SlideShare a Scribd company logo
How secure are
Chat & Webconferencing
Tools?
Jan Guldentops (CEO Better Access, Lector at AP Hogeschool)
Marc Vael (CISO ESKO, president of SAI)
Tuesday 23rd of March 2021
Objective of today
Show
how secure
chat tools &
webconferencing tools
really are
How secure are chat and webconf tools
How secure are chat and webconf tools
How secure are chat and webconf tools
There is a hurd of elephants in the room !
The first elephant
the application
• Verify if you have the right & latest application!
• Using applications from a third party, most
providers control or have access to:
• at least meta-data
• most often also the data of the chats & the
webconference itself
• You do not allow such access?
• Careful which provider you choose
• Use end-to-end encrypted solutions but be
aware of the performance impact
• Set up your own chat/webconference platform
and make it secure but be aware of the cost in
manpower to support & maintain
How secure are chat and webconf tools
The second elephant
the data
• Chat & Webconference applications are
used for all sorts of communication,
including sharing business sensitive or
critical information
• You want to be able to
• Look up that communication again
• Reproduce the chat / webconference for
compliance reasons
• Are you sure you can do this?
• Did you read the SLA?
• Do you have a backup / export?
How secure are chat and webconf tools
How secure are chat and webconf tools
The third elephant
the people
• Communication is done by people
• People do stupid things and are much
harder to train then elephants
• Educate all people regularly on using
chats & webconference tools in a
professional manner
• Explain guidelines / rules of conduct
• Use common sense!
How secure are chat and webconf tools
SECURE CHAT TOOLS
How secure are chat and webconf tools
How secure are chat and webconf tools
How secure are chat and webconf tools
How secure are chat and webconf tools
How secure are chat and webconf tools
How secure are chat and webconf tools
How secure are chat and webconf tools
How secure are chat and webconf tools
How secure are chat and webconf tools
How secure are chat and webconf tools
How secure are chat and webconf tools
“you’re on mute”
Most heard phrase worldwide in 2020
3 modus operandi
1. One-to-one chat & videocall
You talk to 1 person
2. #channel, #teams-based discussion
3. Multi-user chat & videocall
Each choice has
different security paradigms!
Every Zoom meeting is based on a 9-digit meeting ID
https://arxiv.org/pdf/2009.03822.pdf
https://blog.zoom.us/a-message-to-our-users/
https://www.tomsguide.com/news/zoom-security-privacy-woes
Webconferencing tools compared
Zoom Teams Jitsi Signal
Feature richness *** ** ** *
Video quality *** ** ** *
Watermarking ***
Authentication *** *** *** *
End-to-end encryption *** *** *** ***
End-to-end crypto multi-user ***
How secure are chat and webconf tools
Advice for using webconference tools
1. Consider first if the information you want to share is best
communicated via webconference tool. Maybe the
information is so sensitive that another tool is better (like
phone call or face to face)
2. Review the Terms & Conditions and the Privacy Policy of the
webconferencing provider. Some may share personal data
with marketing companies.
3. If you are hosting a web conference with external users,
always add a password, disable ‘join before host’, turn-off
annotations and use the waiting room. Do not share meeting
ID for public events.
How secure are chat and webconf tools
How secure are chat and webconf tools
Advice for using webconference tools
4. If you are hosting a web conference with internal users only,
use your internal authentication for accessing the
webconference tool.
5. Turn off any listening devices (like Google Home, Amazon
Alexa, or smart phone apps) near you during your
webconference.
6. Consider whether saving recordings is necessary. If you did
not record conversations or meetings before, should you
record a webconference just because you can? This could
add additional unnecessary privacy risks.
Advice for using webconference tools
7. When organising a webconference, verify the identity of
all participants at the start of the meeting and clearly
define the ground rules and the agenda of the meeting
8. When attending an internal or external webconference,
be aware that you can be recorded by other recording
devices (like smartphone) capturing all voice, video, and
text from the meeting.
9. Sign into external webconferences with your partial
name or a nickname. Avoid personal data sharing.
Advice for using webconference tools
10. Disable your camera & your microphone, unless needed
to participate.
11. Before switching on your camera or sharing your screen,
ensure confidential information is not visible on your
shared screen. Always use a professional background
picture.
12. Consider who is nearby and what information could be
overheard or seen.
Advice for using webconference tools
13. Always verify files which are shared via external
webconferences as they could contain malware.
14.If your profession is governed by a licensing board or
body, check with your governing body for possible
webconferencing guidelines & recommendations.
15. If you have professional liability insurance, check that
your (cyber)insurance also covers webconferencing.
Final tip
How secure are chat and webconf tools
How secure are chat and webconf tools
Zero-knowledge
a method by which one party (the prover) can prove to another party
(the verifier) that a given statement is true, without conveying
any information apart from the fact that the statement is indeed true.
How secure are chat and webconf tools
Contact details
Mr. Marc Vael, CISM, CISSP, CRISC
CISO President
Esko SAI
marc.vael@sai.be
http://www.linkedin.com/in/marcvael
@marcvael
j@ba.be
http://www.linkedin.com/in/janguldentops
@JanGuldentops
Mr. Jan Guldentops
CEO Lector Security
BA AP

More Related Content

PDF
Cloud security lessons learned and audit
PDF
Advantages of privacy by design in IoE
PDF
Top Cybersecurity Trends of 2021
PDF
Iot Security and Privacy at Scale
PDF
The 1st Step to Zero Trust: Asset Management for Cybersecurity
PPTX
BYOD - Mobility - Protection: security partnering with business
PPTX
Practical IoT Security in the Enterprise
PPTX
Cybersecurity in the Era of IoT
Cloud security lessons learned and audit
Advantages of privacy by design in IoE
Top Cybersecurity Trends of 2021
Iot Security and Privacy at Scale
The 1st Step to Zero Trust: Asset Management for Cybersecurity
BYOD - Mobility - Protection: security partnering with business
Practical IoT Security in the Enterprise
Cybersecurity in the Era of IoT

What's hot (20)

PDF
WP-Privacy-IoT-Era - PRODUCTION
PDF
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
PPTX
Building A Cloud-Ready Security Program
PDF
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
PDF
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
PDF
Instituting_Wi-Fi_Policies
PPTX
106 Threat defense and information security development trends
PPTX
Secure Your Mobile Content!
PDF
Cyber Security at CTX15, London
PDF
Privacy by design
PPTX
ION Hangzhou - Keynote: Collaborative Security and an Open Internet
PDF
Cert Overview
PPT
Smarter Cyber Security
PDF
Cyber War, Cyber Peace, Stones and Glass Houses
PDF
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
PDF
Sizing the Cyber Skills Gap
PPTX
The Importance of Consolidating Your Infrastructure Security – by United Secu...
PPTX
Stepping Up conference 2013
PDF
Security Everywhere: A Growth Engine for the Digital Economy
PPTX
Cybersecurity
WP-Privacy-IoT-Era - PRODUCTION
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Building A Cloud-Ready Security Program
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Instituting_Wi-Fi_Policies
106 Threat defense and information security development trends
Secure Your Mobile Content!
Cyber Security at CTX15, London
Privacy by design
ION Hangzhou - Keynote: Collaborative Security and an Open Internet
Cert Overview
Smarter Cyber Security
Cyber War, Cyber Peace, Stones and Glass Houses
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
Sizing the Cyber Skills Gap
The Importance of Consolidating Your Infrastructure Security – by United Secu...
Stepping Up conference 2013
Security Everywhere: A Growth Engine for the Digital Economy
Cybersecurity
Ad

Similar to How secure are chat and webconf tools (20)

PPTX
Online Meeting Platforms Like Zoom and Google Meet.pptx
PPT
Online Conference Complete
PDF
20210112 web conferencing tools
PPTX
The CIO Circle Executive Briefing featuring Zoom and 8x8
PDF
Ntm 2.0 arvola presentation
PDF
Running a Web conference
PDF
Conducting effective online meetings and training
PDF
Unit2 2 online-meetingguide
PPTX
686654210-Grade-6-Ppt-Tle-ict-w4....pptx
PPTX
686654210-Grade-6-Ppt-Tle-ict-w4....pptx
PPTX
1. EPP6.pptxfor grade sixforthemtolearnmore
PPTX
PPT-TLE 6-ICT and Entrepreneurship April 16, 2024.pptx
PPTX
Video_Conferencing_libraryScience.pptx
PPT
Security In Web Conferencing
PDF
Zoom meeting advisery.pdf
PDF
Whitepaper on the uptake of virtual conferences- essentials for success
PDF
Define the technologyggg
PPTX
Webinar inglês
PPTX
Web conferencing.....
PPTX
WEB CONFERENCING
Online Meeting Platforms Like Zoom and Google Meet.pptx
Online Conference Complete
20210112 web conferencing tools
The CIO Circle Executive Briefing featuring Zoom and 8x8
Ntm 2.0 arvola presentation
Running a Web conference
Conducting effective online meetings and training
Unit2 2 online-meetingguide
686654210-Grade-6-Ppt-Tle-ict-w4....pptx
686654210-Grade-6-Ppt-Tle-ict-w4....pptx
1. EPP6.pptxfor grade sixforthemtolearnmore
PPT-TLE 6-ICT and Entrepreneurship April 16, 2024.pptx
Video_Conferencing_libraryScience.pptx
Security In Web Conferencing
Zoom meeting advisery.pdf
Whitepaper on the uptake of virtual conferences- essentials for success
Define the technologyggg
Webinar inglês
Web conferencing.....
WEB CONFERENCING
Ad

More from Marc Vael (20)

PDF
my experience as ciso
PDF
Cybersecurity governance existing frameworks (nov 2015)
PDF
Cybersecurity nexus vision
PDF
ISACA Reporting relevant IT risks to stakeholders
PDF
Value-added it auditing
PDF
ISACA Internet of Things open forum presentation
PDF
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
PDF
The value of big data analytics
PDF
Social media risks and controls
PDF
The view of auditor on cybercrime
PDF
ISACA Mobile Payments Forum presentation
PDF
Belgian Data Protection Commission's new audit programme
PDF
ISACA Cloud Computing Risks
PDF
Information security awareness (sept 2012) bis handout
PPTX
ISACA smart security for smart devices
PPTX
Securing big data (july 2012)
PDF
Valuendo cyberwar and security (jan 2012) handout
PDF
How to handle multilayered IT security today
PPT
ISACA Belgium CERT view 2011
PDF
Valuendo cyberwar and security (okt 2011) handout
my experience as ciso
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity nexus vision
ISACA Reporting relevant IT risks to stakeholders
Value-added it auditing
ISACA Internet of Things open forum presentation
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
The value of big data analytics
Social media risks and controls
The view of auditor on cybercrime
ISACA Mobile Payments Forum presentation
Belgian Data Protection Commission's new audit programme
ISACA Cloud Computing Risks
Information security awareness (sept 2012) bis handout
ISACA smart security for smart devices
Securing big data (july 2012)
Valuendo cyberwar and security (jan 2012) handout
How to handle multilayered IT security today
ISACA Belgium CERT view 2011
Valuendo cyberwar and security (okt 2011) handout

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
cuic standard and advanced reporting.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Electronic commerce courselecture one. Pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Digital-Transformation-Roadmap-for-Companies.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation_ Review paper, used for researhc scholars
Dropbox Q2 2025 Financial Results & Investor Presentation
20250228 LYD VKU AI Blended-Learning.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
MYSQL Presentation for SQL database connectivity
Reach Out and Touch Someone: Haptics and Empathic Computing
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
cuic standard and advanced reporting.pdf
Approach and Philosophy of On baking technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Network Security Unit 5.pdf for BCA BBA.
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Advanced methodologies resolving dimensionality complications for autism neur...
Electronic commerce courselecture one. Pdf
sap open course for s4hana steps from ECC to s4
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

How secure are chat and webconf tools

  • 1. How secure are Chat & Webconferencing Tools? Jan Guldentops (CEO Better Access, Lector at AP Hogeschool) Marc Vael (CISO ESKO, president of SAI) Tuesday 23rd of March 2021
  • 2. Objective of today Show how secure chat tools & webconferencing tools really are
  • 6. There is a hurd of elephants in the room !
  • 7. The first elephant the application • Verify if you have the right & latest application! • Using applications from a third party, most providers control or have access to: • at least meta-data • most often also the data of the chats & the webconference itself • You do not allow such access? • Careful which provider you choose • Use end-to-end encrypted solutions but be aware of the performance impact • Set up your own chat/webconference platform and make it secure but be aware of the cost in manpower to support & maintain
  • 9. The second elephant the data • Chat & Webconference applications are used for all sorts of communication, including sharing business sensitive or critical information • You want to be able to • Look up that communication again • Reproduce the chat / webconference for compliance reasons • Are you sure you can do this? • Did you read the SLA? • Do you have a backup / export?
  • 12. The third elephant the people • Communication is done by people • People do stupid things and are much harder to train then elephants • Educate all people regularly on using chats & webconference tools in a professional manner • Explain guidelines / rules of conduct • Use common sense!
  • 26. “you’re on mute” Most heard phrase worldwide in 2020
  • 27. 3 modus operandi 1. One-to-one chat & videocall You talk to 1 person 2. #channel, #teams-based discussion 3. Multi-user chat & videocall Each choice has different security paradigms!
  • 28. Every Zoom meeting is based on a 9-digit meeting ID
  • 32. Webconferencing tools compared Zoom Teams Jitsi Signal Feature richness *** ** ** * Video quality *** ** ** * Watermarking *** Authentication *** *** *** * End-to-end encryption *** *** *** *** End-to-end crypto multi-user ***
  • 34. Advice for using webconference tools 1. Consider first if the information you want to share is best communicated via webconference tool. Maybe the information is so sensitive that another tool is better (like phone call or face to face) 2. Review the Terms & Conditions and the Privacy Policy of the webconferencing provider. Some may share personal data with marketing companies. 3. If you are hosting a web conference with external users, always add a password, disable ‘join before host’, turn-off annotations and use the waiting room. Do not share meeting ID for public events.
  • 37. Advice for using webconference tools 4. If you are hosting a web conference with internal users only, use your internal authentication for accessing the webconference tool. 5. Turn off any listening devices (like Google Home, Amazon Alexa, or smart phone apps) near you during your webconference. 6. Consider whether saving recordings is necessary. If you did not record conversations or meetings before, should you record a webconference just because you can? This could add additional unnecessary privacy risks.
  • 38. Advice for using webconference tools 7. When organising a webconference, verify the identity of all participants at the start of the meeting and clearly define the ground rules and the agenda of the meeting 8. When attending an internal or external webconference, be aware that you can be recorded by other recording devices (like smartphone) capturing all voice, video, and text from the meeting. 9. Sign into external webconferences with your partial name or a nickname. Avoid personal data sharing.
  • 39. Advice for using webconference tools 10. Disable your camera & your microphone, unless needed to participate. 11. Before switching on your camera or sharing your screen, ensure confidential information is not visible on your shared screen. Always use a professional background picture. 12. Consider who is nearby and what information could be overheard or seen.
  • 40. Advice for using webconference tools 13. Always verify files which are shared via external webconferences as they could contain malware. 14.If your profession is governed by a licensing board or body, check with your governing body for possible webconferencing guidelines & recommendations. 15. If you have professional liability insurance, check that your (cyber)insurance also covers webconferencing.
  • 44. Zero-knowledge a method by which one party (the prover) can prove to another party (the verifier) that a given statement is true, without conveying any information apart from the fact that the statement is indeed true.
  • 46. Contact details Mr. Marc Vael, CISM, CISSP, CRISC CISO President Esko SAI marc.vael@sai.be http://www.linkedin.com/in/marcvael @marcvael j@ba.be http://www.linkedin.com/in/janguldentops @JanGuldentops Mr. Jan Guldentops CEO Lector Security BA AP