Click the icon to view presentations.
Tuesday, May 16, 2017 |
08:00 – 09:00 Registration (Foyer)
09:00 – 12:30 Pre-Conference Workshops
Pre-Conference Workshop W01a (Ballroom DE) | Pre-Conference Workshop W01b (Ballroom B) | ||
09:00 | Decrypting Crypto: Intro to Cryptography , Steve Weingart, Manager of Public Sector Certifications, Aruba Networks
|
Intro to FIPS 140 , Ray Potter, Founder, SafeLogic; Mark Minnoch, Technical Account Manager, SafeLogic |
12:30 – 13:30 Lunch (Foyer)
13:30 – 17:00 Pre-Conference Workshops
Pre-Conference Workshop W02a (Ballroom DE) | Pre-Conference Workshop W02b (Ballroom B) | ||
13:30 | Intro to Crypto Hardware Attacks , Jasper van Woudenberg, CTO North America, Riscure | FIPS 140-2 Validation Process: Overview and Case Study , Tammy Green, Senior Principal Security Architect, Symantec; Carolyn French, Manager, Cryptographic Module Validation Program, Communications Security Establishment; Ian Hall, Certification Architect, Symantec; Ashit Vora, Co-Founder and Laboratory Director, Acumen Security |
Wednesday, May 17, 2017 |
08:00 – 09:00 Registration (Foyer)
09:00 – 10:20 Plenary Keynote Session (Ballroom ABCDE) Welcome , Yi Mao, CST Lab Manager, atsec information security; CMUF Overview , Matt Keller, Vice President, Corsec
09:20 |
P01a. Know Who Is Touching Your Stuff: Driving Security Across the Value Chain [30MIN] Edna Conway, Chief Security Officer, Global Value Chain, Cisco Systems |
P01b. Deficient Standards, Complex Certification: Can We Escape the Vicious Circle? [30MIN] Joan Daemen, Principal Cryptographer, STMicroelectronics |
10:20 – 11:00 Networking Break in Exhibits (Hemingway Ballroom)
11:00 – 12:20 Conference Sessions
Certification Programs Track (Ballroom DE) |
General Technology Track (Ballroom C) |
Industry Vertical/Embedded Crypto (Ballroom B) | Quantum-Safe Crypto Track (Ballroom A) |
||||
11:00 |
C11a. Keynote: Assurance Architecture Through Testing [40MIN] Michael Cooper, IT Specialist, NIST |
G11a. Keynote: Building Trust in the Era of Cloud Computing [40MIN] David Gerendas, Group Product Manager, McAfee |
E11a. Keynote: Applied Cryptography and Practical Example [40MIN] Dr. Najwa Aaraj, Senior Vice President, Special Projects, DarkMatter Audio not available. |
Q11a. Keynote: Update on ETSI QSC Standards Activities [20MIN] Mark Pecen, CEO, Approach Infinity |
|||
11:20 |
Q11b. Update on the Quantum Threat, Mitigation Timelines and Managing Quantum Risk [40MIN] Michele Mosca, Institute for Quantum Computing, University of Waterloo & evolutionQ Inc. |
||||||
11:40 |
C11c. Third-Party Security Validation: The Role of FIPS 140-2, Common Criteria, and UC APL in Securing Products [40MIN] John Morris, President, Corsec |
G11c. The 2017 NIST Transition to Stronger Cryptographic Algorithms [40MIN] Allen Roginsky, Mathematician, NIST |
E11c. Hardware Security Requirements for Vehicle-to-Everything Communications [40MIN] William Whyte, Chief Scientist Security Innovation |
||||
12:00 |
Q11d. Quantum Threat…and Quantum Solution [20MIN] Bruno Huttner, Quantum Safe Product Management, ID Quantique SA |
12:20 – 13:20 Lunch in Exhibit Area (Hemingway Ballroom)
13:20 – 14:20 Conference Sessions
Certification Programs Track (Ballroom DE) |
General Technology Track (Ballroom C) |
Industry Vertical/Embedded Crypto (Ballroom B) | Quantum-Safe Crypto Track (Ballroom A) |
||||
13:20 |
C12a. Validating Multiple Cryptographic Modules [20MIN] Steve Ratcliffe, TME, Cisco Systems; Khai Van, Security Tester, Gossamer Security Solutions |
G12a. FIPS as a Vendor—Fitting a Square Peg Into a Round Hole [20MIN] Malcolm Levy, Certification Manager, Check Point Software Technologies |
E12a. Lessons Learned in IoT Threat Modelling [20MIN] Paul Bottinelli, Security Systems Developer, ETAS Canada |
Q12a. NIST Post-Quantum Cryptography Standardization [40MIN] Lily Chen, Mathematician, NIST |
|||
13:40 |
C12b. Rethinking the Definition of the Operational Environment in FIPS 140-2 [20MIN] Kelvin Desplanque, Security Certification Engineer, Cisco Systems |
G12b. FIPS Certification—Tales from the Dev Side [20MIN] Alan Kaye, Director, Compliance Management, Fortinet |
E12b. FIPS 140-2 Cryptography in the IoT [20MIN] Chris Conlon, Software Engineer, wolfSSL |
||||
14:00 |
C12c. Stop doing grunt work – Key to efficiently executing multiple certification efforts [20MIN] Ashit Vora, Co-founder & Laboratory Director, Acumen Security |
G12c. Case Study: Hybrid CM Validation Technology Challenges [20MIN] Steve Taylor, Intel |
E12c. Secure Authentication without Identification [20MIN] Jan Camenisch, IBM Research–Zurich |
Q12c. How to be Ready for Tomorrow’s Quantum Attacks [20MIN] Vladimir Soukharev, Cryptographer, InfoSec Global |
14:20 – 14:40 Networking Break in Exhibits (Hemingway Ballroom)
14:40 – 15:40 Conference Sessions
Certification Programs Track (Ballroom DE) |
General Technology Track (Ballroom C) |
Industry Vertical/Embedded Crypto (Ballroom B) | Quantum-Safe Crypto Track (Ballroom A) |
||||
14:40 |
C13a. Is Common Criteria the New FIPS 140? [40MIN] Anthony Busciglio, Laboratory Director, Acumen Security |
G13a. Panel Discussion: Technology Challenges in CM Validation [60MIN] Moderator: Nithya Rachamadugu, Director, CygnaCom Panelists: Malcolm Levy, Certification Manager, Check Point Software Technologies; Robert Relyea, Principal Software Engineer, Red Hat; Steve Taylor, Federal Technology Specialist, Intel, Névine Ebeid, Principal Engineer, TrustPoint Innovation |
E13a. PKI and FICAM Overview and Outlook [40MIN] Judith Spencer, PMA Chair, Certipath |
Q13a. Preparing Today for Key Management in a Post-Quantum Computing World [40MIN] Tanja Lange, Technische Universiteit Eindhoven; Tony Cox, VP Partners, Alliances and Standards, Cryptsoft Pty Ltd. |
|||
15:20 |
C13c. Certification Process. Are We on the Right Track? [20MIN] Fabien Deboyser, Certification Engineer, Thales e-Security |
E13c. FIPS-140-2 Validation of a NIST SP800-73-4 Conformant Smart Card: The Challenges Ahead [20MIN] Christophe Goyet, VP of Technology, Oberthur Technologies of America |
Q13c. CRYSTALS and Open Quantum Safe [20MIN] Tancrède Lepoint, Computer Scientist, SRI International |
15:40 – 16:00 Networking Break in Exhibits (Hemingway Ballroom)
16:00 – 17:00 Conference Sessions
Certification Programs Track (Ballroom DE) |
General Technology Track (Ballroom C) |
Industry Vertical/Embedded Crypto (Ballroom B) | Quantum-Safe Crypto Track (Ballroom A) |
||||
16:00 |
C14a. Report from Equivalency Working Group [20MIN] Edward Morris, Lab Director, Gossamer Security Solutions; Carolyn French, Manager, Cryptographic Module Validation Program, Communications Security Establishment |
G14a. A Tale of Two Entropy Source Validation Approaches: NIST 800 90B vs. BSI AIS 31 [20MIN] Meltem Sonmez Turan, NIST |
E14a. Overview/Case Study: Validating FIPS 140-2 Security in PIV Credential Cryptographic Modules [20MIN] Roger Butler, Chief Architect, TecSec |
Q14a. Post Quantum Cryptography and the Future of Digital Signatures [20MIN] Florian Caullery, Dark Matter |
|||
16:20 |
C14b. Update on FIPS 140-3 [40MIN] Kim Schaffer, NIST |
G14b. Entropy Estimation Methods for SW Environments in KCMVP [40MIN] Seogchung Seo, National Security Research Institute, Korea; Sangwoon Jang, National Research Institute, Korea; Yewon Kim, Kookmin Security University, Korea; and Yongjin Yeom, Kookmin University, Korea |
E14b. An Executable Secure Mobility Solution using an NFC Crypto Module [40MIN] Richard Schaeffer, CEO, Tocreo Labs |
Q14b. Timing and Side-Channel Countermeasures for Quantum-Safe Cryptography [20MIN] William Whyte, Chief Scientist, Security Innovation |
|||
16:40 |
Q14c. Experience with Quantum Key Distribution [20MIN] Konstantinos Karagiannis, CTO, Security Consulting Practice, BT Americas |
17:00 – 18:20 Welcome Reception in Exhibits (Hemingway Ballroom) Sponsor:
18:20 – 21:00 Dine-Around DC
Enjoy an informal group dinner at one of Arlington’s best restaurants with your ICMC colleagues. Select a restaurant and reserve your seat for a prix-fixe dinner at a group table. Reserve early—seating is limited. On site, you’ll meet your group Wednesday at 18:20 at the ICMC registration desk in the foyer and depart from there.
Thursday, May 18, 2017 |
08:00 – 09:00 Coffee in Exhibits (Hemingway Ballroom) CMUF Face-to-Face Meeting (Conference Services Center—Open to All)
09:00 – 09:40 Conference Sessions
Certification Programs Track (Ballroom DE) |
General Technology Track (Ballroom C) |
Common Criteria Track (Ballroom B) |
Open-Source Crypto Track (Ballroom A) |
||||
Moderator: | Moderator: | Thu Track Sponsor | Moderator: | ||||
09:00 |
C20a. NIST & NIAP Working Together [40MIN] Janine Pedersen, Director, National Information Assurance Partnership (NIAP); Melanie Cook, Operations Lead–STVM, Computer Security Division, NIST |
G20a. How I Learned to Stop Worrying and Love AES-GCM [40MIN] Quentin Gouchet, atsec information security |
R20a. Keynote Presentation [40MIN] Shawn Wells, Chief Security Strategist, Public Sector, Red Hat Audio not available. |
S20a. Keynote: Driving Security Improvements in Critical Open Source Projects [40MIN] Nicko van Someren, CTO, Linux Foundation Audio not available. |
09:40 – 10:00 Networking Break in Exhibits (Hemingway Ballroom)
10:00 – 11:20 Conference Sessions
Certification Programs Track (Ballroom DE) |
General Technology Track (Ballroom C) |
Common Criteria Track (Ballroom B) |
Open-Source Crypto Track (Ballroom A) |
||||
10:00 |
C21a. Update on the Automated Cryptographic Validation Program (ACVP) [80MIN] Apostol Vassilev, Research Lead—STVM, CSD; Barry Fussell, Technical Leader, Cisco Systems; Robert Relyea, Principal Software Engineer, Red Hat; Shawn Geddis, Security & Certifications Engineer, Apple; Simon Vera-Schockner, Architect GCDS, Akamai Technologies; Melanie Cook,, Operations Lead – STVM, CSD, NIST |
G21a. Trusted Cryptographic Modules, Malware and Encryption [40MIN] Steve Schmalz, CISSP Principal Systems Engineer RSA, The Security Division of EMC |
R21a. NIAP Update [40MIN] Diane Hale, NSA |
S21a. Inside the OpenSSL 1.1 FIPS Module Project [40MIN] Mark Minnoch, Technical Account Manager, SafeLogic; Tim Hudson, CTO and Technical Director, Cryptsoft Pty Ltd. Audio not available. |
|||
10:40 |
Session breaks early. |
R21c. Understanding Protection Profiles [40MIN] Lachlan Turner, Founder & Principal Consultant, Ark Infosec Labs Inc. |
S21c. FIPS Certification and the Bouncy Castle Project, or, What do you mean I can’t just do a new release tomorrow? [40MIN] David Hook, Bouncy Castle Audio not available. |
||||
|
11:20 – 11:40 Networking Break in Exhibits (Hemingway Ballroom)
11:40 – 12:40 Conference Sessions
Certification Programs Track (Ballroom DE) |
General Technology Track (Ballroom C) |
Common Criteria Track (Ballroom B) |
Open-Source Crypto Track (Ballroom A) |
||||
11:40 |
C22a. PKCS#11 Goes to 3.0! [40MIN] Valerie Fenwick, Director of Software Engineering, Intel |
G22a. Smartphone Keystores and Key Management: 2017 Edition [40MIN] William Supernor, CTO, Koolspan |
R22a. Commercial Product Assurance: Its Relation to CC [40MIN] Simon Milford, Head of Cyber Security, DNV GL |
S22a. Open Source Validations [40MIN] Chris Brych, Senior Principal Security Analyst, Oracle Audio not available. |
|||
12:20 |
C22c. Revalidation in Response to CVEs—CMUF WG [20MIN] Fabien Deboyser, Thales e-Security |
G22c. The Expanding Role of Hardened Encryption and PKI Management in the Cloud [20MIN] Adam Cason, Director of Product Marketing, Futurex |
R22c. Common Criteria Protection Profile for Trusted Execution Environment [20MIN] Hank Chavers, Technical Program Manager, Global Platform |
S22c. Network Time Synchronization for Cryptographic Protocols [20MIN] Daniel Franke, Akamai Audio not available. |
12:40 – 13:40 Lunch in Exhibit Area (Hemingway Ballroom) Sponsor:
13:40 – 14:40 Conference Sessions
Certification Programs Track (Ballroom DE) |
General Technology Track (Ballroom C) |
Common Criteria Track (Ballroom B) |
Open-Source Crypto Track (Ballroom A) |
||||
13:40 |
C23a. CMVP Inside [20MIN] Carolyn French, Manager, Cryptographic Module Validation Program Communications Security Establishment; Jennifer Cawthra, Program Manager, NIST |
G23a. Fast, Quantum-Resistant Public-Key Solutions for Constrained Devices Using Group Theoretic Cryptography [40MIN] Derek Atkins, CTO, SecureRF |
R23a. CC for Smart Cards and Mobile Security [40MIN] Wouter Slegers, CEO, Your Creative Solutions |
S23a. TLS Panel Discussion [60MIN] Moderator: Tim Hudson, CTO and Technical Director, Cryptsoft Pty Ltd. Panelists: Steve Marquess, OpenSSL; David Hook, Bouncy Castle; Nicko van Someren, CTO, Linux Foundation; Kenneth White, Open Crypto Audit Project |
|||
14:00 |
C23b. Standing With Integrity-Integrity Check Using Random Sampling [20MIN] Renaudt Nunez, IT Security Consultant, atsec information security |
||||||
14:20 |
C23c. Getting Over the Self-Test Hurdle [20MIN] Alan Gornall, Principle Consultant, Rycombe Consulting |
G23c. Control Your Cloud: BYOK is Good, But Not Enough [20MIN] Matt Landrock, CEO, Cryptomathic |
R23c. Improving cPPs with User Participation [20MIN] Quang Trinh, Cisco |
14:40 – 15:00 Networking Break in Exhibits (Hemingway Ballroom, Exhibits Close at 15:00)
15:00 – 16:00 Conference Sessions
Certification Programs Track (Ballroom DE) |
General Technology Track (Ballroom C) |
Common Criteria Track (Ballroom B) |
Open-Source Crypto Track (Ballroom A) |
||||
15:00 |
C24a. FIPS in China? Easier Than the Language! [40MIN] Yuan Xu, atsec information security; Di Li, Senior Consultant, atsec China |
G24a. Quantum Safe PKI Transitions [40MIN] Mike Brown, CTO, ISARA Corporation |
R24a. Panel Discussion: The Move to cPPs [60MIN] Moderator: Kirill Sinitski, Common Criteria Evaluator, CygnaCom CCCEL Canada Panelists: Alan Kaye, Director, Compliance Management, Fortinet; Leo Kool, Senior Security Evaluator, Brightsight; Andy Nissen, Software Development Manager, McAfee, Tony Boswell, Senior Principal Consultant, DNV GL Is the move to cPPs (and the fact that they’re relying more on FIPS for their underpinning) an improvement on the EAL? |
S24a. TLS 1.3 [40MIN] Rich Salz, Senior Architect, Akamai Technologies; Member, OpenSSL Dev Team |
|||
15:40 |
C24c. Malaysian Validation Programs Overview [20MIN], H.A. Rani, CyberSecurity Malaysia |
G24c. Surveying the Physical Landscape [20MIN] Marc Ireland, FIPS Program Manager, UL Verification Services |
S24c. Penetration Testing: TLS 1.2, and Initial Research on How to Attack TLS 1.3 Stacks [20MIN] Alex Moneger, Citrix Systems |
16:00 – 16:20 Networking Break (Foyer)
16:20 – 17:00 Conference Sessions
Certification Programs Track (Ballroom DE) |
General Technology Track (Ballroom C) |
Common Criteria Track (Ballroom B) |
Open-Source Crypto Track (Ballroom A) |
||||
16:20 |
C25a. Australian Validation Programs Overview [40MIN] Simon Reardon, Evaluations Program, Cyber & Information Security Division, Australian Signals Directorate |
G25a. What Type of Module Am I? [40MIN] Yi Mao, CST Lab Manager, atsec information security |
R25a. The Common Criteria—What’s Next? [40MIN] Joshua Brickman, Director, Security Evaluations, Oracle |
S25a. Crypto++: Past Validations and Future Directions [20MIN] Jeffrey Walton, Consultant |
|||
16:40 |
C25b. Towards an International Cryptographic Validation Program; Where Are We Now? [20MIN] Clint Winebrenner, Technical Lead, FIPS Cisco Systems |
S25b. Evolving Practice in TLS, VPNs, and Secrets Management [20MIN] Kenneth White, Security Architecture, Public Cloud, Applied Cryptography Research & Development, Open Crypto Audit Project |
17:00 – 18:00 Cryptographic Module Game Program (Ballroom C)
Come watch three experienced contestants test their FIPS knowledge in a game of trivia related to algorithms, derived testing requirements, entropy, implementation guidance and more. A few members from the audience will be selected to assist the contestants on specific questions and be eligible to win prizes. Your Host: Nick Goble, Technical Marketing Engineer, Cisco |
Friday, May 19, 2017 |
08:00 – 09:00 Coffee (Foyer)
09:00 – 09:40 Conference Sessions
End-User Experience Track (Ballroom E) |
Advanced Technology Track (Ballroom C) |
Common Criteria Track (Ballroom B) |
Crypto Policy & Ethics Track (Ballroom A) |
||||
09:00 |
U30a. Keynote: Cryptographic Standards Acceptance and the User Experience [20MIN] Gordon Bass, Director, Cybersecurity Operations Office, Office of the CIO, U.S. Department of Energy |
A30a. Keynote: Nano-Ciphers, The Challenge of Small-Data Encryption [40MIN] Terence Spies, Chief Technologist, HP Security Voltage |
R30a. Introducing the Dedicated Security Components Protection Profile [20MIN] Shawn Pinet, Senior Security & Certifications Analyst, Gemalto; Shawn Geddis, Security & Certifications Engineer, Apple |
Y30a. Keynote: From Heartbleed to Juniper and Beyond [40MIN] Matthew Green, Johns Hopkins University |
|||
09:20 |
U30b. Updates from the Security Policy and Remote Testing Working Groups [20MIN] Ryan Thomas, Laboratory Manager, Acumen Security |
R30b. FIPS!…I Did It Again [20MIN] Justin Fisher, Booz Allen Hamilton |
09:40 – 10:00 Networking Break (Foyer)
10:00 – 11:20 Conference Sessions
End-User Experience Track (Ballroom E) |
Advanced Technology Track (Ballroom C) |
Common Criteria Track (Ballroom B) |
Crypto Policy & Ethics Track (Ballroom A) |
||||
10:00 |
U31a. Crypto: You’re Doing it Wrong [40MIN] Jon Green, Sr. Director, Security Architecture and Federal CTO, Aruba Networks/HPE |
A31a. A Survey of the Classical and Quantum Cryptanalysis of AES [40MIN] David Cornwell, Lead Engineer, Booz Allen Hamilton |
R31a. Development of CPPs for Full Disk Encryption [20MIN] Garry McCracken, VP, Technology, WinMagic |
Y31a. Autocrypt: E-mail Encryption for Everyone [40MIN] Daniel Kahn Gillmor, Senior Staff Technologist, ACLU Speech, Privacy, and Technology Project |
|||
10:20 |
R31b. Common Criteria Crypto Working Group [20MIN] Mary Baish, NIAP; Fritz Bollman, BSI |
||||||
10:40 |
U31c. What Does Your FIPS Certificate Say? [20MIN] Swapneela Unkule, atsec information security |
A31c. Reducing IoT Ecosystem Exposure to Breaches, Data Theft, and Ruined Reputations: 7 Key Elements for Proactive IoT Security [40MIN] Loren Shade, VP Marketing, Allegro Software |
R31c. Toward Continuous Certification [40MIN] Greg Mclearn, Lightship Security |
Y31c. Encryption and Cybersecurity Policy Under the New Administration [40MIN] Neema Singh Guliani, Legislative Counsel (Privacy and Technology), ACLU |
|||
11:00 |
U31d. Keeping It Valid: Maintenance of FIPS 140-2 Validated Modules [20MIN] Shashi Karanam, Senior Certifications Consultant, Corsec Security |
11:20 – 11:40 Networking Break (Foyer)
11:40 – 12:40 Conference Sessions
End-User Experience Track (Ballroom E) |
Advanced Technology Track (Ballroom C) |
Common Criteria Track (Ballroom B) |
Crypto Policy & Ethics Track (Ballroom A) |
||||
11:40 |
U32a. Panel Discussion: Ask the Labs [60MIN] Moderator: Ryan Horan, Security Test, Validation and Measurement Group, NIST Panelists: Marc Ireland, FIPS Program Manager, UL Verification Services; Yi Mao, CST Lab Manager, atsec information security; Edward Morris, Cofounder, Gossamer Security Solutions; Ryan Thomas Laboratory Manager, Acumen Security; Jonathan Smith, Senior CST Lab Tester, CygnaCom Audio not available. |
A32a. MACSec Security Service FIPS Validation [20MIN] Zhiqiang Wang, Lab Manager, Gossamer Security Solutions |
R32a. Selecting and Maintaining a Crypto Module for ISO 19790 and CC [40MIN] Iain Holness, Common Criteria Evaluator, Security Engineer Cygnacom Solutions |
Y32a. Revisiting Threat Models for Cryptography [40MIN] Bart Preneel, Professor, University of Leuven |
|||
12:00 |
A32b. Usage of SP800-56A in Industry Standard Protocols [20MIN] Michael Powers, Security Assurance Engineer, Leidos |
||||||
12:20 |
A32c. Avoiding Falsely Passing a Device in TVLA Testing [20MIN] Gilbert Goodwill, Senior Manager/DPA Team Lead Rambus–Cryptography Research Division |
R32c. Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications [20MIN] Anthony Apted, CCTL Technical Director, Leidos |
Y32c. Zero Knowledge Doesn’t Mean Zero Ethics [20MIN] Joshua Marpet, SVP, Compliance and Managed Services CyberGRC |
12:40 – 13:40 Lunch (Hemingway Ballroom)
13:40 – 14:40 Conference Sessions
End-User Experience Track (Ballroom E) |
Advanced Technology Track (Ballroom C) |
Crypto Policy & Ethics Track (Ballroom A) |
|||||
13:40 |
U33a. Entropy—A Case of Supply and Demand [20MIN] Richard Moulds, VP Strategy, Whitewood Encryption Audio not available. |
A33a. Storing Cryptographic Keys in Persistent Browser Storage [20MIN] Francisco Corella, Founder & CTO, Pomcor |
Re-set room for Summary Panel Discussion |
Y33a. Thomas Jefferson and Apple versus the FBI [40MIN] Daniel J. Bernstein, University of Illinois at Chicago, USA; Technische Universiteit Eindhoven, Netherlands |
|||
14:00 |
U33b. How Random is Your Random? (Assessing Entropy with SP800-90B) [40MIN] Stephan Mueller, Principal Consultant, atsec information security Audio not available. |
A33b. Efficient Application of Countermeasures for Elliptic Curve Cryptography [40MIN] Vladimir Soukharev, InfoSec Global |
|
||||
14:40 – 14:50 Networking Break (Foyer)
14:50 – 15:50 P34a. Closing Remarks , Nithya Rachamadugu, Director, CygnaCom; Summary Panel Discussion–FIPS and Common Criteria–How They Play Together [60MIN] (Ballroom B)
CC validation requirements can differ from CMVP. Should products be designed around CMVP needs or CC? ICMC will end with a plenary session panel of authoritative leaders in a discussion on a topic which was selected by ICMC participants by general survey. Moderator: Steve Weingart, Manager of Public Sector Certifications, Aruba, an HP Enterprise Company Panelists: Erin Connor, Director, EWA-Canada; Tammy Green, Senior Principal Security Architect, Symantec; Laurie Mack, Director Security & Certifications, Gemalto; Bill Shelton Director, Federal Certifications and Policy, Juniper Networks
For access to this content, please join our email list. We take your privacy seriously. We never sell lists or email addresses.
Our Simple Mailing List Policies: We hate spam. Unless you authorize it or we're compelled by law, we won't share your mail address with anyone else, ever. We value your information. We'll keep it as secure as we can. We will send mail at reasonable intervals, which is at most a few times a month and definitely not once a day. We'll do our best to meet all applicable privacy, spam, and other relevant rules and regulations. If you think we've failed to do that, please contact us so we can investigate and correct as required.