Showcase Your Company at the Annual Convergence of Industry Leaders in Commercial Cryptography
Total Page:16
File Type:pdf, Size:1020Kb
Showcase Your Company at the Annual Convergence of Industry Leaders in Commercial Cryptography Almost 300 commercial cryptography professionals from 22 countries came together last May in Ottawa for the International Cryptographic Module Conference—the industry’s leading forum for data security based in commercial encryption. For 2017, we’re building on that success with additional events and up-to-the-minute sessions and content and we’re continuing our in-depth coverage of cryptographic policies, standards, technologies, implementation, and markets. Reserve your place now at this gathering of professionals who develop, test, certify, specify, procure, and rely on these technologies. NEW Tracks Added to A Unique Promotion Conference Agenda Opportunity The conference at ICMC includes over Promotion opportunities are 70 presentations in nine tracks: available for leading companies offering products, technologies and General Technology: Tools and The International Cryptographic techniques relating to cryptographic services in this evolving field. It’s a modules Module Conference is a growing unique opportunity to showcase forum for global expertise in your company to an engaged and Advanced Technology: High-level commercial cryptography. At the technology issues, or special-focus highly responsive audience. The subject matter fifth annual edition of the event features an efficient three-day conference in May, industry leaders participation format that respects Certification Programs: Issues from over 20 countries will convene related to the CMVP, government your busy schedule. programs and global certification to address the unique challenges faced by those who produce, use, In a Central Location User Experience: CM products, and test cryptographic modules, certifications, and vulnerabilities for Located in a beautiful, walkable city with a strong focus on standards organizations that rely on crypto environment with restaurants, security such as FIPS 140-2, ISO/IEC 19790, shopping and other sites, the and Common Criteria. The Westin Arlington NEW Open-Source Cryptography: conference helps to foster a focused, Efforts to audit, improve and certify Gateway is near the security of OS crypto projects organized community of users. central Washington, ICMC covers the technical design For More Information: DC, with Metro Industry Vertical/Embedded Crypto: problems to meet international Bill Rutledge, Project Director The application of embedded connections to the [email protected] encryption in specific industry verticals standards, with a particular entire area, and +1 212-866-2169 emphasis on the challenges posed NEW Quantum-Safe Crypto: The minutes from Dulles as technology advances with respect quantum computing threat and efforts and Reagan to the current standards. to transition to quantum-safe National Airports, Located in beautiful Arlington, with algorithms ICMC reviews technical topics providing direct easy local and international access Common Criteria: Issues related to underlying the implementation of a connections to all Common Criteria and NIAP-compliant cryptographic module including major US and products physical security, key management, international cities, Major NEW Crypto Policy and Ethics: side-channel analysis, participating federal agencies are Balancing privacy rights and cryptographic algorithm testing, nearby including NIST, NIAP, NSA, government access to encrypted standardization (FIPS 140-2, DoD, GSA, and others. information ISO/IEC 19790), validation programs and more. Three Days of Comprehensive, Independent, Peer-Reviewed Industry Information Founded on Global Standards and Certification Hundreds of industry professionals Participants from Across the Convenient Two-Day Exhibit Participating Organizations will participate at ICMC. They’re Entire Industry Value Chain Schedule Acumen Security * Advanced Data Security * AEGISOLVE * drawn to the highly-rated Who Attends: ICMC brings together Allegro Software * Apple * Applus Laboratories * Approach Over six hours of conference presentations, and high- professionals involved with data Infinity * Ark Infosec Labs * Aruba, a Hewlett Packard “Very good, security based in commercial dedicated break, lunch, Enterprise company * Asgard Cyber Assurance * atsec level speakers. Previous topics information security corporation * Austin Sigma * BAE widened encryption, especially those who and reception time takes include: Systems * Battelle * BlackBerry * Blue Coat Systems * Booz participation from develop, manufacture, test, specify or place in the exhibit area. Allen Hamilton * Bouncy Castle/Crypto Workshop * Brightsight industry and Advanced Technology: Quantum Computing Current use certified commercial off the shelf BV * Brocade * CA Technologies * Canadian Federal government “Good Research and Standards for Quantum Safe cryptographic modules. Key Monday, May 15 Employee * Canadian Federal Goverment * CGI Global Labs * agencies,improved presentations. Cryptography * Update on the Quantum Threat, participants include laboratories and Cisco Systems * Citrix Systems * COACT * Communications quality of talks.” Excellent Lab Managers Meeting Mitigation, and Relevant Timelines * Quantum Safety government departments responsible Security Establishment * Computer Sciences Canada * networking Corsec * Corsec Security * Crypto4A * Cryptomathic * in Certified Cryptographic Modules Certification: for testing cryptographic modules; Tuesday, May 16 opportunities.” Cryptsoft Pty Ltd * CSC * Cygnacom Solutions * Dark Matter Overview of ISO 19790:2012 Revision * CAVP and stakeholders in standards Lab Manager’s Meeting (Cont’d) LLC * Department of Defense * ECSEC Laboratory * the Upcoming Changes with Algorithm Testing * FIPS development; leading members of the 08:00 Registration Embassy of Romania in Ottawa * Entrust Datacard * Epoche Inside * Automated Run-Time Validation for academic community; embedded 09:00 Pre-Conference Workshops & Espri, SLU * evolutionQ * EWA-Canada * F5 Networks * Federal Office for Information Security * Finnish Cryptographic Modules * Introduction on the systems OEMs; and the side channel 12:30 Workshops (Cont’d) research community. Communications Regulatory Authority * Fortinet Technologies Commercial Cryptography Scheme in China Industry 14:00 Exhibit Move In Begins Vertical/Embedded Crypto: Security Credential I* Gemalto * Giesecke & Devrient 17:00 Workshops Adjourn America * GlobalPlatform * Management System (SCMS) Applications Beyond ICMC16 Registrants by Gossamer Security Solutions * Vehicle to Vehicle Safety * Connected Car Security in Organization Type Wednesday, May 17 Government of Canada * Graphite the V2X Infrastructure * General Technology: 08:00 Registration Software * Hewlett Packard Modern Crypto Systems and Practical Attacks * What Enterprise * Hewlett-Packard * HP 09:00 Plenary Keynotes is My Cryptographic Boundary? * Let's Talk About Security Voltage * HyTrust * IBM * 10:20 Networking Break, Exhibits Icon Security Limited * ICSA Labs * Physical Security * An Overview of OpenSSL * Open Auditing OpenSSL * LibreSSL * Panel Discussion: InfoGard Laboratories (a UL 11:00 Conference Tracks: Certification Company) * Information Systems The Future of Security Common Criteria and Programs, General Tech, Security Bureau * Information Crypto: Cryptography and the Common Criteria in Embedded Crypto, Quantum- Technology Security Center * Exhibitors and sponsors showcase Canada * Network Device Collaborative Cryptographic Safe Crypto InfoSec Global & Asgard Cyber Module * An Update from the CCUF Crypto Technical 12:20 Lunch in Exhibit Area Assurance * Institute for Quantum leading technologies and services Working Group End-User Experience: Keynote: 13:20 Conference Tracks (Cont’d) Computing, U. of Waterloo & Worlds Collide—Are We Ready for Security at Warp ! CM Developer 111 17:00 Welcome Reception in Exhibits evolutionQ * Integral Memory * Intel Corporation * IPA * Irdeto Canada * ISARA Corporation * Speed? * The Pros and Cons of Using an Embedded Accredited Laboratory 60 18:20 Dine-Around DC ! Juniper Networks * KEMP Technologies * Kookmin University FIPS Module vs. Validating an Entire Product * How ! Government Org/Program 22 * Koolspan * Leidos * Lembaga Sandi Negara of Republic Much is My Certification Really Worth—Keeping Thursday, May 18 Indonesia * Library of Parliament * Lightship Security * ! Support Equip/Tools 19 Standards Relevant in an Evolving World 08:00 Coffee in Exhibits, CMUF Face- Microsoft * mils electronic gmbh&cokg * Motorola Solutions * ! CM End-User 17 to-Face Meeting National Security Research Institute * NIAP * NIST * NSA/IAD Participating Countries ! Consultant 15 09:00 Conference Tracks: Certification * NXP * OATH * Oberthur Technologies * Oracle Corp. * ! Other 39 Programs, General Tech, Oracle Hungary * PCI Security Standards Council * PCI SSC * PrimeKey Labs * PrimeKey Solutions AB * PwC * Rambus Total 283 Common Criteria, OS Crypto 12:40 Lunch in Exhibit Area Cryptography Research * Red Hat * Riscure * Rockwell Collins * RSA, The Security Division of EMC * Rycombe 13:40 Conference Tracks (Cont’d) Presented by CMUF Consulting * SafeLogic * Samsung Research America * 15:00 Exhibits Close Security Innovation * Security Journey * SERMA SAFETY & The Cryptographic Module User Forum 17:00 Cryptographic Module Game SECURITY * Siemens * SNB S.r.l. * SPYRUS * Standards (CMUF) provides a voice and Program Council of Canada * STMicroelctronics / GlobalPlatform * communications channel between the Synopsys