BeyondTrust

Events We Are Sponsoring

As emerging technologies redefine what’s possible across government, GITEC 2026 convenes senior federal leaders, industry innovators, and academic experts to explore the path forward for secure, data-driven, and AI-enabled government operations. Over two and a half days of collaboration, attendees will examine how cybersecurity, zero trust, artificial intelligence, generative AI, and digital modernization are converging to advance mission outcomes and strengthen public trust.
Hosted in historic Charlottesville, Virginia, GITEC 2026 offers a unique forum for dialogue and partnership among the nation’s top public and private-sector technology minds. Guided by the GITEC Board—comprised of leaders from government, industry, and academia—this year’s programming features dual-track sessions, strategic discussions, and networking opportunities designed to translate bold ideas into tangible progress. From Sunday evening’s opening reception to Tuesday’s closing sessions, participants will gain forward-looking insights, forge lasting connections, and help shape the next era of federal technology and workforce innovation.

The identity landscape has changed, but most organizations are still trying to solve new challenges using old solutions. Security teams are no longer managing just human users. They are dealing with a rapidly growing number of non-human identities (NHIs), service accounts, and AI agents that can spin up, take action across systems, and then disappear.
At the same time, core disciplines like Privileged Access Management (PAM) and Identity Governance and Administration (IGA) are often fragmented, manual, or incomplete, making it difficult to connect identity systems and enforce consistent control across systems. That limits visibility, degrades control, and increases risks across both human and non-human access. Organizations need IGA and PAM capable of addressing these new risks.
Join RSA and BeyondTrust to learn:
- How identity is changing beyond just human users
- Why NHIs and AI agents are hard to control
- Where PAM and IGA break down today
- How disconnected identity systems create blind spots and risk
- What better visibility, integration, and control actually look like
- Simple steps to improve without adding complexity

Cities and counties sit at the center of critical infrastructure outcomes. In many jurisdictions, they own and operate essential services such as water and wastewater systems, emergency services, government facilities and transportation networks. We see every day when there is a cyber attack, there is real-world impact for public safety, trust and continuity and economic stability.
Nation-state actions are targeting systems that communities rely on. Join us May 19th at 1:00pm ET for a conversation around:
- Challenges in securing critical infrastructure at the city and county level
- The importance of visibility to answer the question: who has access to what and when
- How identity and privilege controls can help close security gaps across IT and OT
- Replacing VPNs to reduce remote access risk while centralizing access control and auditing

Ariento is a leading provider of managed, consulting and advisory services to the defense industrial base related to the Cybersecurity Maturity Model Certification (CMMC). While not required, CMMC Level 2 certification shows their commitment to their managed service clients and will assist in making their certification assessments easier and more cost-effective.
Join us on Tuesday, June 2nd at 1PM ET as BeyondTrust’s Kevin E. Greene, Chief Security Strategist for Public Sector, chats with Chris Rose, CEO of Ariento, to learn how they leveraged BeyondTrust’s Remote Support for CMMC Level 2 certification.
Key Results include:
- Fulfilling some requirements for Defense Federal Acquisition Regulation Supplement (DFARS) and CMMC level 2 certification, specifically within the access control and maintenance domains
- Cutting average maintenance time in half for remotely accessing and supporting assets in customer environments
- Increasing job satisfaction for employees and customer satisfaction due to improved time to resolution

- Meeting Cyber Insurance Mandates
- Improved Compliance
- Enhanced Security
- Holistic Visibility
- Organizational Efficiency
Events Where We Are Exhibiting

Registration is not yet available. Check back in the Spring of 2026.
TechNet Augusta 2026 gives participants the opportunity to examine and explore the intricacies of the cyber domain. With assistance from the U.S. Army Cyber Center of Excellence and industry experts, the conference is designed to open the lines of communication and facilitate networking, education and problem solving. Leaders and operators also discuss procurement challenges the military, government and industry face during a time of uncertain budgets and runaway technology advances.
With assistance from the U.S. Army Cyber Center of Excellence and industry, this three-day conference is designed to open the lines of communication between the military and commercial sector and provide a space where government and industry professionals can discuss issues and share solutions surrounding cyber electromagnetic activities and unified land operations.

Gartner Identity & Access Management Summit is an opportunity to connect with your community and our experts. Build and diversify your network by meeting forward-thinking IAM leaders across security, authentication, governance and other disciplines.
Join us to uncover the latest IAM insights and solutions with experts, IAM peers and service providers to accelerate your business.
