Don’t miss out

CIOXNew York

14 Apr 2026

Well& by Durst, One Five One, New York

Welcome to CIOXNew York, the premier event exclusively designed for accomplished CIOs across NY, US. Step into the forefront of strategic technology leadership as we navigate the evolving post-pandemic landscape and unlock unparalleled opportunities for enterprise success. Join us at CIOXNew York, where visionary CIOs converge to engage in transformative discussions, gain strategic insights, and address the pressing challenges shaping the world of enterprise technology.

intro

Speakers

Accelerate your network growth

Secure up to twelve exclusive meetings with relevant leads at CIOXNewYork maximising your opportunity to forge valuable connections and drive business growth.

Become a sponsor

Learn from industry titans

Immerse yourself in thought-provoking discussions, as top leaders share their expertise and provide you with invaluable insights to propel your strategic initiatives forward.

Forge meaningful Connections

Engage with industry peers, thought-leaders, and solution providers to foster meaningful connections and explore collaborative opportunities that drive innovation and growth.

Agenda

Discover what awaits you at CIOXNew York.

Registration & Networking Breakfast

Welcome & Opening Remarks From EDS

OPENING PANEL: What Does the Board Really Care About? New Metrics CIOs and CISOs Must Own in 2026

  • Raghu Sankaran
    CIO & CISO Scholastic
  • Radhika Bajpai
    CISO Russell Investments
  • Olusegun Opeyemi-Ajayi
    CISO NYC DOT
  • Angela Chen
    CIO, VP of IT University Of Delaware

In 2026, enterprise leadership is no longer judged by uptime, cost savings, or isolated KPIs. Boards, investors, and regulators are asking for answers to tougher questions:
How does technology drive growth? How is AI adoption impacting enterprise performance and risk? How resilient is the business under pressure?
This opening panel brings CIOs and CISOs together to explore the metrics that truly matter to boards – from digital resilience to AI-enabled business outcomes. Participants will learn how to translate complex technology initiatives into measurable business impact, align IT and security priorities with corporate goals, and take ownership of the outcomes that matter most. We will identify what to measure, what to retire, and how to align technology, security, and business leadership around shared metrics that drive growth, resilience, and long-term value.

Key Discussion Points:
• Identify the enterprise performance and resilience metrics boards will prioritise in 2026.
• Understand how AI initiatives create shared accountability across technology and business teams.
• Learn how CIOs and CISOs can translate technology and security outcomes into business language that drives strategic decisions.

Attack Paths, Not Vulnerabilities: Lessons from 200k Pentests

  • Joshua Knox
    Principal Cybersecurity Strategist Horizon3 AI

Security leaders are under pressure to demonstrate resilience, justify investment, and explain risk in terms boards actually understand. Yet most security metrics still measure activity, such as vulnerabilities scanned, controls deployed, and tools purchased, not whether attackers can succeed.

After running more than 200k autonomous pentests across on-prem, cloud, and hybrid environments, a consistent pattern has emerged: attackers rarely need CVEs. They exploit weak credentials, misconfigurations, and misplaced security efforts to create real attack paths that lead to data access, ransomware, or domain-level control, often in minutes.

In this session, Joshua Knox, Principal Cybersecurity Strategist at Horizon3.ai, explains what these attack patterns mean for executives accountable for cyber risk. Drawing on an attacker’s perspective and real-world outcomes, he shows how leading organizations are rethinking prioritization, measurement, and remediation by shifting from vulnerability volume to attack-path risk, and from effort-based reporting to proof of resilience.

Attendees will leave with a practical framework for:
– Understanding why attack paths, not individual vulnerabilities, are the right unit of risk for executive decision-making
– Identifying the small set of metrics that show whether cyber risk is actually decreasing over time
– Turning proof of exploitability into faster remediation, clearer ownership, and fewer repeat failures

Cyber resilience isn’t about eliminating every weakness. It’s about knowing and proving what attackers can actually do, and getting measurably better over time.

SPOTLIGHT FORUM: The Rise of AI Agents - Human Identity vs Machine Identity

  • Kevin Walsh
    CISO PCHI
  • Nashira Spencer
    CISO Stich Fix

As AI agents become autonomous decision-makers, collaborators, and digital representatives, enterprises must confront a new question: how does human identity evolve alongside machine identity? This open forum explores the cultural, ethical, and operational implications of agentive AI, from workforce augmentation to digital trust, and invites participants to share real-world experiences shaping this emerging landscape.

Key Takeaways:
• Understand how AI agents are reshaping personal, organizational, and digital identity.
• Explore the implications for workforce roles, privacy, trust, and governance.
• Discuss practical steps enterprises can take to balance human autonomy with machine-driven efficiency.

Securing Tomorrow — Rethinking Data Recovery Strategies


  • Veeam

CISOs are challenged by the growing sophistication of cyberattacks and the increasing complexity of IT environments, making traditional recovery approaches insufficient. Ensuring rapid, reliable recovery is now central to organizational resilience and trust, yet many security leaders struggle to integrate recovery into overall security strategy. Exploring new paradigms in cyber recovery can empower CISOs to proactively safeguard business continuity.

Join this session to explore:
• Integrating recovery into incident response plans
• Assessing cyber resilience beyond prevention
• Bridging gaps between security and IT operations

AM BREAK & 1:1 Xchange

ROUNDTABLE XCHANGES: Discussions on Shared Challenges

  • David Matalon
    Founder and CEO Venn
  • Kasimir Schulz
    Director, Security Research Hidden Layer
  • Austin Starowicz
    Director, Solutions Consulting Mastercard Cybersecurity
  • David Madhi
    Chief Identity Officer Transmit Security
  • Can IT Keep Control When Work Happens on Personal Laptops?

    Remote teams now include contractors, consultants, offshore workers, and employees – many working from personal laptops with access to regulated data and critical systems. But traditional approaches to control – corporate-issued devices and virtual desktops – often add cost, friction, and complexity that don’t scale.

    In this roundtable, we’ll unpack what “control” means in 2026 when IT doesn’t own the endpoint: how forward-looking leaders separate work from personal activity, enforce DLP, maintain auditability on unmanaged devices, shorten onboarding/offboarding cycles, and preserve local app performance. You’ll leave with clear decision criteria to assess whether your remote compute model can scale securely and efficiently.

  • Managing the Invisible Insider: When Agentic AI Becomes the Threat

    Agentic AI systems have moved beyond answering questions. They are taking actions in the real world. That shift introduces a new, insider-like risk profile: autonomous systems operating at machine speed, with broad access to tools, workflows, and data. This roundtable is designed to make that risk concrete and practical. We will start by mapping the emerging threat landscape, drawing on real-world adversarial research against major agentic platforms to show how prompt injection, tool poisoning, and cascading compromise can quietly turn trusted agents into threats at scale. From there, we will focus on what to do about it: how to scope permissions, establish accountability for autonomous actions, and define pragmatic boundaries for human oversight. We will also explore guardrails that meaningfully constrain agent behavior without eroding the speed and utility that make agentic AI attractive in the first place.

    What You’ll Gain:
    1. Hear how peers are assessing insider-like risk in agentic systems, including prompt injection, tool poisoning, and cascading agent compromise.
    2. Compare approaches to governance: permission scoping, accountability models, and where teams are drawing the line on human oversight.
    3. Leave with actionable strategies and sharper questions to bring back to your team as you operationalize controls for autonomous AI.

  • From Insight to Action: Redefining Cyber Risk with Intelligent Defense

    As digital ecosystems expand, CISOs face an increasingly complex and dynamic threat landscape. Traditional risk frameworks struggle to keep pace with the scale and speed of attacks. This session explores how threat intelligence, advanced analytics, and AI-driven insights can help organizations predict, prioritize, and prevent cyber risk across internal and third-party environments.

    Join fellow security leaders to uncover how actionable intelligence and automation can bridge the gap between awareness and response—transforming cyber risk management into a proactive, data-driven discipline.

    Key Learnings:
    • Ways to integrate threat intelligence into enterprise and third-party risk programs
    • Strategies to turn complex data into actionable, real-time defense decisions
    • Best practices for aligning people, processes, and technology for intelligent resilience

  • Consumer IAM: The AI Browser Era Makes Identity Convergence Inevitable

    As AI browsers and agentic AI redefine digital interactions, the traditional, human-driven customer journey is being replaced by autonomous agents acting on users’ behalf. This evolution unlocks new levels of personalization and efficiency but also threatens to break legacy identity systems not designed for an AI-driven web. In this session, we’ll explore how identity, security, and fraud prevention must converge to build trust and resilience in an era where agents—not users—control the experience.
    Key Takeaways:
    • Understand the Shift: Learn how AI browsers and agentic AI are transforming the customer journey and challenging legacy identity architectures.
    • Prepare for Identity Convergence: Discover why unifying authentication, IDV, and fraud prevention through orchestration is essential to protect both humans and their digital agents.
    • Build for the Future: Gain actionable guidance on designing adaptive, intelligence-driven identity systems that secure trust in the age of autonomous digital agents.

In this interactive session, our event partners will take the lead in initiating and facilitating conversations centered on challenges and solutions within the industry. Attendees can expect dynamic discussions where diverse perspectives are shared, fostering collaborative problem-solving and the exploration of innovative solutions to common industry hurdles.

CIO TRACK: Carbon Meets Silicon: How Technology Is Quietly Rewriting Humanity

  • Atti Riazi
    CIO Hearst

We like to believe we are rational creatures living in rational systems, but we are emotional primates operating inside planetary-scale software. Every new technology doesn’t just add tools – it reshapes behaviour, incentives, and culture at scale. This session explores how the collision of human nature and exponential technology is quietly rewriting leadership, organizations, and society, and why the future isn’t artificial intelligence, but augmented humanity – if we’re brave enough to design it that way. Are we?

CISO TRACK: Building a Security Culture for the 2026 Workforce

  • Jim Trainor
    Vice President Cybersecurity State Street

As workforces become more distributed, automated, and AI-enabled, security culture has become a leadership imperative. This session explores how organizations in 2026 are moving beyond awareness training to embed security into everyday decision-making. Learn how leaders are aligning people, processes, and technology to reduce human risk, support productivity, and build a resilient security culture at scale.

CIO TRACK: Quick Tech Tale! From AI Pilots to Real Impact: What’s Actually Working in the Enterprise

  • JD Geiger
    Head of Enterprise Solutions Stack AI

While many organizations have experimented with AI, moving from pilots to measurable operational impact remains a challenge. This session will share practical lessons from enterprises using AI to streamline internal workflows, improve efficiency, and support teams without adding complexity. We’ll cover where AI is delivering real value today, common friction points that slow adoption, and how leaders can prioritize the right use cases and measure outcomes effectively.

3 Key Takeaways:
• How to identify AI use cases that drive real operational value, not just experimentation
• Where teams typically face friction when scaling AI beyond pilots
• Practical approaches to measuring impact and aligning AI initiatives with business goals

CISO TRACK: Quick Tech Tale! The Dark Web Economy: How Cybercriminals Are Evolving Their Business Models


  • Sublime Security

Cybercrime has become an industry with its own supply chains, customer service models, and R&D divisions. This session explores how the underground cyber economy operates and what CISOs must do to counteract it.

Key Takeaways:

How cybercriminals operate as businesses.
Emerging threats from cybercrime-as-a-service.
Strategies to proactively disrupt cybercriminal ecosystems.

LUNCH & 1:1 Xchange

CIO TRACK: AI-Driven Digital Transformation in Financial Services: Modernizing Legacy Platforms for Resilience and Scale

  • Girish Gajwani
    Vice President Information Technology Barclays

Financial institutions are under growing pressure to modernize legacy platforms while maintaining resilience, security, and regulatory compliance. This session explores how AI-driven digital transformation enables organizations to evolve complex, mission-critical systems into scalable, cloud-ready, and intelligent platforms. Drawing from real-world financial services experience, it highlights how software intelligence, automation, and AI can reduce technical debt, improve operational transparency, and accelerate modernization without disrupting core business functions. Attendees will gain practical insights into integrating AI with legacy environments to enhance resilience, optimize performance, and build a future-ready digital foundation that supports innovation at scale.

CISO TRACK: Quick Tech Tale! AI Success Story - Regulatory Examination Evidence Handling

  • Angela Silva
    Vice President, Information Security Lloyds Banking Group

Discover how AI eliminates the grind of audit evidence collection. Regulatory exams are accelerating and so is the complexity of the evidence they demand. This session gives an inside look at how AI is transforming one of the most operationally painful areas of cyber oversight: compiling, validating, and delivering audit ready evidence. You’ll hear how Information Security teams are cutting turnaround times by up to 70%, reducing audit observations, and strengthening control assurance through AI driven retrieval and analysis.

CIO TRACK: Incident Response Tabletop Exercises: Why Your Security Team Needs Them Now


  • A strong security plan is useless without testing. This session explores how CISOs can run tabletop exercises to simulate real-world cyber incidents and improve response strategies.

    Key Takeaways:
    How to structure an effective cybersecurity tabletop exercise.
    Common gaps uncovered in incident response plans.
    Case studies of companies improving security posture through simulation.

Rushed digital transformation can leave enterprises burdened with digital debt—outdated, inefficient, or misaligned technology. This session uncovers strategies to identify, mitigate, and recover from digital debt.

Key Takeaways:

How to assess and quantify digital debt.
Strategies to phase out inefficient IT investments.
Preventing future digital debt through agile tech adoption.

CISO TRACK: The Rise of Cyber Diplomacy: Global Strategies for Tackling Nation-State Attacks


Cyber warfare is increasingly being used as a tool for geopolitical influence. This session explores how businesses should prepare for politically motivated cyber threats.

Key Takeaways:

Understanding how nation-state cyber threats operate.
The role of cyber diplomacy in international business security.
Strategies for mitigating geopolitical cyber risks.

CIO TRACK: Quick Tech Tale! Diagnosing AI Failure - Why Business-Led Projects Collapse and How to Turn Them Around

  • Dilip Nath
    VP & CIO SUNY Downstate Health Sciences University

In this Quick Tech Tale, Dilip Nath cuts through the AI hype to share a pragmatic view of why so many AI initiatives fail to deliver real business value. Despite accelerating investment and executive pressure to adopt AI, organisations continue to struggle with poor planning, unrealistic expectations, weak data foundations, and unclear ownership between technology and the business. Drawing on real-world experience, Dilip explores the gap between promising AI pilots and scalable, value-driven outcomes. He highlights why technical performance alone is not enough, and why success depends on operational integration, measurable business impact, and leadership alignment. The session will also touch on the human dimension of AI adoption – from cross-functional collaboration and skills to trust in AI-driven decisions. This fast-paced session offers practical insights on how to avoid common pitfalls, set realistic expectations, and turn AI ambition into sustainable, business-led execution.

CISO TRACK: Quick Tech Tale! Applying Systems Thinking to Cybersecurity Risk Management Within an Enterprise Risk Framework

  • Harish Jayabalan
    EVP, Chief Risk Officer & CISO Miami International Holdings INC

Organizations face increasingly interconnected risks that cannot be effectively managed through traditional siloed approaches, with cybersecurity now representing a systemic enterprise risk that spans operational, financial, regulatory, and reputational domains. This presentation introduces systems thinking as a for integrating cybersecurity into enterprise risk management (ERM), emphasizing how risks emerge from interactions among technology, people, processes, and governance rather than isolated failures. It highlights the use of feedback loops, interdependencies, and resilience-focused controls to identify systemic risk nodes, align cyber risk with business objectives, and enable adaptive, continuous risk management. Designed for boards, executives, and risk leaders, the session demonstrates how systems thinking strengthens organizational resilience, improves risk-informed decision-making, and positions cybersecurity as a strategic component of ERM rather than a standalone technical function.

PM BREAK & 1:1 Xchange + Community Conversations

Community Conversations

  • Patrick Alderson
    CIO Albany County NY
  • Sharon Dhall
    CIO Kroll
  • Christopher Buchanan
    Director of Cyber Security Fitch Group
  • Faith Rotimi
    AVP - Operational Risk Tech. Business & Cyber Resilience Morgan Stanley
  • The Adaptive Leader – Navigating Disruption and Digital Complexity
    Digital disruption and increasing complexity are reshaping how organisations lead, decide, and execute. Discuss how leaders are adapting leadership approaches, governance, and decision-making to remain effective in fast-changing, technology-driven environments.

  • AI Upskilling at Scale: Lessons Learned from Early Adopters
    As AI adoption accelerates, the real challenge is building the skills and confidence to use it effectively. This roundtable will explore how leaders can deliver AI training that moves beyond awareness to real capability, discussing what good AI training looks like, how to scale it across roles, and how AI literacy supports responsible and impactful use.

  • Half the Talent, Double the Risk: Rethinking Gender and the Cyber Workforce Gap
    The global cybersecurity skills shortage continues to grow, yet large segments of potential talent remain underrepresented. This roundtable explores how gender diversity plays a critical role in closing the cyber skills gap, retention challenges, and practical strategies organizations can use to build more resilient cyber teams. Attendees will share perspectives on how the talent gap is not only an equity issue, but a security and business imperative.

  • Resilience Before Recovery: Strengthening Strategy and Security in a Continuously Changing Technology World
    In a technology landscape defined by constant change, resilience must be built in before disruption occurs. Join this table to explore with peers how to strengthen strategy and security to stay resilient, responsive, and prepared in an environment where recovery alone is no longer enough.

Take a break, engage in meetings or join a discussion roundtable! During this PM Power Break, fellow enterprise leaders will guide discussions on their favorite topic, fostering an environment of open exchange, exploration of diverse perspectives and experiences. Attendees can grab a coffee and anticipate engaging conversations through 1-2-1 meetings and roundtables. Conversations will be driven by shared challenges and interests, offering valuable insights and opportunities for collaborative learning and networking.

Why You Need a Crisis Communications Plan Before a Cyber Incident

  • Rob Preta
    Data Security and AI Governance Officer Cyera

When a cyber breach happens, legal, media, and customer responses can be as damaging as the attack itself. This session explores how CISOs can work with PR and legal teams to manage crisis communication.

Key Takeaways:

How to prepare a cyber crisis communication playbook.
The importance of transparency in breach reporting.
Best practices from companies that successfully managed cyber crises.

CLOSING PANEL: The Cost of Technology - Where Investment Delivers and Where It Doesn’t

  • Jim Panos
    CIO Central National Gottesman Inc
  • Sumeet Sharma
    Director Global Corporate Technologies International Flavors & Fragrances
  • Josh Felipe
    VP Data Analytics and Innovation TD Securities
  • Jason LaBerteaux
    AVP & Assistant General Counsel MetLife

Spending on technology, risk, and resilience continues to accelerate as organisations respond to regulation, digital change, and growing operational complexity. Yet disruption, skills gaps, and execution challenges persist, raising questions about how effectively this investment is translating into real and ROI. . This panel brings together different executives to provide an industry view on how investment decisions are made, prioritised, and evaluated across the organisation. From board-level strategy to operational execution, speakers will share how different leadership roles assess value and impact in an increasingly complex risk environment. Join us for this closing session as we focus on how organisations can approach investment more intelligently and how success should be measured when budgets are under pressure and risk is constant.

Key Discussion Takeaways
• Why higher spend hasn’t consistently reduced risk
• How finance, executive, and technology leaders assess value differently
• What smarter investment and measurement should look like going forward

Closing Remarks

Drinks Reception

Apply to Attend

Location

Well& by Durst - Amenity, Events & Meeting Space, West 42nd Street, New York, NY, USA

Well& by Durst - Amenity, Events & Meeting Space, West 42nd Street, New York, NY, USA

Past Events

Testimonials

See what attendees, speakers and sponsors say about our events.

FAQs

Who attends?

Attendance is reserved for C-Suite executives and Senior Executives within IT, including Chief Information Officers, Chief Technology Officers, and other senior IT decision-makers from a wide array of industries. Joined by our select sponsor partners, enriching networking opportunities and offering cutting-edge solutions.

What does my delegate pass include?

Thanks to our sponsors, your access is entirely complimentary, providing you with full-day access to all presentations, exclusive networking sessions, personalised one-to-one meetings, delectable catering, and an open bar for added networking.

What are the one-on-one meetings?

These 25-minute meetings provide invaluable opportunities to discover new solutions and expand your network with leading innovative providers that can help solve your current or future complex challenges.

What is the dress code?

Professional business attire is appropriate.

Do I need to prepare anything?

No preparation is needed on your part. We take care of all the final details. Simply arrive at the specified time, date, and location, and we’ll handle the rest to ensure you have a seamless and enjoyable experience.

Why attend?

Our events offer unparalleled experiences where interactive sessions spark innovation, keynotes unveil insights from industry luminaries, and exclusive one-on-one meetings with best-in-breed solution providers unfold in some of the world’s most prestigious venues. This unique format ensures that your challenges are addressed directly, providing invaluable insights, connections, and maximising value for your time. With a compact schedule featuring a variety of presentations, you’ll gain a comprehensive view of the latest innovations and have ample opportunity to network with like-minded peers—all under one roof, and in just one day. This fosters collaboration and forges invaluable connections among executives with a genuine influence, setting the standard for elite gatherings in the industry.

Have any more questions?

Get in touch here

Have any more questions?

Get in touch