{"id":3221,"date":"2014-11-20T17:11:00","date_gmt":"2014-11-20T16:11:00","guid":{"rendered":"https:\/\/webdev.atsec.us\/?p=3221"},"modified":"2024-07-22T17:14:32","modified_gmt":"2024-07-22T15:14:32","slug":"the-second-international-cryptographic-module-conference","status":"publish","type":"post","link":"https:\/\/webdev.atsec.us\/the-second-international-cryptographic-module-conference\/","title":{"rendered":"The Second International Cryptographic Module Conference"},"content":{"rendered":"\n
\"\"<\/figure>\n\n\n\n

The 2014 ICMC<\/a> started with a day of workshops on FIPS 140-2 and ISO\/IEC 19790, followed today by keynote speakers Helmut Kurth (atsec information security) and Mary Ann Davidson (Oracle).<\/p>\n\n\n\n

Almost 200 attendees from around the world came to this year’s conference to discuss topics ranging from high-level policy to advanced technical subjects<\/a>.<\/p>\n\n\n\n

\"\"<\/figure>\n\n\n\n

One of the highlights of today’s presentations was Yi Mao (atsec information security) entertaining the audience with a humorous look into the daily routine of a CST lab. Her talk, entitled “Making Diamonds Out of Coal: CST Labs Are Under Pressure” included the animation shown below.<\/p>\n\n\n\n

\n