International Cryptographic Module Conference 2021
Allegro Software at ICMC21
September 1-3 | Maryland, USA
Allegro Software’s VP of Marketing, Loren Shade, will present at the ICMC21 on September 2nd at 13:30. Loren’s presentation “The IoT Cybersecurity Improvement Act and FIPS Validation (E22A) will focus on the US government’s regulation, FIPS validation, and what this means for IoT device manufacturers.
- What are the NIST and industry documents associated with the Act (it is far more than the 6 documents listed in most press releases)?
- How does FIPS validation fit into the Cybersecurity Improvement Act?
- What is the overall timeline for implementation?
- Can this work with current development processes?
- How does this relate to IoT Platforms (AWS, Azure, Google, others)?
The International Cryptographic Module Conference is produced by the Certification Conferences division of Cnxtd Event Media Corp., a leading producer of international events focused on ICT Product Certification.
This year, industry leaders will come together to address the unique challenges faced by those who develop, produce, test, specify, and use cryptographic modules, with a strong focus on standards such as FIPS 140-3, ISO/IEC 19790, eEIDAS, and Common Criteria.
ICMC21 will survey the progress of FIPS 140-3, discuss the effect on current certifications, and report on the progress of the Automated Cryptographic Validation Program.
Cryptography solutions for military comm devices including FIPS validation, ACE software cryptography & custom validation with small code footprint.
As the number of Internet of Things (IoT) devices in the world grows exponentially, security becomes increasingly critical to businesses. Cybersecurity has emerged as the most necessary form of protection. Businesses need to stay on top of the newest trends to safeguard themselves, their clients, and their intellectual property from cyber attacks and the damage they can cause.
One of the world’s leading medical technology companies required sophisticated cryptography solutions for their connected hospital beds.
Let’s Talk IoT Security
Implementing IoT device security can be a significant and costly challenge. Let us help you by sharing our proven framework for integrating a proactive security approach into your design, minimizing the need for programming resources and reducing development costs and time to market
Schedule a one-on-one web conference with us today to discuss your embedded IoT security needs.