April 28- May 1, 2020 | Hyatt Regency Bethesda, Maryland, USA

We’re Looking for Great Speakers

The deadline for speaker proposals has past. New submissions will be considered as alternate presentations in case of cancellation by any scheduled speakers.

The ICMC Program Committee seeks high-quality vendor-neutral presentations focused on commercial cryptography and common criteria from thought leaders in the engineering and research community, test laboratories, government organizations, procurers, deployers, administrators, and end-users. Product vendors are encouraged to recruit clients and partners who are front-line implementers as presenters.

Click Here to Create an EasyChair Account and Submit Your Proposal

Due Dates for Presentation Proposals

Proposals Due: December 18, 2018 January 8, 2019
Review and Comments: January 8, 2019
Acceptance Notifications (Updated): February 1, 2019
Presentation Slides Due: April 26, 2019

Dates of the Workshops and Presentations

Workshops: May 14, 2019
Conference Presentations: May 15-17, 2019

Benefits of Speaking

As a speaker, you’ll receive complimentary 3-day conference registration, an $1100 value (pre-conference workshops are not included). Your name, photo, professional biography and organization will be featured in conference promotion and the conference web site. Over 850,000 marketing impressions are made in this promotion campaign. One complimentary speaker registration per presentation is permitted. Additional co-speakers will receive discount registration of 20% off published fees. Speakers are responsible for their travel expenses. For any questions, please contact us at [email protected]

About the Submission Process

Speaking proposal submissions and reviews for ICMC are managed through an online management system called EasyChair which allows the author to submit a proposal and check the status of their submission. The Program Committee will review the submissions and notify the authors of the results. The submission review process will be finalized by January 22, 2019. If you have any questions about the process, please contact us at [email protected]

Setting Up an EasyChair Account and Entering a Presentation Proposal

  1. Visit https://easychair.org/conferences/?conf=icmc19
  2. Click “create an account” (If you have an existing EasyChair account, log in and skip to step 8)
  3. Enter the Captcha code and click “Enter”
  4. Enter your contact info and click “Continue”
  5. You will receive an email with an activation link for your account. Use the link to finish the registration process
  6. Enter your personal data and click “Create My Account”
  7. Log into ICMC19 by clicking “click here” and enter your username and password
  8. Enter your presentation proposal and click “Submit”

Information You’ll Need to Provide With Your Submission

You’ll be asked to select the appropriate TRACK for your proposed presentation. ICMC is organized by topic into conference tracks:

  • General Technology: Tools and techniques relating to cryptographic modules
  • Advanced Technology: High-level technology issues, or special-focus subject matter
  • Certification Programs: Issues related to the CMVP, government programs and global certification
  • User Experience: For organizations that rely on cryptographic security, updates on products, certification, and vulnerabilities
  • Open-Source Cryptography: Efforts to audit, improve and certify the security of the leading OS crypto projects
  • Industry Vertical/Embedded Crypto: The application of embedded encryption in specific industry verticals
  • Post-Quantum Crypto: Updates on the quantum computing threat and efforts to transition to quantum-ready algorithms
  • Random Bit Generators: Issues related to the design and validation of entropy sources and random bit generators
  • Crypto Enterprise Showcase: New companies and business models that leverage encryption technologies 

You’ll be asked to select the appropriate LENGTH OF TIME for your proposed presentation. ICMC is organized into presentations of various lengths:

  • 30 Minutes: A single-speaker presentation covering a specific issue or a limited range of topics.
  • 60 Minutes: A panel presentation involving more than one speaker, covering a range of issues or topics, or presented as a moderated discussion.
  • 200 Minutes: A half-day instructional workshop presentation.

You’ll also be asked to rate the EXPERTISE LEVEL and the SCOPE of your proposed presentation.

Checking Status and Notification of Your Submission

The submission review process will be finalized by January 22, 2019. Once the review of your submission is finalized, you will receive notification by email. You can also check the current status of your submission by logging in to EasyChair.

ICMC Program Committee Members

Michael Angelo, Chief Security Architect, NetIQ | Micro Focus
Joshua Brickman, Director, Security Evaluations, Oracle Inc.
Erin Connor, Director, EWA-Canada (Chair)
Fabien Deboyser, Certification Engineer, Thales e-security
Valerie Fenwick, Director of Software, Intel
Shawn Geddis, Security & Certifications Engineer, Apple Inc.
Ryan Hill, Community & Outreach Manager, atsec (Chair)
Tim Hudson, CTO & Technical Director, Cryptsoft Pty ltd (Chair)
Laurie Mack, Director Security & Certifications, Gemalto
Michele Mosca, University Research Chair & Co-Founder, Institute for Quantum Computing, University of Waterloo
Seth Nielson Director of Advanced Research Projects, Johns Hopkins University Information Security Institute
Fiona Pattinson, Vice President, atsec, (Chair Emeritus)
Nithya Rachamadugu, Director, Cygnacom (Chair)
Bill Rutledge, Project Director, ICMC (Chair)
Rich Salz, Senior Architect, Akamai
Mike Scanlin, Information Assurance Program Manager, NetApp
Loren Shade, VP Marketing, Allegro Software (Chair)
Marcus Streets, Program Director, Linux Foundation (Chair)
Lachlan Turner, Partner, Lightship Security (Chair)
Ashit Vora, Co-Founder & Lab Director, Acumen Security, LLC.
Steve Weingart, Manager of Public Sector Certifications (Chair)
William Whyte, Chief Scientist, Security Innovation
Brian Wood, Device Security Certification Manager, Samsung Research America