Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Leadership and ManagementLogical SecurityCybersecurity News

4 steps to securing video conferencing platforms

By Marc Gilman
video conference
March 10, 2022

During the past eighteen months, a consortium of six data protection and privacy authorities reviewed the security and privacy practices of the major video teleconferencing (VTC) platforms — Cisco, Google, Microsoft and Zoom.

The consortium included cybersecurity representatives from across the globe:

  • Office of the Australian Information Commissioner (Australia)
  • Office of the Privacy Commissioner (Canada)
  • Gibraltar Regulatory Authority (Gibraltar)
  • Office of the Privacy Commissioner for Personal Data (Hong Kong)
  • Federal Data Protection and Information Commissioner (Switzerland)
  • Information Commissioner’s Office (United Kingdom)

These discussions began with an open letter issued in July 2020, continued with direct engagement between the consortium and VTC companies, and culminated in a set of joint observations issued by the international group in October 2021. The observations consist of learnings from the engagement process as well as a set of recommendations around three core issues — encryption, secondary use of data and data centers.

Although the consortium’s guidance pertains to VTC platforms directly, their remarks offer key insights for any organization using VTC tools. Given the importance of these observations, what follows are actionable guidance and best practices for security and privacy teams responsible for managing the deployment and use of video teleconferencing systems.

Privacy by design and default

The use of any new technology tool should be accompanied by a risk assessment to determine potential privacy issues presented by its use and available compensating technical and administrative controls. Risk assessments help organizations mitigate negative impacts by articulating tangible steps to reduce potential risks related to the use of a particular system.

The consortium suggested that the video teleconferencing platforms should complete “privacy impact assessments for all new VTC features” and encourage “regular contact between privacy, security and development teams and adherence to the data minimization principle.”

VTC privacy impact assessments should include detailing the risks related to features like screen sharing, webcams, whiteboards, chat and file transfers as vectors for intentional or inadvertent exposure of sensitive data. Personal identifiable information (PII) like social security numbers, national IDs, email addresses, and health and financial data can be easily displayed during VTC conversations by screen sharing a sensitive document or application, using the webcam to present hard copy documents, or sharing documents through the file transfer feature.

Although dynamic VTC features present risks, those risks are outpaced by the productivity gains that connect users and facilitate rich dialogue and interactions. Recent data from Theta Lake’s 2021 Modern Communications Survey Report paints a picture consistent with these opportunities and challenges, noting that 91% of regulated financial services firms are using two to six VTC platforms — however, 83% of respondents disable key productivity features due to security and compliance concerns. As a compensating control, many organizations are turning to purpose-built platforms to unlock the business value of VTCs and assist with data loss prevention and oversight of VTC interactions to identify privacy, cybersecurity and regulatory issues in conversations.

Given concerns around privacy and security, the consortium recommends “that all VTCs place settings for their service at the most privacy protective by default.” The group observed “examples of this in practice, such as: passwords required by default; virtual waiting rooms by default; privacy protective default settings consistent in browser and app versions of VTC services; and video and microphone off by default.”

Data localization

As new U.S. state and global privacy and data protection rules emerge, concerns about data storage locations have come to the forefront. For various regulatory and operational reasons, organizations are consolidating data footprints into single or a limited set of jurisdictions, particularly when using cloud-based technologies. As a result, video conference data storage locations and data flows have come under scrutiny.

The consortium put forth various recommendations here. First, VTCs and the companies using them should be transparent about where data is stored and confirm that cross-border data flows meet relevant regulatory mandates. For example, ensuring adherence to contractual requirements, like the European Union and U.K.’s Standard Contractual Clauses, or relevant codes of conduct and binding corporate rules for transfers of relevant personal data are fundamental. Additionally, video conferencing platforms and organizations should, where feasible, provide users with options as to where they would like to store their data.

Encryption

The use of encryption can be a powerful tool for securing communications and information transmitted over VTCs. The consortium proposed making end-to-end encryption available in any platform implementation, as well as educating users about the differences between standard and end-to-end encryption.

Security settings and end-user controls

For regulated organizations in industries like financial services, healthcare, education or government, the use of specific video teleconferencing features may pose compliance or security challenges. The group suggested several key practices that the VTC platforms should take to ensure that cybersecurity issues are addressed.

For companies assessing the third-party risks of VTCs and related compliance and security platforms, a robust vendor management program that conducts security testing and validates operational practices through third party auditing and security reporting such as SOC 2, Type 2 or ISO 27001 is essential.

Several end-user meeting controls promote increased privacy and security. The consortium noted, “[t]he joint signatories saw some good examples of such controls in practice, including: ability to opt out of attendance or engagement reports; virtual and blurred backgrounds; user consent prior to host unmuting audio or activating video; and the ability to report a user for inappropriate conduct (or ejection by hosts).”

Supporting technologies can now monitor and supervise these controls by validating in-meeting settings like blurred backgrounds or session passwords, detecting muted audio, and identifying inappropriate behavior, which may be difficult to detect given the breadth video, voice, and chat VTC functions. Security systems can scan across what was spoken, shown and shared during a video conference to detect the presence of inappropriate logos or documents displayed on screen, as well as the use of sensitive cloud-based applications and the exchange of PII.

With video conferencing platforms now firmly embedded as critical business infrastructure, the clarity and detail of guidance offered by the consortium provides a collective baseline standard for VTC platforms themselves and every security leader managing them.

KEYWORDS: cyber security initiatives data loss prevention data management encryption remote work telecommuting video conferencing

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Marc Gilman is General Counsel and VP of Compliance at Theta Lake.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Waller

    5 minutes with George Waller - Best practices when using video conferencing platforms

    See More
  • video conference

    Staying Protected While Connected – Video Conferencing Best Practices for Businesses and Consumers

    See More
  • cyber security network

    Active directory cyber hygiene checklist: 11 steps to securing AD

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!