April 7-10, 2025 | Toronto, Canada

We’re Looking for Great Speakers

The Call for Speakers deadline is October 21. ICMC25 will be presented as a special edition event, focusing on the theme: Racing Against the Global Quantum Deadline, a Call to Action. The ICMC Program Committee is especially interested in speaker proposals that address this theme. We’re looking for high-quality vendor-neutral proposals for conference presentations from industry professionals who have experience with commercial cryptography. We are seeking:

FRONT-LINE PROFESSIONALS

We prefer presentations from the engineering and research community, test laboratories, government organizations, procurers, deployers, integrators, administrators, and end-users.

STRONG TOPIC FOCUS

We focus on cybersecurity based on commercial encryption for those who develop, manufacture, test, specify or use commercial products.

NEUTRAL CONTENT

We showcase vendor-neutral, real-world experience from front-line product developers, testers, specifiers, and integrators. Product vendors are encouraged to recruit clients and partners who are front-line implementers as presenters.

Benefits of Speaking

As a speaker, you’ll receive complimentary 3-day conference registration, an $1100 value (pre-conference workshops are not included). Your name, photo, professional biography and organization will be featured in conference promotion and the conference web site. Over 850,000 marketing impressions are made in this promotion campaign. One complimentary speaker registration per presentation is permitted. Additional co-speakers will receive discount registration of 20% off published fees. Speakers are responsible for their travel expenses. For any questions, please contact us at [email protected]

Submission is Easy

Only a proposal title and brief abstract is required for submission. All submissions will be peer reviewed and evaluated based on originality, technical and/or research content/depth, relevance to conference focus, and speaker experience. English is the official language of the conference.

About the Submission Process

Online Speaker Proposal Management System

Speaking proposal submissions and reviews for ICMC are managed through an online management system called EasyChair which allows the author to submit a proposal and check the status of their submission. The Program Committee will review the submissions and notify the authors of the results. The submission review process will be finalized by the date shown above. If you have any questions about the process, please contact us at [email protected]

Setting Up an EasyChair Account and Entering a Presentation Proposal

  1. Click submission button above
  2. Click “create an account” (If you have an existing EasyChair account, log in and skip to step 8)
  3. Enter the Captcha code and click “Enter”
  4. Enter your contact info and click “Continue”
  5. You will receive an email with an activation link for your account. Use the link to finish the registration process
  6. Enter your personal data and click “Create My Account”
  7. Log into ICMC by clicking “click here” and enter your username and password
  8. Enter your presentation proposal and click “Submit”

Tips on Writing a Good Abstract

Your abstract is a condensed summary of your talk and presentation. It should convey the background of your topic, the issues it intends to raise or demonstrate and their importance, in a few sentences. The abstract should then summarize what the talk wants to present as solutions or analysis for the topic and possibly the methods used. And, finally, the intended result or conclusions the talk proposes to meet.

For an example of a well-written abstract, visit here or here.

Checking Status and Notification of Your Submission

The submission review process will be finalized by the date shown above. Once the review of your submission is finalized, you will receive notification by email. You can also check the current status of your submission by logging in to EasyChair.

Information You’ll Need to Provide With Your Submission

You’ll be asked to select the appropriate TRACK for your proposed presentation. ICMC is organized by topic into conference tracks:

  • Certification Programs: Issues related to the CMVP, global certification, and programs by governments and standards organizations
  • Crypto Technology: General tools and techniques relating to cryptographic modules
  • Embedded/IoT Crypto: The application of embedded encryption in industry verticals like IoT, payments, telecom, healthcare, and more
  • Homomorphic Cryptography: Encryption that allows computation to be performed directly on encrypted data
  • Implementations: For organizations that rely on cryptographic security, updates on products, certification, and vulnerabilities
  • Open-Source Cryptography: Efforts to audit, improve and certify the security of the leading OS crypto projects
  • Post-Quantum Preparedness: For the data-driven enterprise, updates on current threat and efforts to implement post-quantum security.
  • Post-Quantum Technology: For cryptographic module developers, PQ research, approved algorithms, PQ assessments, integrating PQ into cryptographic modules.
  • Random Bit Generators: Issues related to the design and validation of entropy sources and random bit generators

You’ll be asked to select the appropriate LENGTH OF TIME for your proposed presentation. ICMC is organized into presentations of various lengths:

  • 30 Minutes: A single-speaker presentation covering a specific issue or a limited range of topics.
  • 60 Minutes: A panel presentation involving more than one speaker, covering a range of issues or topics, or presented as a moderated discussion.

You’ll also be asked to rate the EXPERTISE LEVEL and the SCOPE of your proposed presentation.

Due Dates for Presentation Proposals

Proposals Due: October 21, 2024
Review and Comments: November 4, 2024
Acceptance Notifications: November 8, 2024
Presentation Slides Due: March 17, 2024

Dates of the Conference

ICMConference: April 7-10, 2025

ICMC Program Committee Members

  • Joshua Brickman, Senior Director, Security Evaluations, Oracle, United States
  • Erin Connor, Partner, Daideo Consulting, Canada
  • Roberta Faux, US Head of Cryptography and Field CTO, Arqit Ltd, United States
  • Valerie Fenwick, Former PKCS#11 TC Co-chair and Secretary, OASIS, United States
  • Shawn Geddis, Co-Founder & CTO, Katalyst LLC, United States
  • Juan Gonzalez, Laboratory Director, Teron Labs, Australia
  • Marc Ireland, Federal Certification Expert, NXP Semiconductors, United States
  • Malcolm Levy, Certification Manager, Check Point Software Technologies, Israel
  • Yi Mao, CEO and Managing Director, atsec information security, United States
  • Michele Mosca, CEO, evolutionQ, Canada
  • Tomas Mraz, Software Developer, OpenSSL Foundation, Czech Republic
  • Seth Nielson, Founder & Chief Scientist, Crimson Vista, United States
  • Marcos Portnoi, Lab Director, atsec information security, United States
  • Nithya Rachamadugu, VP Cybersecurity Certification, DEKRA, United States
  • William Rutledge, CEO, Cnxtd Event Media, United States
  • Loren Shade, VP of Marketing, Allegro Software, United States
  • Meltem Sonmez Turan, Mathematician, National Institute of Standards and Technology (NIST), United States
  • Simo Sorce, Distinguished Engineer, Red Hat, United States
  • Jade Stewart, Portfolio Manager, National Information Assurance Partnership (NIAP), United States
  • Fiona Stewart, Security Certifications Engineer, ICMC Conference Chair Emeritus, United States
  • Marcus Streets, Principal Security Architect, ARM, United Kingdom
  • Kenn White, Director & Co-Founder, Open Crypto Audit Project, United States
  • Brian Wood, Program Manager, Google, United States