May 8-11, 2018 | Shaw Centre | Ottawa, Ontario, Canada
Sticky Post
3
Dec

Sedial eiusmod tempor

Lorem ipsum dolor sit amet, consectetur adipisici elit, sed eiusmod tempor incidunt ut labore et dolore magna aliqua. Idque Caesaris facere voluntate liceret: sese habere. Magna pars studiorum, prodita quaerimus. Magna pars studiorum, prodita quaerimus. Fabio vel iudice vincam, sunt in culpa qui officia. Vivamus sagittis lacus vel augue laoreet rutrum faucibus. Nihilne te nocturnum...
Read More
12
Sep

Topics: Crypto Policy and Ethics

Cryptographic systems face evolving threats including compromised end systems, key management vulnerabilities, cryptographic backdoors, and powerful kleptographic and state-sponsored attacks. We’ll discuss how designers, testing labs, and end-users should respond.
12
Sep

Topics: End-User Experience

We’ve expanded content for organizations that rely on cryptographic security with information on selecting the right module, the value of certification, current vulnerabilities, and administrative issues.
12
Sep

Topics: Quantum-Ready Crypto

Many approved algorithms can be easily broken by theoretical quantum computers. We’ve scheduled a day’s worth of content focused on this emerging threat, and the transition to standardized quantum-ready algorithms.
12
Sep

Topic: Common Criteria

The crypto certification community is widely involved in Common Criteria, so ICMC provides a great opportunity for discussions on the prospect for CC in Crypto, and efforts to bring CC to broader user base.
12
Sep

Topics: Open Source Cryptography

OpenSSL is the most widely used encryption software library in the world, but community efforts are required to fend off threats to its security and maintain its certification. We’ll cover efforts to audit and improve the security of OS encryption.
12
Sep

Topics: Cryptographic Technology

Taking certification requirements as a starting point, ICMC will survey a range of technological solutions covering entropy sources, PKI management, physical security, and countermeasures against software and hardware attacks.  We’ll present case studies in cryptographic module development and validation. 
12
Sep

Topics: Global Validation

ICMC will continue its strong focus on validation programs with reports from both North American and international verification bodies, efforts toward international validation standards, and new approaches to automated validation.
16
May

Presentation Buttons

[button size=”large” color=”blue” style=”none” new_window=”false” link=”https://icmconference.org/?page_id=5938″]ICMC17 Archive (Password)[/button] [button size=”medium” color=”red” style=”none” new_window=”false” link=”https://icmconference.org/?page_id=5938″]Dine-Around Reservations[/button]
26
Apr

The Big Issue: ICMC Summary Panel Discussion

Speakers suggested topics and ICMC participants voted their preference. The annual Summary Panel Discussion will cap off the conference on Friday, May 19 at 14:50. The topic selected by conference participants this year is: FIPS and Common Criteria–How They Play Together. NIAP/CC validation requirements can differ from CMVP. Should products be designed around CMVP needs or...
Read More