
International Cryptographic Module Conference 2025
April 7-10, 2025 | Marriott Downtown at CF Eaton Centre, Toronto, Ontario
Allegro Software is a SILVER Sponsor of ICMC25, the premier forum for the global commercial cryptography community.
Allegro Software at ICMC25
Key topics at this year’s event
- Post-Quantum Preparedness – Transitioning enterprises to quantum-resistant encryption.
- Random Bit Generators & Entropy – Designing and validating entropy sources.
- Post-Quantum Cryptography – Hardware/software integration of PQ cryptography.
- Open-Source Cryptography – Security audits and certification of OS crypto projects.
- Implementing Cryptographic Cybersecurity – Enterprise security, certifications, and vulnerabilities.
- Embedded/IoT Cryptography – Secure encryption for connected devices, networks, and payments.
- Certification Programs – Government and industry-led cryptographic validation programs.
- Cryptographic Technology – Latest advancements in cryptographic modules.

Featured Allegro Speaker Sessions
Unlocking Cyber Resilience with SBOMs/CBOMs – Understanding Their Strategic Value and Preparing for PQC (C21a)
April 9, 2025 | 11:00 AM | Loren Shade
As quantum computing advances, maintaining Software Bills of Materials (SBOMs) and Cryptographic Bills of Materials (CBOMs) becomes essential. These inventories provide visibility into software and cryptographic components, helping organizations manage vulnerabilities and prepare for post-quantum cryptography. This session highlights how SBOMs and CBOMs can strengthen compliance, streamline response, and give organizations a strategic edge in preparing for what’s next.
IoT in the Quantum Crosshairs: A FIPS-Guided Defense Strategy (E30c)
April 10, 2025 | 10:00 AM | Loren Shade
The Internet of Things (IoT) faces a growing threat from quantum computing advancements. Allegro’s Loren Shade will present a comprehensive defense strategy based on FIPS validation standards to safeguard IoT ecosystems against quantum attacks. This session will explore:
- Weaknesses in today’s IoT security and their vulnerabilities to quantum computing.
- NIST’s newly released post-quantum cryptography standards and their implications for IoT security.
- Immediate steps IoT device manufacturers can take to future-proof their products.
Featured Allegro Speaker Session with Loren Shade

Unlocking Cyber Resilience with SBOMs/CBOMs – Understanding Their Strategic Value and Preparing for PQC (C21a)
April 9, 2025 | 11:00 AM | Loren Shade
As quantum computing advances, maintaining Software Bills of Materials (SBOMs) and Cryptographic Bills of Materials (CBOMs) becomes essential. These inventories provide visibility into software and cryptographic components, helping organizations manage vulnerabilities and prepare for post-quantum cryptography. This session highlights how SBOMs and CBOMs can strengthen compliance, streamline response, and give organizations a strategic edge in preparing for what’s next.
IoT in the Quantum Crosshairs: A FIPS-Guided Defense Strategy (E30c)
April 10, 2025 | 10:00 AM | Loren Shade
The Internet of Things (IoT) faces a growing threat from quantum computing advancements. Allegro’s Loren Shade will present a comprehensive defense strategy based on FIPS validation standards to safeguard IoT ecosystems against quantum attacks. This session will explore:
- Weaknesses in today’s IoT security and their vulnerabilities to quantum computing.
- NIST’s newly released post-quantum cryptography standards and their implications for IoT security.
- Immediate steps IoT device manufacturers can take to future-proof their products.
Join Allegro Software at ICMC25 and be part of the conversation shaping the future of cryptographic security.
IoT Security Resources
Safeguarding Patient Data in Healthcare IoT Ecosystems
All types of Internet of Things (IoT) devices are under attack. They are routinely recruited as unwitting members of botnets used for Distributed Denial of Service (DDOS) attacks, hosting various malware, and extracting sensitive data. Why are hackers drawn to these...
FIPS Validation: The Key to Medical Device Security
FIPS validation is crucial for securing medical devices, a key concern for healthcare technology. Get key insights on IoMT requirements for implementing cryptography and more on Embedded Computing Design. This insightful article delves into the importance of adhering...
IoMT Devices Security: Ensuring Patient Safety & Privacy
Dive into the critical aspect of securing Internet of Medical Things (IoMT) devices, a cornerstone of healthcare innovation, in our insightful article by Loren Shade on embeddedcomputing.com. This article sheds light on the unique risks that IoMT devices face,...
Let’s Talk IoT Security
Implementing IoT device security can be a significant and costly challenge. Let us help you by sharing our proven framework for integrating a proactive security approach into your design, minimizing the need for programming resources and reducing development costs and time to market
Schedule a one-on-one web conference with us today to discuss your embedded IoT security needs.