September 18-20, 2024 | DoubleTree by Hilton, San Jose, California

We’re Looking for Great Speakers

The Call for Speakers deadline is April 3. The ICMC Program Committee seeks high-quality vendor-neutral proposals for conference presentations from industry professionals who have experience with commercial cryptography. We are seeking:


We prefer presentations from the engineering and research community, test laboratories, government organizations, procurers, deployers, integrators, administrators, and end-users.


We focus on cybersecurity based on commercial encryption for those who develop, manufacture, test, specify or use commercial products.


We showcase vendor-neutral, real-world experience from front-line product developers, testers, specifiers, and integrators. Product vendors are encouraged to recruit clients and partners who are front-line implementers as presenters.

Benefits of Speaking

As a speaker, you’ll receive complimentary 3-day conference registration, an $1100 value (pre-conference workshops are not included). Your name, photo, professional biography and organization will be featured in conference promotion and the conference web site. Over 850,000 marketing impressions are made in this promotion campaign. One complimentary speaker registration per presentation is permitted. Additional co-speakers will receive discount registration of 20% off published fees. Speakers are responsible for their travel expenses. For any questions, please contact us at [email protected]

Submission is Easy

Only a proposal title and brief (about 75-word) description is required for submission. All submissions will be peer reviewed and evaluated based on originality, technical and/or research content/depth, relevance to conference focus, and speaker experience. English is the official language of the conference.

About the Submission Process

Online Speaker Proposal Management System

Speaking proposal submissions and reviews for ICMC are managed through an online management system called EasyChair which allows the author to submit a proposal and check the status of their submission. The Program Committee will review the submissions and notify the authors of the results. The submission review process will be finalized by the date shown above. If you have any questions about the process, please contact us at [email protected]

Setting Up an EasyChair Account and Entering a Presentation Proposal

  1. Click submission button above
  2. Click “create an account” (If you have an existing EasyChair account, log in and skip to step 8)
  3. Enter the Captcha code and click “Enter”
  4. Enter your contact info and click “Continue”
  5. You will receive an email with an activation link for your account. Use the link to finish the registration process
  6. Enter your personal data and click “Create My Account”
  7. Log into ICMC by clicking “click here” and enter your username and password
  8. Enter your presentation proposal and click “Submit”

Checking Status and Notification of Your Submission

The submission review process will be finalized by the date shown above. Once the review of your submission is finalized, you will receive notification by email. You can also check the current status of your submission by logging in to EasyChair.

Information You’ll Need to Provide With Your Submission

You’ll be asked to select the appropriate TRACK for your proposed presentation. ICMC is organized by topic into conference tracks:

  • Certification Programs: Issues related to the CMVP, global certification, and programs by governments and standards organizations
  • User Experience: For organizations that rely on cryptographic security, updates on products, certification, and vulnerabilities
  • Open-Source Cryptography: Efforts to audit, improve and certify the security of the leading OS crypto projects
  • Embedded Crypto: The application of embedded encryption in industry verticals like IoT, payments, telecom, healthcare, and more
  • Post-Quantum Crypto: Updates on the quantum computing threat and efforts to transition to quantum-safe algorithms
  • Random Bit Generators: Issues related to the design and validation of entropy sources and random bit generators
  • PCI: Updates on Payment Card Industry SW and HW crypto security standards including PCI-PTS, PCI-SPoC and more
  • Crypto Technology: General tools and techniques relating to cryptographic modules
  • Homomorphic Cryptography: Encryption that allows computation to be performed directly on encrypted data

You’ll be asked to select the appropriate LENGTH OF TIME for your proposed presentation. ICMC is organized into presentations of various lengths:

  • 30 Minutes: A single-speaker presentation covering a specific issue or a limited range of topics.
  • 60 Minutes: A panel presentation involving more than one speaker, covering a range of issues or topics, or presented as a moderated discussion.

You’ll also be asked to rate the EXPERTISE LEVEL and the SCOPE of your proposed presentation.

Due Dates for Presentation Proposals

Proposals Due: April 3, 2024
Review and Comments: April 16, 2024
Acceptance Notifications: April 18, 2024
Presentation Slides Due: August 14, 2024

Dates of the Conference

ICMConference: September 18-20, 2024

ICMC Program Committee Members

  • Joshua Brickman, Director, Security Evaluations, Oracle
  • Erin Connor, Consultant, Program Director, ICMC
  • Roberta Faux, Director of Innovation and Strategic Initiatives, Lorica Systems
  • Valerie Fenwick, Former PKCS#11 TC Co-chair and Secretary OASIS
  • Shawn Geddis, Security & Certifications Engineer, red
  • Juan Gonzalez, Laboratory Director, Teron Labs
  • Marc Ireland, Federal Certification Expert, NXP Semiconductors
  • Malcolm Levy, Certification Manager, Check Point Software
  • Yi Mao, Managing Director, atsec information security
  • Michele Mosca, Co-Founder, evolutionQ
  • Tomáš Mraz, Software Seveloper, Red Hat
  • Seth Nielson, Chief Scientist, Crimson Vista
  • Marcos Portnoi, Lab Director, atsec information security
  • Nithya Rachamadugu, VP Cybersecurity Certification, DEKRA
  • Bill Rutledge, Project Director, ICMC
  • Loren Shade, VP of Marketing, Allegro Software
  • Meltem Sonmez Turan, Mathematician, National Institute of Standards and Technology (NIST)
  • Simo Sorce, Sr. Principal Software Engineer, Red Hat
  • Fiona Stewart, Security Certifications Engineer, red
  • Marcus Streets, Principal Security Architect, ARM
  • Kenn White, Director & Co-Founder, Open Crypto Audit Project
  • Brian Wood, Program Manager for Security Certifications, Google