Oort Knowledge Base
  • Home
  • Glossary
  • 📊Dashboard
    • Get Started Dashboard
    • Overview Dashboard
    • MFA Dashboard
  • đŸ‘„Understanding your users
    • 📇Users
      • đŸ’ŸSaved Filters
      • ❓Basic Search & Advanced Query Mode
    • đŸ©»User 360
      • đŸ—șOverview Tab
      • 🔬Activity Tab
      • đŸ“¶Networks Tab
      • đŸ’»Devices Tab
      • đŸȘșApplications and Groups Tabs
      • ✅Checks Tab
    • đŸ› ïžTriaging Alerts and Remediation Actions
    • 🔗Linking User Accounts
    • đŸ€·User Statuses
  • đŸ—ƒïžApplications
  • đŸ’»Devices
  • đŸ§©Configuring Integrations
    • Managed Integrations
    • Auth0
      • Auth0 Data Integration
      • Auth0 Log Streaming & Marketplace App
    • Microsoft Entra ID (Azure AD) Data Integration
    • Microsoft Entra ID (Azure AD) SSO Integration
    • Azure Event Hub Log Streaming for Microsoft Entra ID (Azure AD)
    • Azure Sentinel SIEM Integration
    • AWS
    • AWS User-Based Access [Deprecated]
    • Duo Security Integration
    • Email Notifications
    • Github
    • Google Workspace Integration
    • Jamf
    • Jira Integration
    • Mailgun Integration
    • Microsoft Teams Notification Integration
    • Okta Log Streaming AWS EventBridge Integration
    • Okta Data Integration
    • Okta Workflows
    • Okta Integration Network - Production SSO App
    • Okta SSO
    • Polarity Integration
    • Salesforce Integration
    • SendGrid Integration
    • ServiceNOW Integration
    • Slack
    • Snowflake
    • Webex Notification Integration
    • Webhooks
    • Workday
      • Manual Import (CSV)
      • Report as a Service (RaaS)
  • ☑Understanding Check failures
    • 🔍Reviewing Check Results
    • đŸ§čCustomizing Checks
    • 📖Cisco Identity Insights
      • Identity Posture Management Insights
        • Access from Denied Territories
        • Allow/Block Email Logins
        • Application Login Bypasses SSO
        • Applications with Expired Secret
        • HRIS Discrepancies
        • Identity Intelligence Client Secret Expiring Soon
        • Inactive Account Probing
        • Inactive Guest Users
        • Inactive Users
        • Missing Value in Mandatory Field
        • Never Logged In
        • No MFA Configured
        • No Strong MFA Configured
        • Okta Long Running Sessions
        • Okta Session Length Policy Compliance
        • Personal VPN Usage
        • Provider User Type Missing
        • Rate Limit Alert
        • Role Assigned to Azure Cloud Only Account
        • Salesforce Direct Login Settings
        • Shared Mailbox Sign In Enabled
        • Slack User Inconsistencies
        • Telecom MFA Limit Reached
        • Unmanaged Devices Access
        • Unused Application for a User
        • Upcoming App Key Expiration
        • User Authorized to Bypass MFA
        • User Has Directly Assigned Application
        • User in IDP but not in HRIS
        • User Password Expiration Failure
        • User Stuck in Non-functional State
        • Users Sharing Authenticators
        • Weak MFA Was Used To Successfully Sign In
      • Identity Threat Detection Insights
        • A Bypass Code Was Used To Successfully Sign In
        • Access From Dormant Account
        • Accounts With Unusually High Activity
        • Active Account Under Heavy Attack
        • Activity From Untrustworthy ISP
        • Admin Impersonation in Okta
        • Admin Role Assigned to User
        • Authenticator Registration Anomalies
        • Code Exfiltration By Guest Account
        • Compromised Session
        • Google Drive File with Excessive Sharing Permissions
        • Impossible Travel
        • IP Threat Detected
          • IP Threat Detected In Depth
        • Login to Admin Console
        • MFA Flood
        • Microsoft Entra ID Admin Activity Anomaly
        • New Country for Tenant
        • New IDP Created
        • Okta Admin Activity Anomaly
        • Rare Browser Activity
        • Registered Location Mismatch
        • Risky Parallel Sessions
        • Service Account Successful Sign In
        • Shared Mailbox Successful Sign In
        • Sign In Threat Detected
        • Sign-in from Recently Created IdP
        • Successful Access from a Previously Only Failing IP
        • Super Admin Login to Google
        • Suspicious Activity Reported by End User
        • Unusual Repo Access
        • User IP in Blocked State
        • User Lock Out Risk Detected
        • User Trust Level Alert
        • Users With Defined Email Forward Rules
        • Users With New Email Forward Rules
        • Weak MFA Manually Activated and Utilized
  • ⚙Tenant Settings
    • đŸ‘šâ€đŸ’ŒRole-based Access (RBAC) and Tenant Access Logs
    • Systems Logs
  • đŸ„Identity Posture Score
  • 🚹User Trust Level
  • How-to Guides
    • 🔐Accessing and Securing your Cisco Identity Intelligence Tenant
    • đŸŽïžCan Identity Intelligence analyze behavior and fail checks more frequently?
    • 🛂Importing Known IP Address Lists
    • 🔎Networks Tab & User Investigations
    • 🔁Okta Workflows Webhook Example
    • đŸ—ƒïžUnderstanding HRIS Data and SCIM
    • MFA Factors FAQ
  • Public API
    • APIs
  • Troubleshooting & Support
    • API Permissions for Integrations
    • Responsible Disclosure Policy
  • Best Practices
    • đŸ›ŁïžWhat’s Next? How to use Identity Intelligence effectively
    • 📚Identity Security Reading List
    • ✍KPIs for‹ IAM Teams
  • Blogs
    • 0ktapus for humans
    • Oort Releases GitHub Integration To Extend Identity Threat Detection
    • Oort Recognized Twice as a Sample Vendor in GartnerÂź 2023 Hype Cycle Reportsℱ
    • Oort's Response Capabilities: Remediate Compromised Accounts with Just One Click
    • Oort Unveils Dashboard, Providing A Single Pane of Glass for Identities
    • Oort’s New Identity Security Dashboard
    • Oort Unveils Identity Technology Ecosystem, Bringing Identity Data out of Orbit and Into View
    • Oort: Your Security Layer On Top Of Okta
    • Populating the Unpopulated: Challenges of Building a Comprehensive User Inventory
    • Protecting IT Help Desk Teams Against Cyber Attacks
    • Protecting Salesforce Accounts from Takeovers and Ungoverned Access
    • Restrict Guest Access Permissions: Best Practices and Challenges
    • Seizing the Communication Opportunity: Aligning Perspectives in Identity Security
    • Session Hijacking in a Post-Genesis World
    • SIEM vs. Security Data Lake: Why it's Time to Rethink Your Security Program
    • Speaking the Same Language for Identity Security: Identify, Protect, Detect, Respond
    • State of Identity Security research reveals 40% of accounts use weak or no form of multi-factor authentication to protect identities
    • Strengthening Identity Controls: Mapping to CIS CSC and NIST CSF Security Frameworks
    • Strengthening Identity Security with Single Sign-On (SSO) Systems
    • Succeeding with Proper Detection for Identity Security: A Comprehensive Approach
    • Taking a Data-Driven Approach to Identity Security
    • The Concerning Prevalence of Weak Second Factors
    • The Crucial Role of an Identity Security Leader
    • Why I am Joining Oort
    • The Quest for a Passwordless World
    • Understanding Azure Active Directory (Azure AD)
    • Understanding the Implications of New SEC Rules on Cyber Incident Disclosure
    • Unlocking the Power of Zero Trust: The Crucial Role of Identity and Oort's Identity Security Platform
    • Respond Even Quicker to Identity Threats
    • What to Look Out For at Gartner IAM
    • 7 Critical Requirements for Securing Third-Party and Vendor Access
    • Best Practices for Efficiently Responding to Identity Threats
    • Announcing our Identity Technology Partner Ecosystem
    • Catching waves and building clouds
    • Cisco Announces Intent to Acquire Oort
    • CISO Perspectives: Eric Richard, HubSpot
    • Defining Roles & Responsibilities for an Identity Security Program
    • Detecting Session Hijacking
    • 8 Things to Look for in an ITDR Solution
    • Enhancing Identity Threat Detection: Introducing Oort’s New GitHub Integration
    • Founder Perspective: Matt Caulfield On Why He Started Oort
    • Founder Perspective: Vision To Reality
    • Four Reasons Why Traditional SIEMs Fall Short For Identity Security Programs
    • How Oort Partners with Duo for Unbeatable Secure Access
    • Governance, Risk, and Compliance
    • How to Find Inactive Users
    • Identity and Access Management and Oort Explained
    • 5 Identity Security Questions Every IAM Leader Needs to Answer
    • Identity security is bigger than just ITDR
    • Identity is the apex threat vector, so why is identity security still a mess?
    • Identity Threat Detection
    • Identity Threat Detection and Response: what you need to know
    • Identiverse 2023: What I'm Looking Forward to & What Not to Miss
    • Interview with Oort: Best Practices for Managing & Protecting Service Accounts
    • Interview with Alex “Sasha” Zaslavsky (Oort Data Science Lead)
    • Interview with Andy Winiarski (Head of Solutions Engineering)
    • Interview with Nicolas Dard (Oort’s VP of Product Management)
    • Introducing our Latest Integration to Protect Identities in AWS
    • Introducing The 2023 State of Identity Security Report
    • Maintaining a Strong Identity Security Posture: Why IAM Hygiene Matters
    • Managing Machine Identities: A Comprehensive Guide
    • Managing Risk In Shipwreck Diving and Security
    • Monitoring MFA Usage and Adoption: Strengthening Your Security Strategy
    • Okta Breach: Why Attackers Target GitHub, and What You Can Do to Secure It
    • Okta Security
    • Oort and Polarity Combine to Provide Instant Context on Identities
    • Oort + Polarity: Instant Identity Context to Power Investigations and Response
    • Oort Announces $15M in Seed and Series A Funding Round
    • Oort Stacks Go-to-Market Leadership Team Following Series A Investment
    • Oort Extends Identity Threat Detection with New AWS Integration
    • Announcing General Availability of the Oort Identity Analytics & Automation Platform
    • Oort Joins Forces with Microsoft Intelligent Security Association to Bring Visibility into Unmanaged Devices
    • Oort Joins the Microsoft Intelligent Security Association (MISA)
    • Building an Effective Identity Security Program: A Comprehensive Handbook
    • Oort Launches Identity Security Platform in Auth0 Marketplace
    • Oort Launches Identity Security Platform in AWS Marketplace
    • Oort Launches One-Click Remediation Actions for Streamlined Identity Security Response
    • Oort Origins and Our Vision for Identity Security
  • Release Notes
    • Week 22, 2024
    • Week 21, 2024
    • Week 20, 2024
    • Week 19, 2024
    • Week 18, 2024
    • Week 17, 2024
    • Week 16, 2024
    • Week 14, 2024
    • Week 13, 2024
    • Week 11, 2024
    • Week 9, 2024
    • Week 7, 2024
    • Week 5, 2024
    • Week 4, 2024
    • Week 3, 2024
    • Week 2, 2024
    • 2023
      • Week 49, 2023
      • Week 48, 2023
      • Week 47, 2023
      • Week 46, 2023
      • Week 45, 2023
      • Week 44, 2023
      • Week 43, 2023
      • Week 42, 2023
      • Week 41, 2023
      • Week 40, 2023
      • Week 39, 2023
      • Week 38, 2023
      • Week 37, 2023
      • Week 35, 2023
      • Week 34, 2023
      • Week 33, 2023
      • Week 32, 2023
      • Week 31, 2023
      • Week 30, 2023
      • Week 29, 2023
      • Week 28, 2023
      • Week 27, 2023
      • Week 26, 2023
      • Week 25, 2023
      • Week 24, 2023
      • Week 23, 2023
      • Week 22, 2023
      • Week 21, 2023
      • Week 20, 2023
      • Week 19, 2023
      • Week 18, 2023
      • Week 17, 2023
      • Week 16, 2023
      • Week 15, 2023
      • Week 13, 2023
      • Week 12, 2023
      • Week 11, 2023
      • Week 10, 2023
      • Week 9, 2023
      • Week 8, 2023
      • Week 7, 2023
      • Week 6, 2023
      • Week 5, 2023
      • Week 4, 2023
      • Week 3, 2023
      • Week 2, 2023
      • Week 1, 2023
    • 2022
      • Week 51, 2022
      • Week 50, 2022
      • Week 49, 2022
      • Week 48, 2022
      • Week 47, 2022
      • Week 46, 2022
      • Week 43, 2022
      • Week 42, 2022
      • Week 41, 2022
      • Week 38, 2022
      • Week 37, 2022
      • Week 36, 2022
      • Week 35, 2022
      • Week 34, 2022
      • Week 33, 2022
      • Week 32, 2022
      • Week 31, 2022
      • Week 30, 2022
      • Week 29, 2022
      • Week 24, 2022
      • Week 12, 2022
Powered by GitBook
On this page
  1. Blogs

Managing Risk In Shipwreck Diving and Security

Denzil Wessels is the Chief Product Officer at Oort. He brings decades of industry experience to the team from multi-billion-dollar market-cap network security companies including Juniper, Aruba and most recently, as one of the first 100 employees at Zscaler.

Can we start by having you share a bit about your background in the cybersecurity market?

I started my career in the 90s designing and implementing large networks, and even helped build an ISP. I moved to the Valley in the 2000s and that was the first time I started to build products rather than just using what was being put out there by other solutions providers.

The first company I joined was called uRoam, which was one of the earliest SSL VPN companies. That company was acquired by F5 and after about a year I left to join Neoteris to help build risk posture management on top of SSL VPN. That company was acquired by Netscreen, which was eventually acquired by Juniper Networks. While at Juniper we started building what nowadays everyone likes to call “zero trust,” which was really fun as I reflect back on that experience. At the same time, something bothered me throughout my early career experiences about how hard it could be for customers to realize value. In most cases, the rollout of a new project could take 6-12 months minimum.

After my time at Juniper and a couple years I spent at Aruba Networks, I had the opportunity to join Zscaler as one of its first 100 employees. It was an amazing experience to help build what is now referred to as the “software-defined perimeter,” which is a much more surgical way to connect users to apps than the old-world of VPNs. One of my proudest memories from Zscaler is how we were able to get customers up and running in a way that delivered value quickly compared to our competitors and in a way no one else could match at the time.

That’s a really valuable set of experiences to bring to a startup. What do you feel is still left unsolved out there that you want to tackle here at Oort?

You don’t need to go that far into your news feed to find the latest example of a supply chain breach, and part of that is because the market hasn’t yet delivered an agentless solution that allows you to (1) establish trust at a very granular level (i.e. down to the individual packet) and, (2) make the right decisions in real-time to maintain risk at a level that’s acceptable based on your business policies. Whereas a lot of network access solutions look at the problem as, “We’ll give you a way to connect users you trust to applications you trust and off you go,” that type of approach isn’t good enough anymore. We really need to solve multiple parts of the problem in a single solution spanning identity lifecycle, network access, continuous risk monitoring and control.

The good news is we’re seeing plenty of solution providers at least talking more about the importance of an identity-centric approach for security. The bad news is it’s all still managed in a centralized manner that’s insufficient, especially when you think about the unique attributes of managing B2B relationships and the identities of third-party users and entities. It’s crazy that the standard way third-parties get access to things is by onboarding them like they are employees, when all the breaches we have seen should have taught us what we really should be doing is treating our employees more like third-parties.

Beyond that, if you look at how every VPN or Zero-Trust Access type solution has been built, all these products were built to enable a network or security architect to do their job, with little consideration for everyone else who is involved. Oort has a unique opportunity to help leaders bake security into the DNA of how their businesses operate across all functions of the org, rather than this esoteric thing bottlenecked in the hands of a few experts.

Let’s pivot to a quick fire-round of three final questions. First, what makes a team great in your opinion

To me it’s all about how much you can think outside the box and actually deliver on something that initially sounds outside your comfort zone. You unlock value when you can see a problem in a different way and approach it with a solution that is contrarian at the time but then turns out to obviously be the right way to do things.

Next, tell me about a non-work experience in your life that most impacted how you approach your day-to-day work.

The cave diving and shipwreck exploration I’ve done has shaped a lot of how I approach my work life. As they say about the 7 P’s, “Proper preparation and planning prevents piss poor performance.” I’ve explored some very risky shipwrecks where, if you didn’t execute the dive properly, you or others who were with you could die. At face value it seems like failing to execute a dive properly is life-or-death and what we do in our work day-to-day isn’t as critical, but then I’m also reminded that one of the most revered people in the business world, Warren Buffett, describes cybersecurity as posing the greatest existential threat to mankind aside from nuclear warfare.

OK last question we have time for right now, why did you decide to join the team on this journey to launch Oort?

Launching a new product or company is an opportunity to learn from what existed before you and chart a new course with proper preparation and planning. Joining Oort is an opportunity to apply those 7 P’s, and it was very simple to see “Why Oort” and “Why now.”

First off, safely connecting third-parties to a set of resources sounds so basic, but it’s a massive problem that has not yet been effectively solved. Anyone who pretends third-party access is “just another” use case for their zero-trust solution is proving they don’t really understand how to correctly solve the problem. Second, for me it was about the vision Matt shared about where we are going to go as a company, after we solve the third-party problem, to help organizations transform how they think about and implement security at scale.

I hope you enjoyed this interview and will share it with your network. If you aren’t already following us, please click here to be taken to Oort’s company page.

PreviousManaging Machine Identities: A Comprehensive GuideNextMonitoring MFA Usage and Adoption: Strengthening Your Security Strategy