Governance & Risk Management , IT Risk Management , Security Operations

Marking Your Security Controls to Threats to Expand Defenses

Reliance Industries' Dube on Adjusting Controls to Support Growth and New Tech
Durga Prasad Dube, executive vice president, Reliance Industries

For years, the banking industry has operated under the concept of "mark to market," adapting the valuation of an asset to the market price. In cybersecurity, organizations should mark security controls to threats that are out in the market, says Durga Prasad Dube, executive vice president at Reliance Industries.

See Also: The Evolving MECA Cybersecurity Landscape

"In information security, the controls must always be marked to the threat. If you are not changing the control, your tools will become obsolete. I call this 'mark to threat,'" Dube says. "You cannot have a lock and always think that lock will work because you always have to see whether somebody will break that lock. If you have an eye on those things, then your lock will become very resilient."

In a video interview with Information Security Media Group at ISMG's Dynamic CISO Excellence Awards and Conference, Dube discusses:

  • How the concept of "mark to threat" needs to be deployed;
  • Implementation challenges;
  • A security road map for the year ahead.

Before joining Reliance Industries Ltd., Dube was executive director and global head of a risk management practice for Paladion Networks. He has more than two decades of experience in risk management and information assurance.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.