Noord Live.


Zero Trust in Practice:

Why Identity Drives

Next-Gen Access

Available now on-demand

Webinar Presented by

The traditional four walls that protected an organisation’s data no longer exist

The rise of mobile and cloud adoption has led to more people, accessing more resources, and from more locations, than ever before, dissolving the traditional perimeter. In order to enable these mobile and cloud experiences across the modern workforce, without compromising on security, organisations are moving away from the network perimeter-centric view of security and instead focusing on access – and identity – as the new security control point. This shift requires organisations to focus resources on securely enabling access for all of the various users (employees, partners, contractors, etc.) regardless of their location, device, or network.

As a result, organisations can no longer assume trust based on whether or not the user is on the corporate network. Instead of viewing user security as two separate groups – trusted individuals, able to access everything inside an organisation, and untrusted individuals, kept on the outside – organisations now are taking a “Zero Trust” approach that assumes no one is inherently trusted, requiring verification for access.

In this world, where people are the perimeter, identity becomes the foundation of a Zero Trust model. As a model with many moving parts, the immediate question is where to start?

Watch it now.

Webinar Presenter.

Kevin Butler

Kevin Butler

Regional Principal Sales Engineer, Okta

Kevin is a Regional Principal Sales Engineer for the EMEA region, based in the UK. He provides trusted advice and guidance to Okta customers and prospects, bringing to Okta over 15 years of Identity and Access Management experience across many industries and organisations. He has worked in the IT industry for over 25 years, designing and delivering solutions to meet business pains points around information security management. As a qualified CISSP and Solutions Architect, he designs solutions to meet desired business outcomes, especially in Hybrid IT and cloud environments.

As a trusted advisor, Kevin has worked with many organisations in traditional on-premise environments and is now using that experience in hybrid and cloud-based solutions. Assisting many organisations in their migration journey from on-premise to hybrid IT through to cloud-based Identity and Access Management. He is also a specialist in Okta Access Gateway.

Outside of work, besides being a family man, Kevin has interests in walking, sailing, photography and anything involving technology.

Why Watch.

Why you should register:

  • Learn the full Zero Trust reference architecture and the steps to get there
  • Find out why Identity is the foundational layer to build contextual access controls from
  • Discover why the Zero Trust model is the way forward with its ‘never trust, always verify’ principle

Solution Partner.

Okta is the leader in identity and access management, enabling an organisation to centralise identity and access control, ensure strong authentication across all services, everywhere, reduce attack surface, gain visibility and control over API resources, and support rapid response to credential compromise through key integrations. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With over 6,500 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely use the best technologies for their business. Over 7,950 organizations trust Okta to help protect the identities of their workforces and customers.


“Solid event to share experiences with peers. Reconfirming & reassuring.”

Global Head of Analytics, Shell