Section 1 - Risk identification and evaluation
Risks are identified, analyzed, classified and assessed based on data flows during the AI lifecycles in line with the business models/processes. The results are integrated and mapped into the company-wide enterprise risks list, where and when necessary.
NEC Corporation (hereby, the company) has identified AI related risks at appropriate timing and recently has also been updating the latest AI risks based on the business processes. This activity involves CxOs, e.g., CRO: Chief Risk Officer and related CxOs, and executives/AI experts across division/departments.
Red teaming: Conducting red teaming to assess model/system suitability for migration beyond the development phase.
Depending on the security levels, developers are required/recommended to conduct self-diagnose using vulnerability diagnostics and/or penetration tests delivered by internal security teams.
Independent external testing: Conducting independent external testing to assess the suitability of the models/systems for migration beyond/after the development phase.
Regarding the third-party evaluation (independent external tests), the organization can undergo a penetration test by an in-house or by security specialist teams in the group companies who are different entitles from the project.
Quantitative Assessment Test: Metrics are adopted for quantitative risk assessment in Upstream processes, the internal documents including "Cyber Security Checklists" are used for evaluations. The evaluation before shipment, the CVSS value are adopted.
In upstream processes, the internal documents including "Cyber Security Checklists" are used for evaluations. The evaluation before shipment, the CVSS value are adopted.
A security incident escalation mechanism is in place for vulnerability reporting.
No incentive program to disclose vulnerabilities
Conducting independent external testing to assess the suitability of the models/systems. Regarding the third-party evaluation (independent external tests), the organization can undergo a penetration test by an in-house or by security specialist teams in the group companies who are different entitles from the development/migration project.
The secure development processes and the operation check mechanism are utilized in accordance with the company-wide rules/guidelines.
Regarding generative AI, vulnerability assessments and reports related to security are externally conducted.
The company has contributed to development of international standards by SDOs and best practices by industries globally.
NEC is ranked as one of the top companies according to the number of treatises between 2000 to 2022 at prestigious conferences such as NeurIPS, ICML, ECML-PKDD, KDD, and ICDM. The company also promote participation in global AI discussions at international organizations, and participate in standards activities for international standards (ISO, IEC, ITU, etc.), regional standards, domestic standards, etc.
There are several guidelines internally to check risks and countermeasures in each business/service areas such as AI, System Integration, and products. Those requirements in the guidelines are normally operated with necessary combinations. When feedbacks and updates are made, it is shared with internal stakeholders and reflected to the guidelines on demand basis.
The Internal stakeholders are identified in each case and needs are shared across divisions/departments to cover from AI development (R&D) to sales. Risk mitigation measures are also implemented based on the above collaborations.
No answer provided


























