Step 1: Develop Functional Requirements for
Videoconferencing
The first step in your proposal for a secure
videoconferencing system is to develop a set of functional requirements for
videoconferencing that you believe the media company will need based on its
geographic dispersion and business needs.
In developing those requirements, research three
videoconferencing solutions such as Skype, GotoMeeting, Polycom, and Cisco
Webex and explain their capabilities, advantages, and disadvantages. Identify
costs as well as implementation and support requirements.
The functional requirements and the three possible solutions
will be a section of your Proposal for Secure Videoconferencing. In the next
step, you will review the challenges of implementing those solutions.
Step 2: Discuss Implementation Challenges
In the previous step, you outlined the requirements for
secure videoconferencing for the company and outlined three potential
solutions. Part of your final proposal should also include the advantages and
disadvantages of the implementation options for the three systems you selected.
This section of the proposal also must include the changes the media company
will need to make to implement the systems.
Additionally, explain how system administration or
privileged identity management will operate with these systems. You will also
need to examine how data exfiltration will occur with each of the new systems.
The changes to the systems and challenges for the
implementation of these potential solutions will be an important section of
your Proposal for Secure Videoconferencing. In the next step, you will take a
closer look at the track records of each of the potential videoconferencing
vendors.
Step 3: Identify Vendor Risks
You’ve finished outlining the pros and cons of three
videoconferencing systems. Now, it’s time to take a close look at how they
serve their clients. This will take some research. Look at the systems’ known
vulnerabilities and exploits. Examine and explain the past history of each
vendor with normal notification timelines, release of patches, or work-arounds
(solutions within the system without using a patch). Your goal is to know the
timeliness of response with each company in helping customers stay secure.
This step will be a section of your Proposal for Secure
Videoconferencing.
In the next step, you will outline best practices for secure
videoconferencing that will be part of your overall proposal to management.
Step 4: Develop Best Practices for Secure Videoconferencing
The last few steps have been devoted to analyzing potential
videoconferencing solutions. But obtaining a trusted vendor is just part of the
security efforts. Another important step is to ensure that users and system
administrators conduct the company’s videoconferencing in a secure manner. In
this step, outline security best practices for videoconferencing that you would
like users and systems administrators to follow. Discuss how these best
practices will improve security and minimize risks of data exfiltration as well
as snooping.
This “best practices” section will be part of the
overall Proposal for Secure Videoconferencing.
