May 11-13, 2022 | Washington, DC

We’re Looking for Great Speakers

The submission deadline for ICMC has passed. Any submission received at this point will be held on a standby basis in case of an unforeseen opening in the conference program. The ICMC Program Committee seeks high-quality vendor-neutral presentations focused on commercial cryptography and common criteria from thought leaders in the engineering and research community, test laboratories, government organizations, procurers, deployers, administrators, and end-users. Product vendors are encouraged to recruit clients and partners who are front-line implementers as presenters.

Click Here to Create an EasyChair Account and Submit Your Proposal

Due Dates for Presentation Proposals

Proposals Due: April 28, 2021 May 12, 2021
Review and Comments: May 5, 2021
Acceptance Notifications: May 19, 2021 May 28, 2021
Presentation Slides Due: August 11, 2021

Dates of the Conference

CSfC Conference, CMMC Day: August 31, 2021
ICMConference: September 1-3, 2021

Benefits of Speaking

As a speaker, you’ll receive complimentary 3-day conference registration, an $1100 value (pre-conference workshops are not included). Your name, photo, professional biography and organization will be featured in conference promotion and the conference web site. Over 850,000 marketing impressions are made in this promotion campaign. One complimentary speaker registration per presentation is permitted. Additional co-speakers will receive discount registration of 20% off published fees. Speakers are responsible for their travel expenses. For any questions, please contact us at [email protected]

About the Submission Process

Speaking proposal submissions and reviews for ICMC are managed through an online management system called EasyChair which allows the author to submit a proposal and check the status of their submission. The Program Committee will review the submissions and notify the authors of the results. The submission review process will be finalized by the date shown above. If you have any questions about the process, please contact us at [email protected]

Setting Up an EasyChair Account and Entering a Presentation Proposal

  1. Visit https://easychair.org/conferences/?conf=icmc21
  2. Click “create an account” (If you have an existing EasyChair account, log in and skip to step 8)
  3. Enter the Captcha code and click “Enter”
  4. Enter your contact info and click “Continue”
  5. You will receive an email with an activation link for your account. Use the link to finish the registration process
  6. Enter your personal data and click “Create My Account”
  7. Log into ICMC by clicking “click here” and enter your username and password
  8. Enter your presentation proposal and click “Submit”

Information You’ll Need to Provide With Your Submission

You’ll be asked to select the appropriate TRACK for your proposed presentation. ICMC is organized by topic into conference tracks:

  • Certification Programs: Issues related to the CMVP, global certification, and programs by governments and standards organizations
  • User Experience: For organizations that rely on cryptographic security, updates on products, certification, and vulnerabilities
  • Open-Source Cryptography: Efforts to audit, improve and certify the security of the leading OS crypto projects
  • Embedded Crypto: The application of embedded encryption in industry verticals like IoT, payments, telecom, healthcare, and more
  • Post-Quantum Crypto: Updates on the quantum computing threat and efforts to transition to quantum-safe algorithms
  • Random Bit Generators: Issues related to the design and validation of entropy sources and random bit generators
  • PCI: Updates on Payment Card Industry SW and HW crypto security standards including PCI-PTS, PCI-SPoC and more
  • Crypto Technology: General tools and techniques relating to cryptographic modules

You’ll be asked to select the appropriate LENGTH OF TIME for your proposed presentation. ICMC is organized into presentations of various lengths:

  • 30 Minutes: A single-speaker presentation covering a specific issue or a limited range of topics.
  • 60 Minutes: A panel presentation involving more than one speaker, covering a range of issues or topics, or presented as a moderated discussion.
  • 200 Minutes: A half-day instructional workshop presentation.

You’ll also be asked to rate the EXPERTISE LEVEL and the SCOPE of your proposed presentation.

Checking Status and Notification of Your Submission

The submission review process will be finalized by the date shown above. Once the review of your submission is finalized, you will receive notification by email. You can also check the current status of your submission by logging in to EasyChair.

ICMC Program Committee Members

  • Joshua Brickman, Director, Security Evaluations, Oracle
  • Erin Connor, Consultant, Program Director, ICMC
  • Roberta Faux, Director of Innovation and Strategic Initiatives, Lorica Systems
  • Valerie Fenwick, Manager, Program Management, Crypto Services
  • Shawn Geddis, Security and Certifications Engineer, Platform Security, CoreOS, Apple
  • Ryan Hill, Community and Outreach Manager, atsec
  • Tim Hudson, CTO, Technical Director, Cryptsoft Pty ltd
  • Marc Ireland, Sr. Principal Security Certification Expert, NXP
  • Malcolm Levy, Certification Manager, Check Point
  • Michele Mosca, University Research Chair & Co-Founder, Institute for Quantum Computing, University of Waterloo
  • Seth Nielson, Founder, Chief Scientist, Crimson Vista
  • Fiona Pattinson, Security and Certifications Engineer, Platform Security / SEAR, Apple
  • Ralph Poore, Director Emerging Standards, PCI Security Standards Council
  • Nithya Rachamadugu, Consultant, VAAN Consultants, LLC
  • Jose Ruiz, Co-Founder, jtsec
  • Bill Rutledge, Project Director, ICMC
  • Loren Shade, VP Marketing, Allegro Software, and Founder, IoT Security Forum, Allegro Software
  • Meltem Sonmez Turan, Guest Researcher, NIST
  • Simo Sorce, Sr. Principal Software Engineer, Red Hat
  • Marcus Streets, Principal Security Architect, Arm
  • Ashit Vora, Lab Director, Co-Founder, Acumen Security
  • Steve Weingart, Consultant/Owner, Highland Tech LLC
  • Kenn White, Director & Co-Founder, Open Crypto Audit Project
  • Brian Wood, Device Security Certification Manager, Samsung Research America