September 17-20, 2024 | DoubleTree by Hilton, San Jose, California

We’re Looking for Great Speakers

The call for speakers deadline has passed. Any submissions received will be considered as potential standby presentations in case of speaker cancellation. The ICMC Program Committee seeks high-quality vendor-neutral proposals for conference presentations from industry professionals who have experience with commercial cryptography. We are seeking:


We prefer presentations from the engineering and research community, test laboratories, government organizations, procurers, deployers, integrators, administrators, and end-users.


We focus on cybersecurity based on commercial encryption for those who develop, manufacture, test, specify or use commercial products.


We showcase vendor-neutral, real-world experience from front-line product developers, testers, specifiers, and integrators. Product vendors are encouraged to recruit clients and partners who are front-line implementers as presenters.

Benefits of Speaking

As a speaker, you’ll receive complimentary 3-day conference registration, an $1100 value (pre-conference workshops are not included). Your name, photo, professional biography and organization will be featured in conference promotion and the conference web site. Over 850,000 marketing impressions are made in this promotion campaign. One complimentary speaker registration per presentation is permitted. Additional co-speakers will receive discount registration of 20% off published fees. Speakers are responsible for their travel expenses. For any questions, please contact us at [email protected]

Submission is Easy

Only a proposal title and brief abstract is required for submission. All submissions will be peer reviewed and evaluated based on originality, technical and/or research content/depth, relevance to conference focus, and speaker experience. English is the official language of the conference.

About the Submission Process

Online Speaker Proposal Management System

Speaking proposal submissions and reviews for ICMC are managed through an online management system called EasyChair which allows the author to submit a proposal and check the status of their submission. The Program Committee will review the submissions and notify the authors of the results. The submission review process will be finalized by the date shown above. If you have any questions about the process, please contact us at [email protected]

Setting Up an EasyChair Account and Entering a Presentation Proposal

  1. Click submission button above
  2. Click “create an account” (If you have an existing EasyChair account, log in and skip to step 8)
  3. Enter the Captcha code and click “Enter”
  4. Enter your contact info and click “Continue”
  5. You will receive an email with an activation link for your account. Use the link to finish the registration process
  6. Enter your personal data and click “Create My Account”
  7. Log into ICMC by clicking “click here” and enter your username and password
  8. Enter your presentation proposal and click “Submit”

Tips on Writing a Good Abstract

Your abstract is a condensed summary of your talk and presentation. It should convey the background of your topic, the issues it intends to raise or demonstrate and their importance, in a few sentences. The abstract should then summarize what the talk wants to present as solutions or analysis for the topic and possibly the methods used. And, finally, the intended result or conclusions the talk proposes to meet.

For an example of a well-written abstract, visit here or here.

Checking Status and Notification of Your Submission

The submission review process will be finalized by the date shown above. Once the review of your submission is finalized, you will receive notification by email. You can also check the current status of your submission by logging in to EasyChair.

Information You’ll Need to Provide With Your Submission

You’ll be asked to select the appropriate TRACK for your proposed presentation. ICMC is organized by topic into conference tracks:

  • Certification Programs: Issues related to the CMVP, global certification, and programs by governments and standards organizations
  • Crypto Technology: General tools and techniques relating to cryptographic modules
  • Embedded/IoT Crypto: The application of embedded encryption in industry verticals like IoT, payments, telecom, healthcare, and more
  • Homomorphic Cryptography: Encryption that allows computation to be performed directly on encrypted data
  • Implementations: For organizations that rely on cryptographic security, updates on products, certification, and vulnerabilities
  • Open-Source Cryptography: Efforts to audit, improve and certify the security of the leading OS crypto projects
  • Post-Quantum Preparedness: For the data-driven enterprise, updates on current threat and efforts to implement post-quantum security.
  • Post-Quantum Technology: For cryptographic module developers, PQ research, approved algorithms, PQ assessments, integrating PQ into cryptographic modules.
  • Random Bit Generators: Issues related to the design and validation of entropy sources and random bit generators

You’ll be asked to select the appropriate LENGTH OF TIME for your proposed presentation. ICMC is organized into presentations of various lengths:

  • 30 Minutes: A single-speaker presentation covering a specific issue or a limited range of topics.
  • 60 Minutes: A panel presentation involving more than one speaker, covering a range of issues or topics, or presented as a moderated discussion.

You’ll also be asked to rate the EXPERTISE LEVEL and the SCOPE of your proposed presentation.

Due Dates for Presentation Proposals

Proposals Due: April 3, 2024
Review and Comments: April 16, 2024
Acceptance Notifications: April 18, 2024
Presentation Slides Due: August 14, 2024

Dates of the Conference

ICMConference: September 18-20, 2024

ICMC Program Committee Members

  • Joshua Brickman, Director, Security Evaluations, Oracle
  • Erin Connor, Consultant, Program Director, ICMC
  • Roberta Faux, Director of Innovation and Strategic Initiatives, Lorica Systems
  • Valerie Fenwick, Former PKCS#11 TC Co-chair and Secretary OASIS
  • Shawn Geddis, Security & Certifications Engineer, red
  • Juan Gonzalez, Laboratory Director, Teron Labs
  • Marc Ireland, Federal Certification Expert, NXP Semiconductors
  • Malcolm Levy, Certification Manager, Check Point Software
  • Yi Mao, Managing Director, atsec information security
  • Michele Mosca, Co-Founder, evolutionQ
  • Tomáš Mraz, Software Seveloper, Red Hat
  • Seth Nielson, Chief Scientist, Crimson Vista
  • Marcos Portnoi, Lab Director, atsec information security
  • Nithya Rachamadugu, VP Cybersecurity Certification, DEKRA
  • Bill Rutledge, Project Director, ICMC
  • Loren Shade, VP of Marketing, Allegro Software
  • Meltem Sonmez Turan, Mathematician, National Institute of Standards and Technology (NIST)
  • Simo Sorce, Sr. Principal Software Engineer, Red Hat
  • Fiona Stewart, Security Certifications Engineer, red
  • Marcus Streets, Principal Security Architect, ARM
  • Kenn White, Director & Co-Founder, Open Crypto Audit Project
  • Brian Wood, Program Manager for Security Certifications, Google