Huawei 2014 Annual Report Download - page 49

Download and view the complete annual report

Please find page 49 of the 2014 Huawei annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 148

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148

47Management Discussion and Analysis
Cyber Security
Building and implementing a global, end-to-end cyber
security assurance system is a key corporate strategy at
Huawei. We are fully aware that threats will never cease
and that cyber security is a global challengeone we
must all face together. At Huawei, cyber security is a
top priority and we place cyber security assurance above
our commercial interests.
Huawei is passionate about being open and transparent.
We are more than happy to share our cyber security
management practices with all stakeholders, including
customers, industry players, governments, and the
media. These practices include our end-to-end cyber
security assurance system, our management approach
that is oriented towards built-in processes, and our
"Assume nothing, Believe nobody, Check everything"
philosophy. We also provide documents, white papers,
and methods to customers to satisfy their cyber security
requirements. In 2014, we presented a stronger voice on
a variety of platforms around the world to communicate
Huawei's position and views on cyber security.
We actively participated in international workshops
and action projects in the industry and forums
organized by think tanks.
In January and February, Huawei attended
the RSA Conference USA, Munich Security
Conference, and ETIS's annual information
security conference and cyber security workshop,
where we delivered our cyber security policies
and position characterized by transparency and
visibility.
In April, Huawei delivered the following speech
at the Information Security Forum in Russia:
Open Innovation, A Necessity for Cyber Security
Solutions and Regional Development.
In September, Huawei attended the third
Information Security Conference in Budapest
and the 19th European Symposium on Research
in Computer Security in Warsaw. We introduced
our cyber security perspectives and practices,
and looked for opportunities in technical
research and cooperation projects for our 2012
Laboratories.
In November, Huawei shared its practices in
cyber security incident response at the 25th
Information Security Forum (ISF) Annual World
Congress. At the Global Mobile Broadband
Forum 2014, Huawei convened its first cyber
security workshop and discussed MBB security
solutions at length with customers.
We boosted stakeholder trust by communicating
our cyber security strategies, approaches, and end-
to-end assurance system with governments and
customers in countries such as the UK, France,
Germany, Canada, Denmark, and New Zealand.
In mid-November, CyberSecurity Malaysia honored
Huawei with the award for Cyber Security
Organization of the Year.
In December, we attended the global cyber security
summit held by EastWest Institute (EWI) in Berlin,
and released our third cyber security white paper,
Cyber Security Perspectives—100 requirements when
considering end-to-end cyber security with your
technology vendors. This white paper documents
the top 100 things our customers talk to us about
in relation to cyber security. When we developed
this white paper, we studied the existing legal
requirements and best practices to help technology
buyers systematically analyze vendor cyber security
capabilities and jointly raise the security levels of all
technologies. With the EWI platform, this Top 100
will continue to evolve and improve.