International Cryptographic Module Conference 2024
September 17-20, 2024 | DoubleTree by Hilton, San Jose, California
Allegro Software is a SILVER Sponsor of ICMC24, the leading forum for the global commercial cryptography community.
Allegro Software at ICMC24
- Global Validation
- Open Source Cryptography
- End User Experience
- Cryptographic Technology
- Random Bit Generatiors
- Embedded Encryption & Industry Vertical Applications
- And more.
Get Your Discount Code for ICMC 2024!
About ICMC24

This conference brings experts from around the world together to explore the evolving landscape of cybersecurity in commercial cryptography. This leading annual event serves as a hub for addressing the implementation of post-quantum algorithms, the rollout of the new FIPS 140-3 standard, and diverse European cybersecurity regulations. The conference stands as a cornerstone for the cryptographic community, fostering collaboration and innovation in response to emerging challenges and opportunities in the field.
Our Resources
FIPS Validation: The Key to Medical Device Security
FIPS validation is crucial for securing medical devices, a key concern for healthcare technology. Get key insights on IoMT requirements for implementing cryptography and more on Embedded Computing Design. This insightful article delves into the importance of adhering...
IoMT Devices Security: Ensuring Patient Safety & Privacy
Dive into the critical aspect of securing Internet of Medical Things (IoMT) devices, a cornerstone of healthcare innovation, in our insightful article by Loren Shade on embeddedcomputing.com. This article sheds light on the unique risks that IoMT devices face,...
Securing the Future of Healthcare: IoMT Device Protection
Explore the IoMT risks associated with medical devices and the countermeasures IoMT device manufacturers can take to ensure patient safety and privacy in our guest article written by Loren Shade on embeddedcomputing.com. Read the Article Allegro highlights the...
Let’s Talk IoT Security
Implementing IoT device security can be a significant and costly challenge. Let us help you by sharing our proven framework for integrating a proactive security approach into your design, minimizing the need for programming resources and reducing development costs and time to market
Schedule a one-on-one web conference with us today to discuss your embedded IoT security needs.