Secure Videoconferencing Communications
You have been appointed the deputy chief information security officer at one of the subsidiaries of the media company you work for. As the company continues to expand geographically, the CEO wants to manage travel costs by using real-time low cost commercial video conferencing systems for meetings and collaboration. However, such systems come with security issues.
There have been disturbing reports of malicious actors stealing emails, videos, and sensitive data from other media companies. The company’s chief information officer, or CIO, and chief technology officer, or CTO, say that video conferencing systems will integrate with the current enterprise networks. But they did not assess system options.
They, along with the chief information security officer, or CISO, have asked you to recommend a modernization strategy for the company’s video conferencing while maintaining the security of the sensitive information discussed by the users. Business communications between subject matter experts, engineers, and executive leaders must be protected. Your task is to provide a proposal for a secure video conferencing system.
You need to analyze the features of three videoconferencing systems and provide an overview of each system. After you complete the overview of the systems, you’ll recommend a system which best meets the business functionality and security requirements. You will also prepare a set of high-level executive briefing slides to give the CEO and CIO an overview of your study. Your study and recommendation will be critical to the company’s success.
Cybersecurity professionals are frequently required to assess the security, risk applications, and systems for business communications before they can be added to an organization’s network. CISOs need to assess risks posed to the organization and develop new security measures or adjust current measures to address these risks appropriately. These evaluations involve comparing competing applications or systems against the organization’s baseline to determine the best balance between business needs and the security and risk appetite of the organization.
Videoconferencing and collaboration systems vary in cost, configuration, functionality, use, and collaboration capability. These systems are trusted to facilitate sensitive and proprietary discussions through their use of encrypted communication channels. Yet these systems have vulnerabilities and are prone to threats and attacks ranging from phishing, credential compromise, and even malware insertion. Therefore, analysis of possible threats, attacks, and vulnerabilities inherent in these systems is critical in developing defense and protection strategies for voice and video data at all endpoints and during transit.
In this project, you will present your proposal in the form of a narrated slide deck. Be sure to refer to Guidelines for Presentation on Secure Videoconferencing. Also, you will complete a lab report on secure videoconferencing. There are six steps to the project, and the project as a whole should take about two weeks to complete. Begin with the workplace scenario above and then continue to Step 1.
- Executive briefing: This is a 10- to 15-slide visual narrated presentation for business executives and board members. Limit of 15 minutes of narration/total length.