Don’t miss out
04 Dec 2025
Convene, San Francisco, CA, USA
Welcome to CISOXSan Francisco, the premier event exclusively designed for accomplished CISOs across California, USA. Step into the forefront of strategic technology leadership as we navigate the evolving post-pandemic landscape and unlock unparalleled opportunities for enterprise success. Join us at CISOXSan Francisco, where visionary CISOs converge to engage in transformative discussions, gain strategic insights, and address the pressing challenges shaping the world of enterprise technology.

Secure up to twelve exclusive meetings with relevant leads at CISOXSan Francisco, maximising your opportunity to forge valuable connections and drive business growth.
Become a sponsor
Immerse yourself in thought-provoking discussions, as top leaders share their expertise and provide you with invaluable insights to propel your strategic initiatives forward.
Engage with industry peers, thought-leaders, and solution providers to foster meaningful connections and explore collaborative opportunities that drive innovation and growth.
Discover what awaits you at CISOXSan Francisco.
As 2025 winds down, CIOs and CISOs find themselves at the intersection of unprecedented technological opportunity and escalating enterprise risk. This year has brought rapid advances in AI, heightened regulatory scrutiny, persistent cyber threats, and unrelenting pressure to demonstrate ROI. At the same time, leaders have had to balance innovation with resilience, talent shortages with transformation, and shareholder expectations with shared risk across the C-Suite. In this opening keynote panel, senior technology executives will reflect on the defining challenges and lessons of 2025, while charting the path forward into 2026. They’ll share how collective intelligence, stronger collaboration, and new leadership models are shaping the enterprise of tomorrow, and offer actionable insights for leading with confidence in a year that promises both turbulence and transformation.
Key Takeaways:
• Practical approaches to balancing innovation, AI adoption, and enterprise resilience.
• Building cross-functional collaboration to manage shared risk and accelerate transformation.
• Redefining IT leadership for an era where clarity, ROI, and trust are non-negotiable.
Agentic AI—autonomous agents that can plan, reason, and act on behalf of humans—is quickly becoming vital to business operations. As their use and numbers scales, so do the risks. These non-human identities need to be treated as first-class-citizens—meaning that they are verified, authenticated, authorized, and governed with the same rigor as human users. Attempting to manage AI agents without a modern identity foundation can result in over-permissioning, undetected hijacking, and other security blind spots. This session will explore common pitfalls in agentic AI adoption and provide guidance on how organizations can safely and strategically enable AI agents through identity-first security
As AI adoption accelerates, organizations face a new layer of complexity: every AI tool or model integrated into the business represents another piece of software, and one that traditional security and infrastructure teams often aren’t fully prepared to protect. The challenge is clear: AI is powerful, but its novelty creates blind spots in governance, oversight, and resilience. In this session, leaders from National University will share how they are tackling the intersection of AI, infrastructure, and security. Bridgman and Bachechi will highlight the realities of securing AI-driven systems, how to balance innovation with operational stability, and what it takes to align infrastructure and security strategies in this rapidly evolving landscape.
Key highlights:
• The hidden risks of embedding AI into existing infrastructure, and why traditional security playbooks fall short.
• Building cross-team collaboration between infrastructure and security to anticipate and close AI-driven gaps.
• Practical approaches to governing AI use while supporting speed, agility, and innovation.
• Lessons learned and outcomes from National University’s journey toward safe, scalable AI adoption.
Today’s most dangerous cyber risk is not just a sophisticated adversary—it’s the illusion of security created by our own programs. Check-the-box training satisfies compliance but fails to answer the board’s critical question: Are we truly ready? This gap between perceived readiness and actual capability is a major strategic blind spot, making it difficult to justify investments or prove value.
This session unveils a powerful methodology for transforming readiness from a compliance exercise into a continuous program that proves capability. It provides a blueprint for building a culture of resilience backed by evidence, moving beyond base metrics to deliver strategic value, measurable risk reduction, and a competitive advantage. Leave with a clear framework to eliminate doubt and confidently lead your organization toward true cyber resilience.
• Prove Capabilities, Not Completion: Learn to move beyond participation metrics with realistic exercises that generate hard evidence of your team’s ability to counter real-world threats.
• Improve with Precision: Discover how to use performance data from simulations to identify specific skill gaps and build crucial muscle memory where it’s needed most.
• Benchmark What Matters: Understand how to measure your team’s performance against industry peers and your own historical data to demonstrate meaningful improvement over time.
• Report with Confidence: Master the art of translating readiness data into a compelling, evidence-based narrative that articulates risk reduction to the board and proves the strategic value of your program.
Most security programs measure effort — not outcomes. Teams patch thousands of vulnerabilities, deploy dozens of tools, and run annual tabletop exercises… but when an attacker shows up, none of that matters.
What matters is whether you can prove your defenses actually work.
In this talk, Snehal Antani, CEO of Horizon3.ai, shares how Verifone evolved from basic pentesting to continuous security validation across 52 global networks. By scaling autonomous pentesting, Verifone’s cybersecurity team now runs safe, automated tests that integrate seamlessly into their daily operations—validating controls, reducing false confidence, and helping regional teams focus on what truly matters.
By seeing their environment through the eyes of an attacker, Verifone learned to:
• Prioritize what’s exploitable. Move beyond scanner noise to identify and fix weaknesses that real attackers could exploit across their global footprint.
• Automate at scale. Build and continuously run over 50 custom testing templates, embedding validation directly into their operations.
• Prove resilience. Use pentest insights to deploy precision tripwires, validate detection pipelines, and continuously strengthen their defenses over time.
Cyber resilience isn’t about being perfect—it’s about getting better with every test. Verifone is proving that the best way to defend is to think like the one trying to break you.
In this interactive session, our event partners will take the lead in initiating and facilitating conversations centered on challenges and solutions within the industry. Attendees can expect dynamic discussions where diverse perspectives are shared, fostering collaborative problem-solving and the exploration of innovative solutions to common industry hurdles.
Technology leaders often face the Conway’s Law dilemma: systems mirror the structure of the teams that build them, leading to fragmented architectures and misalignment with business goals. The solution? Flip Conway’s Law on its head. In this session, Shivakumar Gopalakrishnan reveals a proven methodology for designing organizational structures that naturally produce the technical architectures you need. Drawing from real-world transformations at BD, he will share how intentional org design enables tighter integration, accelerated delivery, and sustainable digital transformation. Attendees will learn how to identify structural barriers, apply the Inverse Conway Maneuver, and build organizations that deliver both technical excellence and business value.
Key Takeaways:
• How to recognize when organizational structures are hindering system performance and agility.
• Practical steps to apply the Inverse Conway Maneuver and realign teams with product and business outcomes.
• The measurable benefits of intentional org design, from faster delivery to scalable, resilient architectures.
AI is rapidly transforming the cyberthreat landscape, with adversaries — from script kiddies to nation-state actors —leveraging AI to scale and automate attacks.
Security operations leaders must adapt, using AI-driven defense strategies to stay ahead. This session explores how organizations can harness AI to enhance detection, response, and resilience. Learn key techniques for integrating AI into security operations, mitigating emerging risks, and ensuring AI works for you – not against you.
Traditionally viewed as a defensive function, cybersecurity can also serve as a strategic enabler of business growth. In this session, Sathish Kuppuswamy will share insights from his experience leading cybersecurity architecture and operations at Pacific Gas and Electric Company, highlighting how organizations can leverage security initiatives to drive innovation, operational efficiency, and competitive advantage.
Key Takeaways:
• Understanding how cybersecurity investments can unlock business value beyond risk mitigation.
• Strategies for aligning security initiatives with organizational growth objectives.
• Lessons from real-world implementation of security-driven innovation and resilience.
• Practical approaches to measuring and communicating the impact of cybersecurity on business outcomes.
As AI adoption accelerates, tech leaders are navigating an increasingly complex regulatory landscape shaped by privacy laws, cybersecurity mandates, and emerging governance frameworks. California is moving to mirror the EU’s GDPR and AI Act, signaling a new wave of rules that will influence global enterprises. Join us for a conversation that will unpack what these developments mean for IT and security leaders, exploring the intersection of governance, risk, and compliance in an era of political and regulatory uncertainty. Attendees will gain practical insights on how to align innovation with compliance, mitigate risks across jurisdictions, and build resilient strategies that protect both enterprise value and public trust.
Key Takeaways:
• Understand how California’s new AI and privacy laws will impact enterprise compliance.
• Learn how to navigate overlapping global governance frameworks.
• Explore ways to balance innovation with regulation in AI deployment.
• Discover how to turn policy into practical, scalable processes.
Discover how forward-thinking organizations are transforming risk into readiness by embracing the continuous cycle of understanding, protecting, and unlocking the value of their data. Learn how AI-driven visibility and modern backup strategies not only defend against threats but also turn dormant data into a competitive advantage. Explore how the new era of AI is reshaping our approach to data resilience and opportunity—and see how industry leaders are already making it a reality. Join Emilee Tellez, Field CTO from Veeam Software, for this impactful session.
Key Takeaways:
• How AI is revolutionizing data discovery, classification, and governance
• The importance of intelligent backups for both protection and innovation
• Turning backup data into actionable insights for a strategic edge
• Ways to build a resilient, future-ready data strategy
• Real-world examples of organizations leading the way in AI-driven data protection
Enterprises don’t fear AI – they fear uncontrolled AI. This talk presents a risk-first R\&D method where short, instrumented feasibility studies – run with the knowledge workers who judge value—act as a formal control. Because statistical and generative AI are probabilistic, we operationalize human judgment with expert-defined rubrics, acceptance thresholds, and audit-ready artifacts, all inside governance wrappers (limited blast radius, security guardrails, staged go/no-go gates). The outcome: infeasible ideas are stopped early and safely, while viable ones advance with evidence they can scale at manageable risk.
Take a break, engage in meetings or join a discussion roundtable! During this PM Power Break, fellow enterprise leaders will guide discussions on their favorite topic, fostering an environment of open exchange, exploration of diverse perspectives and experiences. Attendees can grab a coffee and anticipate engaging conversations through 1-2-1 meetings and roundtables. Conversations will be driven by shared challenges and interests, offering valuable insights and opportunities for collaborative learning and networking.
In today’s competitive landscape, speed to market is everything — and AI is reshaping how products are designed, built, and scaled. Drawing on his experience at LinkedIn, Aman Grover will share how combining AI with data-driven insights accelerates the product development lifecycle, from ideation to deployment. He’ll explore how machine learning models uncover hidden opportunities, streamline workflows, and deliver more personalized experiences for users, while also addressing the infrastructure and cultural shifts required to make AI adoption successful.
In an era of escalating cyber threats and rapid technological change, building a truly cyber-resilient enterprise is no longer optional, it’s essential. This closing panel brings together CIOs, CISOs, and industry experts to share how they are creating organizational cultures that embrace both speed and safety. Through real-world examples and strategic insights, the discussion will focus on balancing innovation with robust security practices, fostering cross-functional collaboration, and embedding resilience into the DNA of the enterprise. Attendees will gain a clear understanding of how to lead their organizations through complexity, respond dynamically to emerging threats, and cultivate trust across business units and the boardroom, positioning their companies for long-term success in 2026 and beyond.
Key Takeaways:
• Balancing Agility with Security: Strategies to accelerate innovation without compromising safety or compliance.
• Moving beyond tick-box training to real behavioural change and communicating risk in language the business understands
• Cross-Functional Collaboration: Building bridges between IT, security, risk, and business teams to drive unified resilience.
• Embedding a Resilient Culture: Practical approaches to make cyber resilience a shared responsibility and competitive advantage.
Convene 100 Stockton, O'Farrell Street, San Francisco, CA, USA
Convene 100 Stockton, O'Farrell Street, San Francisco, CA, USA
See what attendees, speakers and sponsors say about our events.
“I attended because the list of speakers was an attraction, and the time of the year also worked for me. It met my expectations. I was planning on leaving earlier, but stayed all through because I did not want to miss anything."
“I enjoyed the people, the interaction, the conversations and insights on what happening currently or near term in the industry, also the exceptional customer service by the team and staff, the intimacy EDS showed me throughout the event, I wasn’t left on an island. "
“I had lots of fun and met a lot of great people there & most importantly I learned a few things as well."
“I attended last year’s EDS CIO CISO event and thought the speakers and content were excellent. This year was even better with a good mix of topics and some interesting participants."
“I was impressed by all of the speakers and took away some interesting insights from the participants. The EDS team was well organized and made things flow well, and the event location / venue was great."
“This was well worth the trip and would certainly attend again if invited."
“This event is definitely better than others I've attended - service-oriented and really focused on ensuring a lot of dialogue. Both in 1:1 interactions and at the tables. Very well done."
“Interesting agenda, top experts and speakers, expectations were fully met by the participants and presentations. The event was great, vibrant until the end and at a great venue!"
“This is in the Top 5 of my best IT conferences to date, including commercial events. I already recommended EDS to my colleagues."
“It was a real value for me to be part of your event. You did a great job in organizing and performing."
“Attending EDS events as a CTO opened doors to insightful discussions and connections that felt truly genuine. It's not often you find such a perfect blend of knowledge sharing and camaraderie."
“Another great event! The atmosphere is relaxed yet intellectually stimulating, making it easy to connect with peers and exchange real-world insights with real CISOs."
“Thank you EDS. Your gatherings are refreshing and I always leave feeling inspired and armed with actionable ideas for our digital strategy."
“Sponsoring EDS events has been a fantastic opportunity for us. The focus on genuine engagement rather than just promotion allows us to build lasting relationships with industry leaders in a natural, authentic way."
“I've been attending EDS dinners as a CIO for a while now, and they never disappoint. The blend of thought-provoking discussions and genuine connections is unmatched in the industry."
“EDS events provide an invaluable platform for CISOs like myself to exchange ideas and best practices in a relaxed, yet professional setting. The conversations are always real and relevant. Thank you EDS team!"
“We're repeat sponsors of EDS dinners for a reason! Each time, we get unique opportunities to connect with decision-makers on a personal level. It's not just about business; it's about building authentic relationships, every time"
“EDS events have become a staple for me as a CDO"
“Sponsoring EDS events has been a breath of fresh air. The focus on quality over quantity ensures that our brand gets genuine exposure to the right audience in a way that feels natural and human."
Attendance is reserved for C-Suite executives and Senior Executives within Cybersecurity, including Chief Information Security Officers, and other senior security decision-makers from a wide array of industries. Joined by our select sponsor partners, enriching networking opportunities and offering cutting-edge solutions.
Thanks to our sponsors, your access is entirely complimentary, providing you with full-day access to all presentations, exclusive networking sessions, personalised one-to-one meetings, delectable catering, and an open bar for added networking.
These 25-minute meetings provide invaluable opportunities to discover new solutions and expand your network with leading innovative providers that can help solve your current or future complex challenges.
Professional business attire is appropriate.
No preparation is needed on your part. We take care of all the final details. Simply arrive at the specified time, date, and location, and we’ll handle the rest to ensure you have a seamless and enjoyable experience.
Our events offer unparalleled experiences where interactive sessions spark innovation, keynotes unveil insights from industry luminaries, and exclusive one-on-one meetings with best-in-breed solution providers unfold in some of the world’s most prestigious venues. This unique format ensures that your challenges are addressed directly, providing invaluable insights, connections, and maximising value for your time. With a compact schedule featuring a variety of presentations, you’ll gain a comprehensive view of the latest innovations and have ample opportunity to network with like-minded peers—all under one roof, and in just one day. This fosters collaboration and forges invaluable connections among executives with a genuine influence, setting the standard for elite gatherings in the industry.
Get in touch here