September 18-20, 2024 | DoubleTree by Hilton, San Jose, California
Sticky Post
3
Dec

Sedial eiusmod tempor

Lorem ipsum dolor sit amet, consectetur adipisici elit, sed eiusmod tempor incidunt ut labore et dolore magna aliqua. Idque Caesaris facere voluntate liceret: sese habere. Magna pars studiorum, prodita quaerimus. Magna pars studiorum, prodita quaerimus. Fabio vel iudice vincam, sunt in culpa qui officia. Vivamus sagittis lacus vel augue laoreet rutrum faucibus. Nihilne te nocturnum...
Read More
15
Mar

Topics: End-User Experience

We’ve expanded content for organizations that rely on cryptographic security with information on selecting the right module, the value of certification, current vulnerabilities, and administrative issues.
15
Mar

Topics: Post-Quantum Crypto

Many approved algorithms can be easily broken by theoretical quantum computers. We’ve scheduled a day’s worth of content focused on this emerging threat, and the transition to standardized quantum-ready algorithms.
15
Mar

Topics: Random Bit Generators

We’ll take a close look at issues related to the design and validation of entropy sources and random bit generators, including new 800-90B requirements.
15
Mar

Topics: Open Source Cryptography

OpenSSL is the most widely used encryption software library in the world, but community efforts are required to fend off threats to its security and maintain its certification. We’ll cover efforts to audit and improve the security of OS encryption.
15
Mar

The Big Issue: ICMC Summary Panel Discussion

Speakers suggested topics and ICMC participants voted their preference. The annual Summary Panel Discussion will cap off the conference on Friday, May 19 at 14:50. The topic selected by conference participants this year is: FIPS and Common Criteria–How They Play Together. NIAP/CC validation requirements can differ from CMVP. Should products be designed around CMVP needs or...
Read More
15
Mar

Topics: Cryptographic Technology

Taking certification requirements as a starting point, ICMC will survey a range of technological solutions covering entropy sources, PKI management, physical security, and countermeasures against software and hardware attacks.  We’ll present case studies in cryptographic module development and validation. 
15
Mar

Topics: Global Validation

ICMC will continue its strong focus on validation programs with reports from both North American and international verification bodies, efforts toward international validation standards, and new approaches to automated validation.
16
May

Presentation Buttons

[button size=”large” color=”blue” style=”none” new_window=”false” link=”https://icmconference.org/?page_id=5938″]ICMC17 Archive (Password)[/button] [button size=”medium” color=”red” style=”none” new_window=”false” link=”https://icmconference.org/?page_id=5938″]Dine-Around Reservations[/button]
25
Apr

Plan Your Visit: Who Would You Like to Meet With?

ICMC is an opportunity for face-to-face networking from hundreds of international participants. Take a moment to review the list of registrants and make note of colleagues to meet. We’ve made the current list of participants available at this link.