The Intl Cryptographic Module Conference (ICMC) Program Committee invites vendor-neutral, high-impact presentations from thought leaders across the cryptographic ecosystem—including ICT product developers, researchers, testing labs, government bodies, and end-users. Speaker proposals are due November 24. Don’t miss your opportunity to shape the dialogue at this pivotal industry event.
April 20-23, 2026 | Renaissance Arlington Capital View
Arlington, Virginia, USA
ICMC26 continues the call for global action, focusing on the theme: Building Trust in Transition: The New Era of Cryptographic Certification. The ICMC Program Committee is especially interested in speaker proposals that address this theme. We’re looking for high-quality vendor-neutral proposals for conference presentations from industry professionals who have experience with commercial cryptography.
ICMC is part of the Intl Cryptographic Module Series, which includes:
PQ Cyber Day
An Enterprise Action Plan for the Race Against the Global Quantum Deadline
April 20 | Renaissance Arlington Capital View
This optional special-focus event will help you prepare now for the threat posed by future quantum computers. Key topics include: Understanding the threat and projected timelines; assessing current encryption vulnerabilities; transitioning to standardized quantum-resistant cryptography; creating effective policies and procedures; ensuring system resilience and backups; engaging with vendors and third-party suppliers; educating team members and stakeholders; complying with regulatory requirements. This special-focus event will include important, actionable information for anyone concerned with cybersecurity in a data-dependent enterprise.
Crypto Infrastructure Day
Standards for Trust, Key Management, and Secure Operations
April 20 | Renaissance Arlington Capital View
As cyber regulations tighten and encryption moves to the core of compliance, organizations must ensure their cryptographic infrastructure is both secure and interoperable. Crypto Infrastructure Day brings together experts from government, industry, and standards bodies to examine the technologies that underpin trusted systems: Public Key Infrastructure (PKI) for digital trust, PKCS #11 for secure cryptographic operations, and KMIP for enterprise key lifecycle management. Attendees will gain practical insight into how these standards work together to protect sensitive data, enable regulatory compliance, and support modern architectures across cloud and hybrid environments. From certificate authorities to key management servers to hardware security modules, this one-day event delivers a comprehensive view of how to build, manage, and modernize cryptographic infrastructure at scale.
We are seeking:
FRONT-LINE PROFESSIONALS
We prefer presentations from the ICT product developers, especially the engineering and research community, government organizations, procurers, deployers, integrators, administrators, and end-users.
STRONG TOPIC FOCUS
We focus on cybersecurity based on commercial encryption for those who develop, manufacture, test, specify or use commercial products.
NEUTRAL CONTENT
We showcase vendor-neutral, real-world experience from front-line product developers, testers, specifiers, and integrators. Product vendors are encouraged to recruit clients and partners who are front-line implementers as presenters.\