Showcase Your Company at the Annual Convergence of Industry
Total Page:16
File Type:pdf, Size:1020Kb
Sponsorship/Exhibit Prospectus Showcase Your Company at the Annual Convergence of Industry Leaders in Commercial Cryptography Almost 400 commercial cryptography professionals from 25 countries came together last May for the International Cryptographic Module Conference—the industry’s leading forum for data security based in commercial encryption. For 2020, Reserve we’re building on that success with additional events and up-to-the-minute sessions and content and we’re continuing our in- depth coverage of cryptographic policies, standards, technologies, implementation, and markets. Reserve your place now at Your Space this gathering of professionals who develop, test, certify, specify, procure, and rely on these technologies. Today standards such as FIPS 140-3, ISO/IEC Nine Tracks Cover the Industry 19790, eEIDAS, and Common Criteria. The conference at ICMC includes ICMC reviews technical issues over 90 presentations in nine tracks: underlying cryptographic April 28-May 1 implementation including physical General Technology: Hyatt Regency Tools and techniques relating to security, key management, side- Bethesda, Maryland, USA cryptographic modules The coming year will see widespread channel analysis, open-source changes in commercial cryptography: development, algorithm testing, Advanced Technology: The highly-anticipated FIPS 140-3 quantum threats, embedded High-level technology issues, or special-focus subject matter standard for cryptographic modules applications, standardization, validation becomes effective in late 2020. At the programs, government policy, same time, European regulators are professional ethics, and more.. Certification Programs: Issues related to the CMVP, moving forward with independent government programs and global A Unique Promotion Opportunity certification cryptographic standards. Interest in open source solutions has greatly Promotion opportunities are available End-User Experience: expanded. And legacy systems are for leading companies offering CM products, certifications, and vulnerabilities for organizations that under a growing threat as the need for products, technologies and services in rely on crypto security quantum-resistant algorithms increases this evolving field. It’s a unique opportunity to showcase your company Open-Source Cryptography: each year. In the face of these and other Efforts to audit, improve and certify changes, hundreds of cryptographic to an engaged and highly responsive the security of OS crypto projects professionals will reconvene in audience. The event features an Washington DC for ICMC20. The efficient three-day participation format Industry Vertical/Embedded conference will survey the new FIPS that respects your busy schedule. Crypto: The application of embedded encryption in specific 140-3 standard, discuss the effect on industry verticals With Easy Access to current certifications, and report on the Quantum-Ready Crypto: progress of the Automated Metro DC The quantum computing threat and Cryptographic Validation Program. efforts to transition to quantum-safe The Hyatt Regency is algorithms Three days of presentations will survey located above the Red the open source cryptographic metro line, offering Random Bit Generators: Issues related to the design and protocols that power the Internet and easy access to validation of entropy sources and the cutting-edge post-quantum crypto landmarks, museums, random bit generators Located in Bethesda, Maryland with work that will insure future security. At restaurants and shops access to the best of the DC area. PCI ICMC20 over 400 industry leaders throughout the Updates on Payment Card Industry SW and HW crypto security from 27 countries will come together to Washington, DC area. standardsIincluding PCI-PTS, PCI- address the unique challenges faced by Over 600 restaurants, boutiques, and SPoC those who develop, produce, test, shops are within walking distance. specify, and use cryptographic modules, with a strong focus on www.ICMConference.org Three Days of Comprehensive, Independent, Peer-Reviewed Industry Information Founded on Global Standards and Certification ICMC participants are drawn to ICMC19 Participating Countries Convenient Two-Day Exhibit Schedule Participating Organizations “My favorite bits are the networking, the highly-rated conference Acumen Security • Advanced Data Security, LLC • AEGISOLVE • Over seven hours of Aerospace Corporation • Akamai Technologies / OpenSSL • meetings with presentations. Previous topics: dedicated break, lunch, Allegro Software• Angelus Consulting Group Inc. • Apple Inc. • partners, labs, Plenary Sessions: CMUF Update Digital Disruption and the Implications for Apricorn • Aruba Networks • Aruba, a Hewlett Packard consultants. I also Cybersecurity and Cryptography • What’s Next for Cryptography? • How CSE and reception time takes Enterprise company • Assured Crypto Inc. • atsec Information learned a lot!” Balances Privacy and Innovation in the Public and Private Sectors • Can Australia • Belgium • Canada • China • Security Corp. • AWS • BAE Systems AI • BaishanCloud • Booz Certification Keep Up With the Pace of Modern Development? Advanced Croatia • Czech Republic • France • Technology: Lightweight Post-Quantum Crypto: An Oxymoron • Permutation- place in the exhibit area. Allen Hamilton • Brightsight • Brocade Communications • CA based cryptography • Sizing Up the Threshold: Challenges and Opportunities Germany • Israel • Italy • Japan • Mexico • Technologies • Canonical • Catalone IT Security Inc. • Certified in the Standardization of Threshold Schemes for Cryptographic Primitives Netherlands • Portugal • South Korea • Spain Monday, April 27 InfoSec Conference • CGI • Check Point Software Technologies • The Future of HSMs and New Technology for Hardware Based Security • Sweden • Switzerland • Taiwan • Turkey • Lab Managers Meeting • Chinese Academy of Sciences • CIENA • Cisco Systems, Inc. • Solutions • The Future of HSMs and New Technology for Hardware Based Ukraine • United Arab Emirates • United CNXTD Event Media Services • COACT • Communication Security Solutions • The Future of HSMs and New Technology for Hardware Kingdom • United States Security Establishment • Corsec • Crypotsoft • Crypto Based Security Solutions • The Future of HSMs and New Technology for Tuesday, April 28 Hardware Based Security Solutions Certification Programs: Certification Workshop/Legion of the Bouncy Castle • Crypto4A • Track Keynote: Increasing the Value of Certifications to the End-User •CMVP Uniting the Industry Value Chain Lab Manager’s Meeting (Cont’d) Cryptomathic Inc. • Cryptsoft Pty Ltd • Crystal Group • CSC (a Programmatic Update • NIAP Update •Panel Presentation: Update on the Who Attends: ICMC brings together DXC.TEchnology company) • CygnaCom Solutions • Dark Matter Automated Cryptographic Validation Program (ACVP) • Mandating CMVP for professionals involved with data security 08:00 Registration • DEKRA Testing and Certification, S.A.U. • Dell • Department of NIAP Evaluations Panel Presentation • NIST and NIAP Working Together • based in commercial encryption, especially 09:00 Pre-Conference Workshops Nation Defence (Canada) • DNV GL• DXC Technology • ECSEC Revalidation in response to CVE Working Group •Touch the Cloud: Closing the Laboratory Inc. • Electronics and Telecommunications Research FIPS Validation Gap • Panel Discussion: ACVP—How It Will Change the Way those who develop, manufacture, test, 12:30 Lunch You Work • ACVP Client Integration for FIPS Algorithm Testing and Runtime specify or use certified commercial off the Institute(ETRI) • Entrust Datacard • Envieta Systems LLC • Crypto Assessment • Realigning (Not Re-inventing!) the Wheel: Applying a shelf hardware, software, and hybrid 13:30 Pre-Conference Workshops Epoche and Espri (a Dekra company) • ETRI • evolutionQ Inc • Composition Model to FIPS 140-2 Validation • In FIPS 140-2 Validations, Why cryptographic modules. Key participants EWA Canada • EYL Inc. • F5 Networks, Inc • FAU and So Much Redundant Data Redundancy in FIPS 140-2 Validations? • Your include laboratories and government Wednesday, April 29 PQSecure Technologies • FMV • Fornetix • G+D Mobile Security Creative Solutions • O-TTPS Certification as a Companion to CMVP and departments responsible for testing • Galois • Gemalto • George Mason University • Gossamer Common Criteria • CAVP/CMVP Requirements from 800-90B • IG Updates: 08:00 Registration Security Solutions, Inc. • Government of Canada • Grupo Salinas Chasing the Moving • TOO MANY CERTIFICATIONS! Industry cryptographic modules; stakeholders in Vertical/Embedded Crypto: Industry Vertical/Embedded Crypto Track standards development; leading members of 09:00 Plenary Keynotes • Hewlett Packard Company • HP Inc. • HST Systems and Keynote: Embedded Encryption and Blockchain Technologies for IoT Security the academic community; embedded 10:30 Networking Break, Exhibits Technology INC • Huawei Technologies • IBM • IBM Research • •"FIPS 140-2 Inside" - You're (probably) doing it wrong •IoT Security - GAME Icon Security • ID Quantique • IDEMIA • Independent Consultant systems OEMs; and the side channel Open OF TRUST •FIPS, IoT Medical Devices and the DoD/VA•FIPS 140-2 research community. Participating federal • Information Systems Security Bureau • Information Technology Perspectives on IoT Devices in a Blockchain Setting •Secrets of Crypto agencies include CSEC, NIST, NIAP, NSA, 11:15 Conference Tracks Security Center • Information-technology Promotion Agency, Technology Revealed for Enhanced ICS Cybersecurity