David Guest | Solution Architect and Technology Evangelist

An opening quote icon

I translate technobabble into plain English.

`
David Guest profile headshot
circle mask

As Kocho’s Solution Architect and Technology Evangelist, I’m responsible for a lot of different things.

I’ve worked in identity and security for the last 20+ years and have worked with technologies including Unix, Linux, IBM, Novell, and many others. This wide range of experience helps me design and implement great solutions on behalf of our clients.

I’m responsible for putting together solutions around identity, security, Microsoft 365, and other cloud services. All the while making sure that our clients understand the current trends around technology, such as identity in the Cloud (and on-premises).

I’m a regular presenter at our events and Microsoft roadshows, presenting to large and small audiences, and trying to turn technobabble into something resembling English.

My ‘Become greater’ ambition is to see that our clients are well-advised and can implement their strategy to become greater through technology.

Quote icon

I feel great when heading downhill on snow, ideally under a blue sky, completing a long run or making a last-ditch tackle.

tag icon

Featured

Resources and insights from David Guest

""
  • Blog

Decentralised identity: A beginner's guide

5-minute Read

  • Blog

The AI phishing threat: Don't get reeled in

4-minute Read

""
  • Blog

Cloud migration checklist: 10 steps to deliver a successful project (+ infographic)

10-minute Read

""
  • Blog

Cloud transformation vs. cloud migration: What’s the difference?

10-minute Read

""
  • Blog

The 5 pillars of a secure cloud transformation

10-minute Read

""
  • Blog

What is cloud transformation?

10-minute Read

""
  • Blog

Securing your path to passwordless authentication: A quick guide to modern sign-on methods

10-minute Read

architecture-stairs-microsoft-tech-update-august
  • Webinar

Microsoft Tech Update: Security Special

Gain up-to-date knowledge on the features and functionality of Microsoft’s key cloud, identity and security technologies.

8 May 2024

Alternate close up of woman's hands using stylus and tablet
  • On Demand

Understanding and enabling decentralised identity – Microsoft Expert Webinar

Give your users ultimate authority over their data to reduce risk, effectively verify, and improve transparency and auditability.

play icon

30-minute Watch

Close up of hands using stylus on a tablet
  • On Demand

Microsoft extended detection and response (XDR) demo

Give your users ultimate authority over their data to reduce risk, effectively verify, and improve transparency and auditability.

play icon

30-minute Watch

High angle shot of three white staircases
  • On Demand

Understanding Microsoft’s information protection and compliance tools

Find out how you can reduce the risk of a costly and reputationally damaging data breach.

play icon

37-minute Watch

Woman wearing glasses with black hair in denim jacket pointing at whiteboard
  • On Demand

Identity and zero trust for the new hybrid world

Dave Guest walks you through the key steps required to manage identities in complex environments – through the lens of zero trust.

play icon

42-minute Watch

Redheaded woman in plaid shirt and arm tattoo working on desktop
  • On Demand

A guide to deploying passwordless authentication

Discover how passwordless authentication works, why it is a must for organisations to achieve robust security, and how to deploy it for yourself.

play icon

27-minute Watch

Close up of man with thick curly hair and black framed glasses
  • On Demand

Microsoft security tools to protect financial and professional services in the remote working world

Learn how to enable secure and compliant access for remote collaboration, file sharing, and more.

play icon

60-minute Watch

Man swimming in choppy surf
  • On Demand

Why migrate from ADFS to Azure authentication?

Understand the pros and cons of ADFS authentication vs. pass-through authentication and password hash sync.

play icon

9-minute Watch

Close up of hands holding orange and pink post-it notes
  • Blog

How the SolarWinds breach highlights the dangers of federated authentication – and what you can do to protect against it

6-minute Read