Don’t miss out
12 Feb 2026
Royal Lancaster Hotel
Welcome to CISOXUK, the premier event exclusively designed for accomplished CISOs across the UK. Step into the forefront of strategic technology leadership as we navigate the evolving post-pandemic landscape and unlock unparalleled opportunities for enterprise success. Join us at CISOXUK, where visionary CISOs converge to engage in transformative discussions, gain strategic insights, and address the pressing challenges shaping the world of enterprise technology.

Secure up to twelve exclusive meetings with relevant leads at CISOXUK maximising your opportunity to forge valuable connections and drive business growth.
Become a sponsor
Immerse yourself in thought-provoking discussions, as top leaders share their expertise and provide you with invaluable insights to propel your strategic initiatives forward.
Engage with industry peers, thought-leaders, and solution providers to foster meaningful connections and explore collaborative opportunities that drive innovation and growth.
Discover what awaits you at CISOXUK.
As digital, data, and security capabilities become central to enterprise competitiveness, CIOs and CISOs are increasingly expected to demonstrate tangible business value rather than simply operational performance. This session explores how technology and security leaders can shift from traditional technical indicators to value-driven metrics that highlight return on investment, enable growth, and build long-term digital trust. We’ll examine how tech leaders can jointly define a shared framework for value creation, aligning technology, resilience, and risk decisions directly with enterprise strategy, customer impact, and financial outcomes. Rather than measuring uptime for its own sake, leaders will explore how usage, adoption, reliability, and resilience contribute to measurable value across the organisation.
Key Discussion Themes:
• Moving beyond technical KPIs to value-oriented metrics that highlight ROI, business enablement, customer impact, and digital trust.
• Creating a shared CIO–CISO performance framework that links technology and security contributions to corporate OKRs and enterprise value creation.
• Communicating technology and security performance in a business and board-ready narrative that inspires confidence and investment.
As adversaries evolve toward autonomous and highly adaptive attack methods, traditional CTEM programs often struggle to keep pace. This session explores how CISOs can strengthen decision-making and operational resilience by incorporating adversary perspectives into their security strategy. Drawing on emerging practices from organizations across the region, Horizon3.ai’s CEO Snehal Antani, will discuss how continuous, attacker-informed testing can reveal real attack paths, clarify true risk exposure, prioritize and validate remediation, and support more confident, evidence-based conversations with executive leaders.
In an era where cloud reliance defines modern business, resilience is no longer just about recovery, it’s about readiness. This interactive forum invites you to join industry peers and security leaders in an open discussion on how to anticipate, prevent, and adapt to disruption before it strikes. Together, we’ll explore how to embed resilience into cloud strategies, balance innovation with protection, and strengthen both technical and organisational responses. This a space for open sharing, honest reflection, and audience-driven dialogue. Come ready to contribute your experiences, pose questions to our expert panellists, and exchange practical ideas for building security and strategy that last beyond the next incident.
Quality, cyber, and compliance assurance remain siloed while digital ecosystems grow more interconnected and AI-driven. This session explains why fragmented oversight creates dangerous blind spots and how a single system of assurance strengthens cyber resilience, speeds delivery, and restores executive control.
Key takeaways:
• How assurance silos create hidden cyber risk
• Why compliance success can mask real vulnerability
• What unified assurance looks like and how to move toward it
CISO TRACK From Breach to Business Continuity: Building Anti-Fragile Cyber Resilience – What you’ll takeaway:
– Why assuming breach is no longer enough – and what anti-fragile looks like in practice
– How leading organisations recover endpoints even when Windows devices are inoperable
– The role of patching, persistence, and endpoint control in maintaining operational uptime
– How CISOs are enabling recovery and continuity across remote, hybrid and global workforces
CISO TRACK Agentic AI and MCP: Governing What You Can’t See – Your AI systems are no longer just answering questions. They’re autonomous agents executing real-world actions, connecting to tools and data via emerging standards such as the Model Context Protocol. Security leaders are now expected to govern a technology domain that’s still poorly understood, moving fast, and lacking mature controls. This roundtable tackles the governance challenge directly. How do you establish accountability when AI agents act autonomously? How do you scope permissions for systems that dynamically expand their own capabilities? And when a compromised agent can silently influence other agents in your environment, what does incident response even look like?What You’ll Gain
1. Hear how peers are thinking about risk categories like tool poisoning, cascading agent failures, and the accountability gaps that emerge when AI systems act autonomously.
2. Share and compare approaches to governance, permission scoping, and where to draw the line on human oversight.
3. Walk away with sharper questions to take back to your teams and a better sense of where others are focusing their attention
CIO TRACK AI as a Growth Lever, not a Science Project – Join this interactive roundtable discussion to exchange perspective and experiences on how organisations are approaching AI as a strategic growth lever, through the lens of self-driven network capabilities that enhance customer experience, reduce risk, and improve operational efficiency. No longer viewed purely as an experimental concept, the discussion will include real world examples and peer insights on how organisations are using AI and autonomous networks to drive measurable outcomes, free up operational capacity, and support business growth.
Key Takeaways:
• Revolutionise Your Network: Discuss how self-driven networks are being used to help predict, prevent, and resolve issues in near real time, and how CIOs are positioning network capabilities as a strategic asset.
• Unlock Growth Potential: Discover how self-driven networks can protect and improve customer experience, reduce risk and free up capacity for innovation, enabling your organisation to accelerate growth expand into new markets
• Maximise AI Impact: Get expert guidance on defining high impact AI use cases, aligning them with business objectives and approaching AI adoption and integration in a structured, outcome focused way.
Your core messaging remains fully intact and reframed as discussion topics, which encourages attendance and active engagement
CIO TRACK How do you get your data strategy AI-ready? Building a future-proof data strategy – Many organisations already have a data strategy in place, yet the rapid rise of generative AI and large language models is forcing leaders to question whether that strategy is still fit for purpose. Some are even asking whether they now need a separate AI strategy altogether.
Together, we’ll explore how a strong data strategy can act as the foundation for AI, where GenAI can realistically add value today, and how organisations are adapting their data, analytics, and governance models to support AI ambitions.
The discussion will also touch on how leaders are navigating executive pressure to “do something with AI,” prioritising use cases, and communicating value in a way that secures buy-in and funding.
Key takeaways:
• How are organisations evolving their existing data strategies to support AI and GenAI initiatives?
• Where have peers seen real business value from integrating AI into data and analytics and where hasn’t it worked?
• What changes to data foundations (architecture, quality, governance, operating models) are proving most critical for AI readiness?
• How are leaders positioning Data and AI strategies with senior executives, and what’s resonating when it comes to investment decisions?
• What practical next steps are organisations taking today to move their Data and AI agendas forward?
In this interactive session, our event partners will take the lead in initiating and facilitating conversations centered on challenges and solutions within the industry. Attendees can expect dynamic discussions where diverse perspectives are shared, fostering collaborative problem-solving and the exploration of innovative solutions to common industry hurdles.
Emerging technologies like AI, Blockchain, and Quantum Computing are converging to radically reshape technology and the world we live in. This session will explore the interplay between them and their impact on the world, and also examine how this transformation will redefine the priorities, responsibilities, and strategic thinking required from cybersecurity leaders.
The process of aligning IT strategy with business goals and objectives is vital, due to the synergistic relationship between technology initiatives and organizational success. Through insightful analysis and practical strategies, attendees will gain invaluable insights into maximizing the strategic impact of IT investments to drive sustained business growth and competitive advantage.
This session reframes the insider-threat landscape as AI systems gain greater autonomy, access, and influence within organisations. Insider risk is no longer limited to human actors, it now includes AI-driven processes capable of behaviours that can appear malicious, whether intentional or accidental.
The discussion will explore how AI is reshaping intent, capability, and control, and how these shifts introduce new vulnerabilities across hybrid human–AI workflows. It will also show why traditional identity-based monitoring cannot keep pace with machine-enabled insider activity.
Attendees will leave with a clearer understanding of this emerging threat and practical guidance on adopting behaviour-focused detection models that surface anomalies, regardless of whether they originate from a person or an increasingly capable AI system.
Enterprise IT has spent years optimising systems of record. Stability, control, and process efficiency have been the priority. But the pressure CIOs face today is different. The demand is for faster outcomes, better user experiences, and meaningful use of AI where work actually happens. This session looks at how Daimler Truck used a major organisational separation as a moment to step back and reset. What began as a necessary untangling of systems became an opportunity to simplify their system landscape, rethink how users engage with data, and modernise the experience layer that sits above complex systems of record.
Rather than treating AI as something embedded inside individual platforms, the focus shifted to readiness; creating a unified, flexible engagement layer that works across devices, supports online and offline scenarios, and allows AI capabilities to evolve over time. The story is less about technology choices and more about intent. Disruption created the space to rebalance the enterprise, reconnect systems to real business outcomes, and design an application strategy fit for what comes next.
Key Takeaways
1. Stop treating systems of record as the place where value is created
2. Use disruption to simplify, not just migrate
3. Design for AI readiness, not today’s AI tools
In this Quick Tech Tale, Ash Hughes shares how his team transformed live phishing attacks into a continuous engine for growth, measurement and resilience. By reframing genuine phishing incidents as opportunities for structured learning, Berkeley Group developed an approach where every attack became a source of insight. Real-time response patterns, detection speed and decision-making were analysed to benchmark performance, sharpen skills and refine processes. This created a continuous improvement cycle rooted in actual threat behaviour rather than theoretical scenarios. Ash shares how this strategy not only elevated technical readiness, but also fostered a culture of adaptability, accountability and confidence, turning live attacks into some of the most valuable training moments a security team can have.
When traditional project management can’t keep up with business speed, innovation suffers. James Pomeroy shares how Epsilon harnessed AWS AI to radically accelerate digital transformation, achieving a tenfold increase in operational capacity while keeping costs almost flat. By reimagining delivery processes and moving from slow, meeting-heavy workflows to AI-driven systems, his team was able to execute faster than a typical onboarding session.
Key Takeaways:
• How to harness AI to create a faster, more agile technology operation, streamline workflows and remove bottlenecks
• Practical strategies for replacing outdated delivery practices with self-optimising systems
• Insights into scaling project delivery at business speed without increasing costs
As the use of AI agents accelerates across your enterprise, governance and control are just as critical as determining where and how to deploy agents for the greatest impact.
Discover how to holistically manage the lifecycle of your AI agents with SAP. This includes clear alignment to your business strategy, processes, governance and guardrails, in order to scale safely and deliver value across your organisation.
• Scale AI agents from experiments to enterprise value.
• Learn how to built-in controls, compliance, and guardrails.
• How to connect agents to business strategy.
CISO TRACK: Zero Trust, Zero Compromise: Implementing Modern Identity Security at Scale
As cyber threats grow in sophistication, organisations must rethink how they secure identities and access. Discuss practical strategies for implementing Zero Trust principles at scale, ensuring robust identity security without compromising usability or business efficiency. Attendees will gain insights into designing resilient access frameworks, enforcing least-privilege policies, and building scalable security architectures that protect critical assets in a complex digital environment.
CISO TRACK: Protecting AI and Protecting Against AI
As AI becomes central to healthcare innovation, organisations face a dual challenge: safeguarding AI systems while defending against AI-powered threats. Sarith Chandra explores strategies to secure AI assets, manage associated risks, and mitigate malicious AI-driven attacks. Attendees will gain practical insights into balancing innovation with security, protecting sensitive data, and building resilient AI governance frameworks in a high-risk environment.
CIO TRACK: The Adaptive Leader – Navigating Disruption and Complexity
Join this table to explore what it takes to lead effectively in times of disruption and complexity. Participants will discuss practical strategies for adapting leadership styles, driving data- and AI-informed decision-making, and fostering resilience in teams and organisations. This interactive session provides a space to share experiences, exchange insights, and learn from peers on navigating uncertainty while maintaining performance and agility.
CIO TRACK: Show Me the Value? Quantifying Risk and Justifying Tech Investments in 2026
In an era of increasing complexity and tight budgets, demonstrating the value of technology investments is critical. Join Sarah Leteney as she explores practical approaches to quantifying risk, measuring impact, and building a compelling business case for technology initiatives in 2026. This session offers actionable insights for CIOs, IT leaders, and decision-makers on aligning tech spend with strategic priorities, making informed investment decisions, and driving measurable business outcomes.
Take a break, engage in meetings and join a discussion roundtable! During this PM Power Break, fellow enterprise leaders will guide discussions on their favorite topic, fostering an environment of open exchange, exploration of diverse perspectives and experiences. Attendees can grab a coffee and anticipate engaging conversations through 1-2-1 meetings and roundtables. Conversations will be driven by shared challenges and interests, offering valuable insights and opportunities for collaborative learning and networking.
We put multiple SOCs through the same DFIR exercise under identical conditions and let them decide what “good” looked like. What followed wasn’t a skills gap, but a values gap. This talk breaks down the benchmark results and shows how people’s inherent biases can cause teams to focus on the wrong metrics, and how to overcome them.
Key Takeaways:
• Silence creates its own metrics
• The metrics decide the outcome
• The outcome defines the success
As AI reshapes the modern enterprise, one question looms large: how do we prepare our people and our organisations for what comes next? This closing debate brings together a range of voices and viewpoints to tackle one of today’s most pressing challenges: how to reskill, redeploy, and reinvent the workforce for an AI-driven future. Our panellists will challenge assumptions, debate bold ideas, and explore the balance between human capability and machine intelligence. But this isn’t a sit-back-and-listen session! It’s your chance to join the conversation. Share your perspective, question our speakers, and contribute to a dynamic discussion that confronts the opportunities and tensions shaping the next chapter of work.
When Jason Fox – former Special Forces Sergeant and star of SAS: Who Dares Wins – was tasked with leading a hostage rescue mission to save a British journalist held captive in Afghanistan, the stakes couldn’t have been higher. The mission demanded absolute focus, trust in his team, and mental strength under extreme pressure. In this raw and powerful session, Jason shares the story behind that operation – and the personal lessons it taught him about resilience, decision-making, and leadership when there’s no room for error.
Drawing parallels between combat and business, Jason explores how to lead through fear, stay grounded in uncertainty, and build mental toughness that lasts. He unpacks the 4 Pillars of the Commando Spirit: Courage, Determination, Unselfishness, and Cheerfulness in the Face of Adversity – and how they apply far beyond the battlefield. From preparing for mission-critical moments to returning to everyday life, this is a session about mindset, performance, and what it really takes to lead when the pressure’s on.
Key takeaways include
• Leading teams through risk, pressure, and the unknown
• Building true resilience and decision-making clarity under stress
• Applying Special Forces principles to modern leadership challenges
Royal Lancaster London, Lancaster Terrace, London, UK
Royal Lancaster London, Lancaster Terrace, London, UK
See what attendees, speakers and sponsors say about our events.
“I attended because the list of speakers was an attraction, and the time of the year also worked for me. It met my expectations. I was planning on leaving earlier, but stayed all through because I did not want to miss anything."
“I enjoyed the people, the interaction, the conversations and insights on what happening currently or near term in the industry, also the exceptional customer service by the team and staff, the intimacy EDS showed me throughout the event, I wasn’t left on an island. "
“I had lots of fun and met a lot of great people there & most importantly I learned a few things as well."
“I attended last year’s EDS CIO CISO event and thought the speakers and content were excellent. This year was even better with a good mix of topics and some interesting participants."
“I was impressed by all of the speakers and took away some interesting insights from the participants. The EDS team was well organized and made things flow well, and the event location / venue was great."
“This was well worth the trip and would certainly attend again if invited."
“This event is definitely better than others I've attended - service-oriented and really focused on ensuring a lot of dialogue. Both in 1:1 interactions and at the tables. Very well done."
“Interesting agenda, top experts and speakers, expectations were fully met by the participants and presentations. The event was great, vibrant until the end and at a great venue!"
“This is in the Top 5 of my best IT conferences to date, including commercial events. I already recommended EDS to my colleagues."
“It was a real value for me to be part of your event. You did a great job in organizing and performing."
“Attending EDS events as a CTO opened doors to insightful discussions and connections that felt truly genuine. It's not often you find such a perfect blend of knowledge sharing and camaraderie."
“Another great event! The atmosphere is relaxed yet intellectually stimulating, making it easy to connect with peers and exchange real-world insights with real CISOs."
“Thank you EDS. Your gatherings are refreshing and I always leave feeling inspired and armed with actionable ideas for our digital strategy."
“Sponsoring EDS events has been a fantastic opportunity for us. The focus on genuine engagement rather than just promotion allows us to build lasting relationships with industry leaders in a natural, authentic way."
“I've been attending EDS dinners as a CIO for a while now, and they never disappoint. The blend of thought-provoking discussions and genuine connections is unmatched in the industry."
“EDS events provide an invaluable platform for CISOs like myself to exchange ideas and best practices in a relaxed, yet professional setting. The conversations are always real and relevant. Thank you EDS team!"
“We're repeat sponsors of EDS dinners for a reason! Each time, we get unique opportunities to connect with decision-makers on a personal level. It's not just about business; it's about building authentic relationships, every time"
“EDS events have become a staple for me as a CDO"
“Sponsoring EDS events has been a breath of fresh air. The focus on quality over quantity ensures that our brand gets genuine exposure to the right audience in a way that feels natural and human."
Attendance is reserved for C-Suite executives and Senior Executives within Cybersecurity, including Chief Information Security Officers, and other senior security decision-makers from a wide array of industries. Joined by our select sponsor partners, enriching networking opportunities and offering cutting-edge solutions.
Thanks to our sponsors, your access is entirely complimentary, providing you with full-day access to all presentations, exclusive networking sessions, personalised one-to-one meetings, delectable catering, and an open bar for added networking.
These 25-minute meetings provide invaluable opportunities to discover new solutions and expand your network with leading innovative providers that can help solve your current or future complex challenges.
Professional business attire is appropriate.
No preparation is needed on your part. We take care of all the final details. Simply arrive at the specified time, date, and location, and we’ll handle the rest to ensure you have a seamless and enjoyable experience.
Our events offer unparalleled experiences where interactive sessions spark innovation, keynotes unveil insights from industry luminaries, and exclusive one-on-one meetings with best-in-breed solution providers unfold in some of the world’s most prestigious venues. This unique format ensures that your challenges are addressed directly, providing invaluable insights, connections, and maximising value for your time. With a compact schedule featuring a variety of presentations, you’ll gain a comprehensive view of the latest innovations and have ample opportunity to network with like-minded peers—all under one roof, and in just one day. This fosters collaboration and forges invaluable connections among executives with a genuine influence, setting the standard for elite gatherings in the industry.
Get in touch here