Management Matters Management MattersManagement Matters
Practical advice for federal leaders on managing people, processes and projects.

Teleconference Technique


Travel costs time and money, and “conference” has practically become a four-letter word in the wake of the General Services Administration scandal. Hosting a videoconference from your desktop can be a cost-effective alternative, but managing one has its pitfalls.

Collaborative tools, such as webcams and file-sharing software, are critical to videoconferencing. But according to a recent survey for cloud-based services firm Citrix Online, technology is far from the only requirement. Consultants at the Web seminar consulting firm 1080 Group, which conducted the survey, have put together a list of effective video-conference techniques.
Eliminate distractions 
Be aware of open windows, art and other visual distractions in the camera’s line of sight and quiet potentially noisy disruptions like a ringing phone, buzzing BlackBerry and emails pinging on computer speakers. These distractions can throw you off midconference and annoy attendees. Consider the lighting of your environment, avoiding a harsh glare that can cast shadows or wash out your face. 
Set up your space
Position yourself a comfortable distance from the camera so facial expressions and hand gestures don’t seem exaggerated, but sit close enough to reach your keyboard without straining. Think about how you will move during the presentation and adjust your body language for the camera. The closer you are, for example, the larger facial and other features will appear—for better or for worse. Focus on making deliberate, smooth movements and framing them on screen. Enlist a friend or colleague to help you identify distracting behaviors like tapping or fidgeting. This confidant can flag those habits before the conference and send you an instant message during the conference if you lapse into a distracting pattern.
Focus on eye contact
While eye contact in a videoconference doesn’t have to be constant, it should be natural and purposeful. Stay present, keep your eyes within camera range and look toward the screen rather than out the window. 
Incorporate tools of engagement
Consider how you would display information on a projector, ask for a show of hands or conduct a collaborative exercise when leading an in-person meeting. Map out online activities that enable the same kind of productivity. You can share your computer desktop with the audience, conduct an online poll or set up group chats among the participants. Be aware of what attendees can see at various points during the conference, and make sure you reference only things they have access to. Before the meeting send them instructions to ensure they have full access, but reminders and guidance on what to do throughout the conference also are helpful. 
Consider mixed audiences 
If some participants are in the room, others are online and the rest call in via phone, be aware in your planning how each group will see, hear and interact. You may have to use a variety of tactics to ensure everyone is able to join in.
Last but not least, don’t forget old school presentation techniques. Even if you are the only one in the room you are still leading a group in collaborative activities. Speak slowly, clearly and engagingly, using all the traditional public speaking tools in your belt. At the end of the day, what makes someone an effective conference leader can transcend time and space. 
Elizabeth Newell covered management, human resources and contracting at Government Executive for three years.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.