external resources for information security are identified, appropriated and managed.
Information Security Management:
Oversee and direct information security activities to execute the information security program. Tasks include:
  • Ensure that the rules of use for information systems comply with the enterprise's information security policies.
  • Ensure that the administrative procedures for information systems comply with the enterprise's information security policies.
  • Ensure that services provided by other enterprises, including outsourced providers, are consistent with established information security policies.
  • Use metrics to measure, monitor and report on the effectiveness of information security controls and compliance with information security policies.
  • Ensure that information security is not compromised throughout the change management process.
  • Ensure that vulnerability assessments are performed to evaluate effectiveness of existing controls.
  • Ensure that noncompliance issues and other variances are resolved in a timely manner.
  • Ensure the development and delivery of activities that can influence culture and behavior of staff including information security education and awareness.
Response Management:
Develop and manage a capability to respond to and recover from disruptive and destructive information security events. Tasks include:
  • Develop and implement processes for detecting, identifying and analyzing security related events.
  • Develop response and recovery plans including organizing, training and equipping the teams.
  • Ensure periodic testing of the response and recovery plans where appropriate.
  • Ensure the execution of response and recovery plans as required.
  • Establish procedures for documenting an event as a basis for subsequent action, including forensics when necessary.
  • Manage post-event reviews to identify causes and corrective actions.
Additional Certifications Earned by Progent's Security Consultants
In addition to offering the services of security specialists with CISM security manager credentials, Progent can also provide your business with access to CISSP-certified cybersecurity experts, ISSAP-certified network architecture security consultants, CISA-certified information security audit engineers, GIAC-certified information assurance consultants, and CRISC-certified risk management consultants.

Contact Progent for Access to a CISM-certified Information Security Consultant
If you're looking for computer security engineering help, phone Progent at 800-993-9400 or visit Contact Progent.

Ransomware 24x7 Hot Line: Call 800-462-8800
Progent's Ransomware 24x7 Hot Line is designed to guide you to complete the time-critical first phase in mitigating a ransomware attack by containing the malware. Progent's online ransomware engineer can assist you to locate and quarantine infected servers and endpoints and guard clean resources from being compromised. If your system has been breached by any strain of ransomware, act fast. Get immediate help by calling Progent's Ransomware Hot Line at 800-462-8800. For more information, see Progent's Ransomware 24x7 Hot Line.



An index of content::

  • After Hours Fedora Linux, Solaris, UNIX Consultants Midland County TX Technical Consultant Redhat Linux, Sun Solaris, UNIX Midland Odessa
  • Allentown, Lehigh County Allentown Work at Home Employees Endpoint Management Systems Consulting and Support Services Allentown Teleworkers Endpoint Management Solutions Consulting and Support Services Allentown, PA
  • Award Winning Windows 8.1 Training Support Services Urgent Microsoft Certified Partner Windows 8.1 Remote Desktop Network Consultants
  • 24x7x365 Security Management Specialist
  • Baton Rouge Specialists for Computer Support Firms Baton Rouge Louisiana Baton Rouge, Capital Park Consultants for IT Service Firms near Baton Rouge - Temporary Staff Expansion
  • Birmingham Remote Workers Call Desk Outsourcing Consulting Services Birmingham Alabama At Home Workers Consultants - Birmingham - Help Desk Outsourcing Consulting
  • CIO Specialists Part-Time CIO On-site Technical Support
  • CISSP Secure Denver Golden Triangle Firewall Consulting Denver Colorado
  • Cisco Consulting Services Company Maricopa County Arizona Cisco Network Manager Maricopa County Arizona
  • Cisco Network Solutions Eugene 24x7x365 Cisco Consulting Organization Eugene Oregon
  • Cisco VoIP Computer Consultants Cisco Management Small Business IT Outsourcing Group Montreal

  • Anti-Spam Information Technology Consulting
    Antivirus Installation support

    E-Mail Guard from Postini offers constantly upgraded spam and virus filtering, data filtering, and protection from email-based directory harvesting and DSA attacks. Progent is a Postini partner and service specialist. If your business is too small to qualify for a standard Postini license, you can still have access to Postini's Perimeter Manager technology through Progent's E-Mail Guard antispam and antivirus service program. Progent's certified email security professionals can show you how to develop an email defense plan that incorporates spam filtering and virus defense products and processes.

  • Edison Ransomware Readiness Evaluation Edison-Somerset, New Jersey Edison Ransomware Ryuk Vulnerability Review

  • Exchange 2007 Edge Server IT Consulting
    Exchange 2007 Server Technology Professional

    Progent's expert consultants can show you how to define and deploy an efficient in-place Exchange Server 2007 upgrade strategy that minimizes productivity disruption, simplifies long-term support demands, and makes your Microsoft Exchange Server 2007 easy to administer. For complex multi-server or multi-site upgrades, Progent has the background to complete your move rapidly and affordably. Progent's Microsoft Exchange 2007 support, troubleshooting, and consulting services include expertise with the integration of outside vendor add-ons to Microsoft Exchange Server 2007 and the creation of unified messaging implementations based on Exchange 2007 Server.

  • Exchange 2003 Server Design Company Ipanema Top Quality Microsoft Exchange 2016 Online Consulting Ipanema
  • Gilroy Network Design Gilroy Computer Network Specialists
  • Guadalajara Work at Home Employees Backup/Restore Solutions Consultants Guadalajara Mexico 24/7/365 Guadalajara Work from Home Employees Backup/Recovery Systems Guidance Guadalajara, Jalisco, Mexico, U.S.A.

  • ProSight Network Health Evaluation Consulting
    Emergency Network Asset Report Consulting Services

    Progent's ProSight Network Audits offer a fast and affordable way for small and mid-size businesses to get an objective assessment of the health of their information system. Based on some of the top remote monitoring and management (RMM) tools available, and supervised by Progent's certified team of information technology professionals, ProSight Network Audits show you how well the configuration of your core network devices adhere to best practices. Both the Basic and Advanced versions of ProSight Network Audit services are offered at a budget-friendly, one-time cost and deliver immediate benefits such as a more manageable and more secure AD implementation. Both versions also offer the ongoing advantages of advanced remote network monitoring and management technology. These benefits can include easier network management, improved compliance with information security requirements, higher utilization of network resources, quicker troubleshooting, more dependable backup and restore, and increased uptime.

  • Internet Access Services 24-Hour Internet Access Engineer

  • Open Now Consultant Services Hybrid cloud integration
    Google Cloud hybrid integration Programming Company

    Progent can help you to design and manage cost-effective environments that can include Windows and Linux operating systems and applications in either cloud-centric systems or in hybrid network models that utilize local resources as well as one or more cloud services. To help you to incorporate public cloud services with physical datacenters, Progent can provide a variety of cloud integration services that include Microsoft Azure hybrid cloud planning and deployment services, Amazon Web Services (AWS) cloud integration, and Amazon Web Marketing Service (WMS) programming and troubleshooting. Progent has two decades of background delivering high-level consulting expertise online, and Progent can make sure you successfully carry out your cloud migration initiatives quickly and within your budget.

  • Ipanema Ransomware Repair Consultants Urgent Ipanema Ransomware Recovery Support Services Ipanema, Estado do Rio de Janeiro
  • MS Dynamics GP VAR - Cabo Frio - Training Expert Cabo Frio Microsoft Dynamics GP Cabo Frio Gold Partner - Installation Expert Cabo Frio
  • CISM Certified Cybersecurity Management Engineers
  • Microsoft Windows Small Business Server 2008 Services Microsoft Windows Small Business Server 2008 Consulting Services
  • Oxford At Home Workforce Help Desk Solutions Consulting Experts Oxford, South East England At Home Workers Oxford Consulting Services - Help Desk Solutions Expertise Oxfordshire

  • MCSE Telecommute Jobs
    Telecommuting Microsoft Consultant Career Opportunities

    Progent is seeking to hire full-time, results-driven Microsoft certified engineers with MCSE certification; Cisco accredited network engineers who have Cisco CCNP or CCIE certification; security consultants who have CISSP or CISM or comparable security certification; and advanced network architecture experts with a background in mobile solutions, wireless connectivity, service continuity, workplace recovery, information preservation, and VMware. Progent also seeks professionals who can join Progent's team of desktop service specialists and off-site support professionals. In addition, We are looking for talented managers able to perform effectively in Progent's high-growth, virtual office environment.

  • Phoenix IT Staff Augmentation Services Phoenix, Maricopa County Phoenix Short Term IT Staffing Services
  • Remote Workers Los Angeles Assistance - Collaboration Solutions Consultants Woodland Hills Universal City, Los Angeles Top Los Angeles Work from Home Employees Collaboration Technology Expertise
  • Reston Ryuk Ransomware Forensics Analysis Reston-Herndon, VA Reston Conti Crypto-Ransomware Forensics Investigation Reston-Sterling
  • CISM Certified Cybersecurity Cybersecurity Tech Services
  • Roseville Work at Home Employees Network Security Solutions Consulting Teleworkers Roseville Consulting Experts - Endpoint Security Systems Consulting and Support Services Roseville-Placer County
  • San Juan, Puerto Rico Network Documentation San Juan, Puerto Rico Implementation Consulting Companies

  • Aironet 2600 Access Point Computer Engineer
    After Hours Aironet Wave 2 Wi-Fi Access Point Engineer

    Progent's Cisco CCIE-certified Wi-Fi network experts offer remote or on-premises integration and troubleshooting services to help your organization to design, implement, upgrade, optimize, administer and debug Aironet Wi-Fi access point deployments of any size or architecture. Progent's Cisco Wi-Fi controller consultants can also assist you to combine your wireless ecosystem with your wired network infrastructure and cloud-hosted resources to build an enterprise connectivity foundation that is easy to administer and expand. Progent also can provide affordable wireless site surveys to help you to decide the most appropriate selection, placement and configuration of Aironet Wi-Fi APs to work with your unique office layout, building structure, and anticipated workloads.

  • Security Tech Services Firewall North Carolina 24-Hour Security Security Audits North Carolina - Charlotte, NC, Raleigh-Durham, NC, Greensboro, NC, Winston-Salem, NC
  • Sonoma County Server Install 24-Hour Support Company North Bay
  • St. Paul Short Term IT Staffing Support St. Paul Temporary IT Support Staffing Services Expertise St Paul-Bloomington
  • Top Ranked Columbus Avaddon Ransomware Recovery Muscogee County Georgia Columbus Crypto-Ransomware File-Recovery Columbus Fort Benning

  • Windows 11 Installation Support Services
    Windows 11 Installation Support Outsourcing

    Progent's Windows 11 experts offer a variety of services to support Windows 11 such as cloud and hybrid integration, mobile management, telecommuter connectivity, data and identity security, streamlined provisioning, and Call Center services.

  • Windows Server 2012 R2 Support Group Leeds, West Yorkshire After Hours Windows Server 2016 Computer Support Company Leeds, England
  • Consultant CISM
  • Windows Server Essentials Security Specialists Windows Server Essentials Migration Consultancy
  • Work at Home Employees Consulting Services nearby Springfield - Endpoint Security Systems Consulting Experts Springfield Massachusetts Springfield Springfield Remote Workforce Security Solutions Guidance

  • Firewall and VPN Security Auditor
    Symantec Security Auditor

    Progent provides businesses of any size professional support for Intrusion Protection Systems and IPsec VPN products from leading firewall and Virtual Private Network security companies including Palo Alto Networks, Check Point Software, Juniper Networks, Fortinet, and Symantec. Progent can show you how to create a detailed security strategy and select the right products from a variety of suppliers to support your security objectives while sticking within your spending limits.


    © 2002-2024 Progent Corporation. All rights reserved.