Why Trust is a Vulnerability: The Rise of Zero Trust Security
Videos|by Kieran Hollingsworth|10 October 2025
Still relying on traditional network security? It's time to rethink.
Dive into the core principles and benefits of Zero Trust. Join us for this webinar where our Microsoft 365 specialist, Olaitan Almaroof, explores the Zero Trust security model.
Discover the practical steps you can take to implement it in your business and providing an overview of how it will enhance your security posture against a backdrop of ever-evolving threats.
Never trust, always verify - Ready to explore the future of cyber security? Watch on-demand.
Want to know what you can expect?
- Understand the risks of traditional security – traditional methods are no longer secure with the introduction of remote work, BYOD policies and cloud apps.
- See how the world’s changed – from cloud services and mobile business apps to the rising number of devices connected to the internet, vulnerabilities are everywhere.
- Unlock a Zero Trust approach – See Zero Trust in action and find out how it can help you to become more productive and flexible.
Is this webinar for you?
You’ll find it insightful if you’re an IT leader, security professional or business decision maker looking to modernise your security strategy and stay ahead of cyber threats without compromising on remote and hybrid work.
Don’t miss out on your chance to get actionable insights and guidance on implementing Zero Trust in your organisation. Watch the recording.
About our speaker:
Olaitan Almaroof is our Microsoft Solution Specialist, with almost 10 years’ experience working in Microsoft and cyber security solutions. He shares his knowledge and expertise to help you to implement a Zero Trust approach in your business.
Contact Grey Matter
If you have any questions or want some extra information, complete the form below and one of the team will be in touch ASAP. If you have a specific use case, please let us know and we'll help you find the right solution faster.
By submitting this form you are agreeing to our Privacy Policy and Website Terms of Use.
Related News
Native performance – why it still wins in a cross-platform world
Cross-platform development has never been stronger. Modern frameworks let teams ship applications across Windows, macOS, iOS and Android from a shared codebase – faster, leaner and with fewer moving parts. But when performance is part of the product, portability alone isn’t enough. If...
Location Intelligence as application infrastructure
Location intelligence is no longer a feature bolted onto asset‑centric platforms. In 2026, it’s core application infrastructure. As asset tracking moves beyond logistics into regulated, distributed and high‑value environments, software teams need location intelligence that delivers real‑world context, not just coordinates. This shift is redefining how modern applications manage risk, automation and scale.
Is your business ready? The 2026 Cyber Essentials Danzell update explained
Cyber Essentials is changing – and this time, it’s not just a paperwork exercise. From 27 April 2026, a new version of the scheme comes into force. The UK Government and IASME are introducing the “Danzell” update (v3.3), designed to tighten up how you’re assessed and, crucially, how compliance...
ESET special offer: three years for the price of two
ESET has announced a new special offer for Spring 2026. From 1 April to 31 May 2026, when you purchase new licences or upgrade to the higher-tier products, you’ll receive three years of protection for the price of two. ESET...