International Cryptographic Module Conference 2021
Allegro Software at ICMC21
September 1-3 | Maryland, USA
Allegro Software’s VP of Marketing, Loren Shade, will present at the ICMC21 on September 2nd at 13:30. Loren’s presentation “The IoT Cybersecurity Improvement Act and FIPS Validation (E22A) will focus on the US government’s regulation, FIPS validation, and what this means for IoT device manufacturers.
- What are the NIST and industry documents associated with the Act (it is far more than the 6 documents listed in most press releases)?
- How does FIPS validation fit into the Cybersecurity Improvement Act?
- What is the overall timeline for implementation?
- Can this work with current development processes?
- How does this relate to IoT Platforms (AWS, Azure, Google, others)?
The International Cryptographic Module Conference is produced by the Certification Conferences division of Cnxtd Event Media Corp., a leading producer of international events focused on ICT Product Certification.
This year, industry leaders will come together to address the unique challenges faced by those who develop, produce, test, specify, and use cryptographic modules, with a strong focus on standards such as FIPS 140-3, ISO/IEC 19790, eEIDAS, and Common Criteria.
ICMC21 will survey the progress of FIPS 140-3, discuss the effect on current certifications, and report on the progress of the Automated Cryptographic Validation Program.
One of the world’s leading medical technology companies required sophisticated cryptography solutions for their connected hospital beds.
President Biden has issued an executive order on cybersecurity, but some experts believe it’s missing critical components. Find out how your IoT security could be affected.
New DNS vulnerabilities have impacted at least 100 million IoT devices allowing hackers to target devices offline or to take control over them.
Let’s Talk IoT Security
Implementing IoT device security can be a significant and costly challenge. Let us help you by sharing our proven framework for integrating a proactive security approach into your design, minimizing the need for programming resources and reducing development costs and time to market
Schedule a one-on-one web conference with us today to discuss your embedded IoT security needs.