Huawei 2015 Annual Report Download - page 46

Download and view the complete annual report

Please find page 46 of the 2015 Huawei annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 145

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145

44
papers were designed to explore methods of making
cyber security part of our company's DNA; to call
for the development and implementation of unified
international cyber security standards; and to share
Huawei's Top 100 cyber security practices and
experience in a bid to raise security levels across all
technologies.
In September 2015, we attended the 6th Global
Cyberspace Cooperation Summit held by EastWest
Institute (EWI) in New York and delivered a keynote
speech expressing our willingness to collaborate
with stakeholders to address cyber security issues.
Huawei, Microsoft, and The Open Group co-lead
the Breakthrough Group on Increasing the Global
Availability and Use of Secure ICT Products and
Services, part of EWI's Global Network Initiative.
Huawei's Top 100 white paper has also served as
an important input for the Breakthrough Group.
Multiple US media reported Huawei's contributions
to cyber security standards at EWI.
In October 2015, we successfully hosted the 5th
plenary meeting of the ETSI Cyber Security Technical
Committee and presented a proposal on Privacy
Enhancing Technologies (PET) for Big Data mining.
Applying PET in the Big Data domain demonstrates
that we are committed to providing carriers with
a reference standard on privacy protection in this
domain to drive the industry forward.
In October 2015, we sponsored and attended ETIS's
annual conference and delivered a presentation on
5G cyber security, which won wide acclaim from
the audience and inspired vigorous discussions. In
December, as a platinum sponsor of IEEE Globecom,
we demonstrated our 5G solutions and 5G cyber
security white paper on-site. The white paper was
commended by attendees as the first document in
the industry to describe 5G cyber security from 360
degrees.
In November 2015, with the theme of "Building a
More Secure Better Connected World", we attended
ISF's Annual World Congress as a platinum sponsor.
At the event, we elaborated on our cyber security
practices and customer concerns and summarized
the 100 things concerning cyber security that buyers
must consider when selecting suppliers. We also
showcased our latest security solutions for enterprise
customers, and called for open collaboration among
all parties to facilitate the development of cyber
security standards, winning acclaim from experts in
attendance.
In 2015, we presented a stronger voice in the
enterprise market through industry summits,
channel conferences, and security associations
in various countries and regions. We hosted the
Global Financial Services Industry Summit in Beijing,
the Channel Conference in London, the Western
Europe Channel Conference in Munich, and the
Southern Pacific Channel Conference in Singapore.
We also attended the Second National Conference
on Energy Cyber Security in Italy and ISF's Annual
World Congress in Atlanta. At these conferences, we
communicated Huawei's cyber security concepts and
strategies and demonstrated Huawei's end-to-end
assurance system, security capabilities, and security
image of openness and transparency, receiving
positive feedback from customers and channel
partners.
While actively communicating with external parties to
improve mutual trust on security, we use what we call
the ABC model internally, "Assume nothing, Believe
nobody, Check everything", to constantly improve our
end-to-end cyber security assurance system. Cyber
security has been incorporated into all Huawei core
processes, and we can demonstrate the process,
progress, openness, and transparency everywhere within
our company. We have used cyber security scorecards
to demonstrate the progress on our work priorities in
a quantitative manner and drive the implementation
of key measures. We have also performed internal
third-party auditing to discover cyber security issues
and risks in organizations, operations, and services,
allowing us to make improvements accordingly. In doing
so, we have continued to improve our cyber security
assurance system, which develops continuously and
allows for closed-loop improvements. Specifically, we
have adopted the following measures: