BYOM: Bring Your Own Meeting — And Definitely Not Your Own Malware

Modern workplaces thrive on flexibility, and BYOM has become standard in meeting rooms. Employees connect personal laptops to shared conferencing systems with ease, but that convenience introduces security gaps often missed by traditional cybersecurity policies.
BYOM: Bring Your Own Meeting — And Definitely Not Your Own Malware
Like

Share this post

Choose a social network to share with.

This is a representation of how your post may appear on social media. The actual post will vary between social networks

Meeting room connectivity is a double-edged sword. 

The convergence of AV and IT has transformed meeting rooms into highly connected collaboration hubs. Smart conferencing bars, BYOM workflows, and cloud-based platforms have removed friction, improved user experience, and made meetings more productive than ever. But that same connectivity also introduces risk. Guest laptops may be compromised, internet-connected devices can become access points for remote attackers, and microphones, cameras, and USB peripherals can be misused to exfiltrate data or enable eavesdropping. Once inside, a single compromised endpoint can move laterally across insufficiently protected networks, turning a convenience-driven design choice into an organization-wide security incident.

WARNING: Uninvited threats have joined your meeting

Modern conferencing equipment is critical for collaboration, but it also creates multiple entry points for security breaches. Attackers can exploit compromised laptop connections, firmware vulnerabilities, and even the physical components of the videobar itself. Residual data can leak between computers when connecting to a conferencing bar. The communication channels between connected devices can be used to extract information. And malicious code can silently hijack cameras or microphones, turning them into surveillance tools. The consequences of these vulnerabilities can range from data theft to completely compromising the network.

What happens when an unauthorized computer enters a secure network

Policy ≠ Security

Traditional cybersecurity policies were built around individual users, personal workstations, and network perimeters, all areas where IT teams can assign clear ownership and enforce accountability. But meeting rooms operate in a fundamentally different way. They're shared spaces where no single person feels responsible for security, and they often span multiple domains with a constantly changing mix of trusted company devices and untrusted guest laptops connecting to the same infrastructure. A policy that works well for managing employee endpoints simply doesn't translate to these environments. The laptop connecting to your videobar could belong to a visiting contractor, a partner organization, or even a potential hacker who walked in during a public event. Unlike a user's workstation, which IT can monitor, patch, and control, meeting room equipment sits in a gray zone where existing policies offer little protection. It's not that organizations lack security awareness; it's that the policies in place weren't designed with these advanced, multi-domain peripheral hacking attacks in mind.

Introducing: Secure-By-Design AV

To protect a meeting room from being compromised, security can’t be an add-on or an afterthought; it must be integrated into the room’s AV architecture. Physically isolating connected devices and enforcing unidirectional data flow can prevent information from leaking onto unsecured networks. When data can travel only in one direction—such as from a computer to a monitor but not back—even compromised devices cannot create a return path for sensitive information to be leaked between networks. The architecture simply won’t allow it.

Moreover, hardware-based security measures can’t be hacked or bypassed through malware. They render even the most sophisticated malicious code useless. If this hardware is built with a secure supply chain, it is protected from outside interference even at the manufacturing level.

A secure multi-domain meeting room

Deliver ProAV with Security in Mind

The convergence of AV and IT isn't just changing how we design meeting spaces; it's redefining the role of AV professionals. More than just being responsible for ensuring clear audio and crisp video, AV professionals are now security stakeholders tasked with keeping threats out of critical collaboration environments. This isn't about piling more work on your plate; it's about recognizing that security considerations are now fundamental to good AV design. The earlier hardware-based security is integrated into the planning process, the more seamless and effective the resulting solutions will be. Retrofitting security into existing systems is costly and complicated; building it in from the start is simply smart design.

This represents a relatively new field of expertise within the AV industry, and it is evolving rapidly. Those who embrace this shift and develop security-conscious design practices will position themselves as essential partners in protecting their organizations. Those who do not risk being sidelined as clients demand solutions that address both collaboration and security. The good news is that the industry is not navigating this shift alone. Best practices are still being defined, lessons are emerging from real-world implementations, and knowledge is increasingly being shared across disciplines.

We’d love to hear your perspective

What security challenges are you encountering in your meeting room designs? What solutions have worked for you?

Let’s continue the conversation and help build a stronger, more secure future for collaborative spaces.

Please sign in or register for FREE

If you are a registered user on AVIXA Xchange, please sign in