Don’t miss out
14 Apr 2026
Well& by Durst, One Five One, New York
Welcome to CIOXNew York, the premier event exclusively designed for accomplished CIOs across NY, US. Step into the forefront of strategic technology leadership as we navigate the evolving post-pandemic landscape and unlock unparalleled opportunities for enterprise success. Join us at CIOXNew York, where visionary CIOs converge to engage in transformative discussions, gain strategic insights, and address the pressing challenges shaping the world of enterprise technology.

Secure up to twelve exclusive meetings with relevant leads at CIOXNewYork maximising your opportunity to forge valuable connections and drive business growth.
Become a sponsor
Immerse yourself in thought-provoking discussions, as top leaders share their expertise and provide you with invaluable insights to propel your strategic initiatives forward.
Engage with industry peers, thought-leaders, and solution providers to foster meaningful connections and explore collaborative opportunities that drive innovation and growth.
Discover what awaits you at CIOXNew York.
In 2026, enterprise leadership is no longer judged by uptime, cost savings, or isolated KPIs. Boards, investors, and regulators are asking for answers to tougher questions:
How does technology drive growth? How is AI adoption impacting enterprise performance and risk? How resilient is the business under pressure?
This opening panel brings CIOs and CISOs together to explore the metrics that truly matter to boards – from digital resilience to AI-enabled business outcomes. Participants will learn how to translate complex technology initiatives into measurable business impact, align IT and security priorities with corporate goals, and take ownership of the outcomes that matter most. We will identify what to measure, what to retire, and how to align technology, security, and business leadership around shared metrics that drive growth, resilience, and long-term value.
Key Discussion Points:
• Identify the enterprise performance and resilience metrics boards will prioritise in 2026.
• Understand how AI initiatives create shared accountability across technology and business teams.
• Learn how CIOs and CISOs can translate technology and security outcomes into business language that drives strategic decisions.
Security leaders are under pressure to demonstrate resilience, justify investment, and explain risk in terms boards actually understand. Yet most security metrics still measure activity, such as vulnerabilities scanned, controls deployed, and tools purchased, not whether attackers can succeed.
After running more than 200k autonomous pentests across on-prem, cloud, and hybrid environments, a consistent pattern has emerged: attackers rarely need CVEs. They exploit weak credentials, misconfigurations, and misplaced security efforts to create real attack paths that lead to data access, ransomware, or domain-level control, often in minutes.
In this session, Joshua Knox, Principal Cybersecurity Strategist at Horizon3.ai, explains what these attack patterns mean for executives accountable for cyber risk. Drawing on an attacker’s perspective and real-world outcomes, he shows how leading organizations are rethinking prioritization, measurement, and remediation by shifting from vulnerability volume to attack-path risk, and from effort-based reporting to proof of resilience.
Attendees will leave with a practical framework for:
– Understanding why attack paths, not individual vulnerabilities, are the right unit of risk for executive decision-making
– Identifying the small set of metrics that show whether cyber risk is actually decreasing over time
– Turning proof of exploitability into faster remediation, clearer ownership, and fewer repeat failures
Cyber resilience isn’t about eliminating every weakness. It’s about knowing and proving what attackers can actually do, and getting measurably better over time.
As AI agents become autonomous decision-makers, collaborators, and digital representatives, enterprises must confront a new question: how does human identity evolve alongside machine identity? This open forum explores the cultural, ethical, and operational implications of agentive AI, from workforce augmentation to digital trust, and invites participants to share real-world experiences shaping this emerging landscape.
Key Takeaways:
• Understand how AI agents are reshaping personal, organizational, and digital identity.
• Explore the implications for workforce roles, privacy, trust, and governance.
• Discuss practical steps enterprises can take to balance human autonomy with machine-driven efficiency.
CISOs are challenged by the growing sophistication of cyberattacks and the increasing complexity of IT environments, making traditional recovery approaches insufficient. Ensuring rapid, reliable recovery is now central to organizational resilience and trust, yet many security leaders struggle to integrate recovery into overall security strategy. Exploring new paradigms in cyber recovery can empower CISOs to proactively safeguard business continuity.
Join this session to explore:
• Integrating recovery into incident response plans
• Assessing cyber resilience beyond prevention
• Bridging gaps between security and IT operations
Can IT Keep Control When Work Happens on Personal Laptops?
Remote teams now include contractors, consultants, offshore workers, and employees – many working from personal laptops with access to regulated data and critical systems. But traditional approaches to control – corporate-issued devices and virtual desktops – often add cost, friction, and complexity that don’t scale.
In this roundtable, we’ll unpack what “control” means in 2026 when IT doesn’t own the endpoint: how forward-looking leaders separate work from personal activity, enforce DLP, maintain auditability on unmanaged devices, shorten onboarding/offboarding cycles, and preserve local app performance. You’ll leave with clear decision criteria to assess whether your remote compute model can scale securely and efficiently.
Managing the Invisible Insider: When Agentic AI Becomes the Threat
Agentic AI systems have moved beyond answering questions. They are taking actions in the real world. That shift introduces a new, insider-like risk profile: autonomous systems operating at machine speed, with broad access to tools, workflows, and data. This roundtable is designed to make that risk concrete and practical. We will start by mapping the emerging threat landscape, drawing on real-world adversarial research against major agentic platforms to show how prompt injection, tool poisoning, and cascading compromise can quietly turn trusted agents into threats at scale. From there, we will focus on what to do about it: how to scope permissions, establish accountability for autonomous actions, and define pragmatic boundaries for human oversight. We will also explore guardrails that meaningfully constrain agent behavior without eroding the speed and utility that make agentic AI attractive in the first place.
What You’ll Gain:
1. Hear how peers are assessing insider-like risk in agentic systems, including prompt injection, tool poisoning, and cascading agent compromise.
2. Compare approaches to governance: permission scoping, accountability models, and where teams are drawing the line on human oversight.
3. Leave with actionable strategies and sharper questions to bring back to your team as you operationalize controls for autonomous AI.
From Insight to Action: Redefining Cyber Risk with Intelligent Defense
As digital ecosystems expand, CISOs face an increasingly complex and dynamic threat landscape. Traditional risk frameworks struggle to keep pace with the scale and speed of attacks. This session explores how threat intelligence, advanced analytics, and AI-driven insights can help organizations predict, prioritize, and prevent cyber risk across internal and third-party environments.
Join fellow security leaders to uncover how actionable intelligence and automation can bridge the gap between awareness and response—transforming cyber risk management into a proactive, data-driven discipline.
Key Learnings:
• Ways to integrate threat intelligence into enterprise and third-party risk programs
• Strategies to turn complex data into actionable, real-time defense decisions
• Best practices for aligning people, processes, and technology for intelligent resilience
Consumer IAM: The AI Browser Era Makes Identity Convergence Inevitable
As AI browsers and agentic AI redefine digital interactions, the traditional, human-driven customer journey is being replaced by autonomous agents acting on users’ behalf. This evolution unlocks new levels of personalization and efficiency but also threatens to break legacy identity systems not designed for an AI-driven web. In this session, we’ll explore how identity, security, and fraud prevention must converge to build trust and resilience in an era where agents—not users—control the experience.
Key Takeaways:
• Understand the Shift: Learn how AI browsers and agentic AI are transforming the customer journey and challenging legacy identity architectures.
• Prepare for Identity Convergence: Discover why unifying authentication, IDV, and fraud prevention through orchestration is essential to protect both humans and their digital agents.
• Build for the Future: Gain actionable guidance on designing adaptive, intelligence-driven identity systems that secure trust in the age of autonomous digital agents.
In this interactive session, our event partners will take the lead in initiating and facilitating conversations centered on challenges and solutions within the industry. Attendees can expect dynamic discussions where diverse perspectives are shared, fostering collaborative problem-solving and the exploration of innovative solutions to common industry hurdles.
We like to believe we are rational creatures living in rational systems, but we are emotional primates operating inside planetary-scale software. Every new technology doesn’t just add tools – it reshapes behaviour, incentives, and culture at scale. This session explores how the collision of human nature and exponential technology is quietly rewriting leadership, organizations, and society, and why the future isn’t artificial intelligence, but augmented humanity – if we’re brave enough to design it that way. Are we?
As workforces become more distributed, automated, and AI-enabled, security culture has become a leadership imperative. This session explores how organizations in 2026 are moving beyond awareness training to embed security into everyday decision-making. Learn how leaders are aligning people, processes, and technology to reduce human risk, support productivity, and build a resilient security culture at scale.
While many organizations have experimented with AI, moving from pilots to measurable operational impact remains a challenge. This session will share practical lessons from enterprises using AI to streamline internal workflows, improve efficiency, and support teams without adding complexity. We’ll cover where AI is delivering real value today, common friction points that slow adoption, and how leaders can prioritize the right use cases and measure outcomes effectively.
3 Key Takeaways:
• How to identify AI use cases that drive real operational value, not just experimentation
• Where teams typically face friction when scaling AI beyond pilots
• Practical approaches to measuring impact and aligning AI initiatives with business goals
Cybercrime has become an industry with its own supply chains, customer service models, and R&D divisions. This session explores how the underground cyber economy operates and what CISOs must do to counteract it.
Key Takeaways:
How cybercriminals operate as businesses.
Emerging threats from cybercrime-as-a-service.
Strategies to proactively disrupt cybercriminal ecosystems.
Financial institutions are under growing pressure to modernize legacy platforms while maintaining resilience, security, and regulatory compliance. This session explores how AI-driven digital transformation enables organizations to evolve complex, mission-critical systems into scalable, cloud-ready, and intelligent platforms. Drawing from real-world financial services experience, it highlights how software intelligence, automation, and AI can reduce technical debt, improve operational transparency, and accelerate modernization without disrupting core business functions. Attendees will gain practical insights into integrating AI with legacy environments to enhance resilience, optimize performance, and build a future-ready digital foundation that supports innovation at scale.
Discover how AI eliminates the grind of audit evidence collection. Regulatory exams are accelerating and so is the complexity of the evidence they demand. This session gives an inside look at how AI is transforming one of the most operationally painful areas of cyber oversight: compiling, validating, and delivering audit ready evidence. You’ll hear how Information Security teams are cutting turnaround times by up to 70%, reducing audit observations, and strengthening control assurance through AI driven retrieval and analysis.
A strong security plan is useless without testing. This session explores how CISOs can run tabletop exercises to simulate real-world cyber incidents and improve response strategies.
Key Takeaways:
How to structure an effective cybersecurity tabletop exercise.
Common gaps uncovered in incident response plans.
Case studies of companies improving security posture through simulation.
Rushed digital transformation can leave enterprises burdened with digital debt—outdated, inefficient, or misaligned technology. This session uncovers strategies to identify, mitigate, and recover from digital debt.
Key Takeaways:
How to assess and quantify digital debt.
Strategies to phase out inefficient IT investments.
Preventing future digital debt through agile tech adoption.
Cyber warfare is increasingly being used as a tool for geopolitical influence. This session explores how businesses should prepare for politically motivated cyber threats.
Key Takeaways:
Understanding how nation-state cyber threats operate.
The role of cyber diplomacy in international business security.
Strategies for mitigating geopolitical cyber risks.
In this Quick Tech Tale, Dilip Nath cuts through the AI hype to share a pragmatic view of why so many AI initiatives fail to deliver real business value. Despite accelerating investment and executive pressure to adopt AI, organisations continue to struggle with poor planning, unrealistic expectations, weak data foundations, and unclear ownership between technology and the business. Drawing on real-world experience, Dilip explores the gap between promising AI pilots and scalable, value-driven outcomes. He highlights why technical performance alone is not enough, and why success depends on operational integration, measurable business impact, and leadership alignment. The session will also touch on the human dimension of AI adoption – from cross-functional collaboration and skills to trust in AI-driven decisions. This fast-paced session offers practical insights on how to avoid common pitfalls, set realistic expectations, and turn AI ambition into sustainable, business-led execution.
Organizations face increasingly interconnected risks that cannot be effectively managed through traditional siloed approaches, with cybersecurity now representing a systemic enterprise risk that spans operational, financial, regulatory, and reputational domains. This presentation introduces systems thinking as a for integrating cybersecurity into enterprise risk management (ERM), emphasizing how risks emerge from interactions among technology, people, processes, and governance rather than isolated failures. It highlights the use of feedback loops, interdependencies, and resilience-focused controls to identify systemic risk nodes, align cyber risk with business objectives, and enable adaptive, continuous risk management. Designed for boards, executives, and risk leaders, the session demonstrates how systems thinking strengthens organizational resilience, improves risk-informed decision-making, and positions cybersecurity as a strategic component of ERM rather than a standalone technical function.
The Adaptive Leader – Navigating Disruption and Digital Complexity
Digital disruption and increasing complexity are reshaping how organisations lead, decide, and execute. Discuss how leaders are adapting leadership approaches, governance, and decision-making to remain effective in fast-changing, technology-driven environments.
AI Upskilling at Scale: Lessons Learned from Early Adopters
As AI adoption accelerates, the real challenge is building the skills and confidence to use it effectively. This roundtable will explore how leaders can deliver AI training that moves beyond awareness to real capability, discussing what good AI training looks like, how to scale it across roles, and how AI literacy supports responsible and impactful use.
Half the Talent, Double the Risk: Rethinking Gender and the Cyber Workforce Gap
The global cybersecurity skills shortage continues to grow, yet large segments of potential talent remain underrepresented. This roundtable explores how gender diversity plays a critical role in closing the cyber skills gap, retention challenges, and practical strategies organizations can use to build more resilient cyber teams. Attendees will share perspectives on how the talent gap is not only an equity issue, but a security and business imperative.
Resilience Before Recovery: Strengthening Strategy and Security in a Continuously Changing Technology World
In a technology landscape defined by constant change, resilience must be built in before disruption occurs. Join this table to explore with peers how to strengthen strategy and security to stay resilient, responsive, and prepared in an environment where recovery alone is no longer enough.
Take a break, engage in meetings or join a discussion roundtable! During this PM Power Break, fellow enterprise leaders will guide discussions on their favorite topic, fostering an environment of open exchange, exploration of diverse perspectives and experiences. Attendees can grab a coffee and anticipate engaging conversations through 1-2-1 meetings and roundtables. Conversations will be driven by shared challenges and interests, offering valuable insights and opportunities for collaborative learning and networking.
When a cyber breach happens, legal, media, and customer responses can be as damaging as the attack itself. This session explores how CISOs can work with PR and legal teams to manage crisis communication.
Key Takeaways:
How to prepare a cyber crisis communication playbook.
The importance of transparency in breach reporting.
Best practices from companies that successfully managed cyber crises.
Spending on technology, risk, and resilience continues to accelerate as organisations respond to regulation, digital change, and growing operational complexity. Yet disruption, skills gaps, and execution challenges persist, raising questions about how effectively this investment is translating into real and ROI. . This panel brings together different executives to provide an industry view on how investment decisions are made, prioritised, and evaluated across the organisation. From board-level strategy to operational execution, speakers will share how different leadership roles assess value and impact in an increasingly complex risk environment. Join us for this closing session as we focus on how organisations can approach investment more intelligently and how success should be measured when budgets are under pressure and risk is constant.
Key Discussion Takeaways
• Why higher spend hasn’t consistently reduced risk
• How finance, executive, and technology leaders assess value differently
• What smarter investment and measurement should look like going forward
Well& by Durst - Amenity, Events & Meeting Space, West 42nd Street, New York, NY, USA
Well& by Durst - Amenity, Events & Meeting Space, West 42nd Street, New York, NY, USA
See what attendees, speakers and sponsors say about our events.
“I attended because the list of speakers was an attraction, and the time of the year also worked for me. It met my expectations. I was planning on leaving earlier, but stayed all through because I did not want to miss anything."
“I enjoyed the people, the interaction, the conversations and insights on what happening currently or near term in the industry, also the exceptional customer service by the team and staff, the intimacy EDS showed me throughout the event, I wasn’t left on an island. "
“I had lots of fun and met a lot of great people there & most importantly I learned a few things as well."
“I attended last year’s EDS CIO CISO event and thought the speakers and content were excellent. This year was even better with a good mix of topics and some interesting participants."
“I was impressed by all of the speakers and took away some interesting insights from the participants. The EDS team was well organized and made things flow well, and the event location / venue was great."
“This was well worth the trip and would certainly attend again if invited."
“This event is definitely better than others I've attended - service-oriented and really focused on ensuring a lot of dialogue. Both in 1:1 interactions and at the tables. Very well done."
“Interesting agenda, top experts and speakers, expectations were fully met by the participants and presentations. The event was great, vibrant until the end and at a great venue!"
“This is in the Top 5 of my best IT conferences to date, including commercial events. I already recommended EDS to my colleagues."
“It was a real value for me to be part of your event. You did a great job in organizing and performing."
“Attending EDS events as a CTO opened doors to insightful discussions and connections that felt truly genuine. It's not often you find such a perfect blend of knowledge sharing and camaraderie."
“Another great event! The atmosphere is relaxed yet intellectually stimulating, making it easy to connect with peers and exchange real-world insights with real CISOs."
“Thank you EDS. Your gatherings are refreshing and I always leave feeling inspired and armed with actionable ideas for our digital strategy."
“Sponsoring EDS events has been a fantastic opportunity for us. The focus on genuine engagement rather than just promotion allows us to build lasting relationships with industry leaders in a natural, authentic way."
“I've been attending EDS dinners as a CIO for a while now, and they never disappoint. The blend of thought-provoking discussions and genuine connections is unmatched in the industry."
“EDS events provide an invaluable platform for CISOs like myself to exchange ideas and best practices in a relaxed, yet professional setting. The conversations are always real and relevant. Thank you EDS team!"
“We're repeat sponsors of EDS dinners for a reason! Each time, we get unique opportunities to connect with decision-makers on a personal level. It's not just about business; it's about building authentic relationships, every time"
“EDS events have become a staple for me as a CDO"
“Sponsoring EDS events has been a breath of fresh air. The focus on quality over quantity ensures that our brand gets genuine exposure to the right audience in a way that feels natural and human."
Attendance is reserved for C-Suite executives and Senior Executives within IT, including Chief Information Officers, Chief Technology Officers, and other senior IT decision-makers from a wide array of industries. Joined by our select sponsor partners, enriching networking opportunities and offering cutting-edge solutions.
Thanks to our sponsors, your access is entirely complimentary, providing you with full-day access to all presentations, exclusive networking sessions, personalised one-to-one meetings, delectable catering, and an open bar for added networking.
These 25-minute meetings provide invaluable opportunities to discover new solutions and expand your network with leading innovative providers that can help solve your current or future complex challenges.
Professional business attire is appropriate.
No preparation is needed on your part. We take care of all the final details. Simply arrive at the specified time, date, and location, and we’ll handle the rest to ensure you have a seamless and enjoyable experience.
Our events offer unparalleled experiences where interactive sessions spark innovation, keynotes unveil insights from industry luminaries, and exclusive one-on-one meetings with best-in-breed solution providers unfold in some of the world’s most prestigious venues. This unique format ensures that your challenges are addressed directly, providing invaluable insights, connections, and maximising value for your time. With a compact schedule featuring a variety of presentations, you’ll gain a comprehensive view of the latest innovations and have ample opportunity to network with like-minded peers—all under one roof, and in just one day. This fosters collaboration and forges invaluable connections among executives with a genuine influence, setting the standard for elite gatherings in the industry.
Get in touch here