Don’t miss out

CIOXNew York

14 Apr 2026

Well& by Durst, One Five One, New York

Welcome to CIOXNew York, the premier event exclusively designed for accomplished CIOs across NY, US. Step into the forefront of strategic technology leadership as we navigate the evolving post-pandemic landscape and unlock unparalleled opportunities for enterprise success. Join us at CIOXNew York, where visionary CIOs converge to engage in transformative discussions, gain strategic insights, and address the pressing challenges shaping the world of enterprise technology.

intro

Speakers

Accelerate your network growth

Secure up to twelve exclusive meetings with relevant leads at CIOXNewYork maximising your opportunity to forge valuable connections and drive business growth.

Become a sponsor

Learn from industry titans

Immerse yourself in thought-provoking discussions, as top leaders share their expertise and provide you with invaluable insights to propel your strategic initiatives forward.

Forge meaningful Connections

Engage with industry peers, thought-leaders, and solution providers to foster meaningful connections and explore collaborative opportunities that drive innovation and growth.

Agenda

Discover what awaits you at CIOXNew York.

Registration & Networking Breakfast

Welcome & Opening Remarks From EDS

OPENING PANEL: What Does the Board Really Care About? New Metrics CIOs and CISOs Must Own in 2026

  • Raghu Sankaran
    CIO & CISO Scholastic
  • Radhika Bajpai
    CISO Russell Investments
  • Olusegun Opeyemi-Ajayi
    CISO NYC DOT

In 2026, enterprise leadership is no longer judged by uptime, cost savings, or isolated KPIs. Boards, investors, and regulators are asking for answers to tougher questions:
How does technology drive growth? How is AI adoption impacting enterprise performance and risk? How resilient is the business under pressure?
This opening panel brings CIOs and CISOs together to explore the metrics that truly matter to boards – from digital resilience to AI-enabled business outcomes. Participants will learn how to translate complex technology initiatives into measurable business impact, align IT and security priorities with corporate goals, and take ownership of the outcomes that matter most. We will identify what to measure, what to retire, and how to align technology, security, and business leadership around shared metrics that drive growth, resilience, and long-term value.

Key Discussion Points:
• Identify the enterprise performance and resilience metrics boards will prioritise in 2026.
• Understand how AI initiatives create shared accountability across technology and business teams.
• Learn how CIOs and CISOs can translate technology and security outcomes into business language that drives strategic decisions.

Attack Paths, Not Vulnerabilities: Lessons from 200k Pentests

  • Joshua Knox
    Principal Cybersecurity Strategist Horizon3 AI

Security leaders are under pressure to demonstrate resilience, justify investment, and explain risk in terms boards actually understand. Yet most security metrics still measure activity, such as vulnerabilities scanned, controls deployed, and tools purchased, not whether attackers can succeed.

After running more than 200k autonomous pentests across on-prem, cloud, and hybrid environments, a consistent pattern has emerged: attackers rarely need CVEs. They exploit weak credentials, misconfigurations, and misplaced security efforts to create real attack paths that lead to data access, ransomware, or domain-level control, often in minutes.

In this session, Joshua Knox, Principal Cybersecurity Strategist at Horizon3.ai, explains what these attack patterns mean for executives accountable for cyber risk. Drawing on an attacker’s perspective and real-world outcomes, he shows how leading organizations are rethinking prioritization, measurement, and remediation by shifting from vulnerability volume to attack-path risk, and from effort-based reporting to proof of resilience.

Attendees will leave with a practical framework for:
– Understanding why attack paths, not individual vulnerabilities, are the right unit of risk for executive decision-making
– Identifying the small set of metrics that show whether cyber risk is actually decreasing over time
– Turning proof of exploitability into faster remediation, clearer ownership, and fewer repeat failures

Cyber resilience isn’t about eliminating every weakness. It’s about knowing and proving what attackers can actually do, and getting measurably better over time.

SPOTLIGHT FORUM: The Rise of AI Agents - Human Identity vs Machine Identity

  • Kevin Walsh
    CISO PCHI
  • Nashira Spencer
    CISO Stich Fix
  • David Fapohunda
    Managing Director, Operations Strategy, Transformation, Data Science & Analytics, and Delivery Barclays
  • Shipali Jangra
    Director, Digital Product Management American Express

As AI agents become autonomous decision-makers, collaborators, and digital representatives, enterprises must confront a new question: how does human identity evolve alongside machine identity? This open forum explores the cultural, ethical, and operational implications of agentive AI, from workforce augmentation to digital trust, and invites participants to share real-world experiences shaping this emerging landscape.

Key Takeaways:
• Understand how AI agents are reshaping personal, organizational, and digital identity.
• Explore the implications for workforce roles, privacy, trust, and governance.
• Discuss practical steps enterprises can take to balance human autonomy with machine-driven efficiency.

Securing Tomorrow — Rethinking Data Recovery Strategies

  • Derran Guinan
    Field CTO Veeam

CISOs are challenged by the growing sophistication of cyberattacks and the increasing complexity of IT environments, making traditional recovery approaches insufficient. Ensuring rapid, reliable recovery is now central to organizational resilience and trust, yet many security leaders struggle to integrate recovery into overall security strategy. Exploring new paradigms in cyber recovery can empower CISOs to proactively safeguard business continuity.

Join this session to explore:
• Integrating recovery into incident response plans
• Assessing cyber resilience beyond prevention
• Bridging gaps between security and IT operations

AM BREAK & 1:1 Xchange

ROUNDTABLE XCHANGES: Discussions on Shared Challenges

  • David Matalon
    Founder and CEO Venn
  • Kasimir Schulz
    Director, Security Research Hidden Layer
  • Austin Starowicz
    Director, Solutions Consulting Mastercard Cybersecurity
  • Sagi Rodin
    CEO and Co-Founder Agen.co
  • The Unmanaged Endpoint Problem: Rethinking Risk in a Distributed Workforce

    Today’s distributed workforces extend well beyond full-time employees on corporate-issued hardware. Contractors, consultants, offshore teams, and hybrid workers routinely access regulated data and critical systems from personal laptops – devices that live entirely outside IT’s control. Most enterprise security architectures weren’t designed for this reality, and the gap between policy and exposure is where risk accumulates.

    In this roundtable, we’ll examine what governance, auditability, and data protection actually look like when the company doesn’t own the device: how forward-looking CIOs and CISOs are defining enforceable boundaries on unmanaged endpoints, enforcing policy, maintaining regulatory defensibility, and evaluating whether their remote compute model is built to scale securely under today’s threat and compliance conditions. You’ll hear from your peers and leave with a sharper framework for assessing your current architecture – and the tradeoffs you may have quietly accepted.

    Discussion Focus
    • Peer share-out: what’s working, what isn’t, and where the gaps remain
    • What “control” actually means when IT doesn’t own the device
    • Staying audit-ready on endpoints you don’t manage
    • Enabling contractors at scale without trading speed for security
    • Why legacy approaches – VDI, shipped laptops, MDM – aren’t built for a dynamic, distributed workforce

  • Managing the Invisible Insider: When Agentic AI Becomes the Threat

    Agentic AI systems have moved beyond answering questions. They are taking actions in the real world. That shift introduces a new, insider-like risk profile: autonomous systems operating at machine speed, with broad access to tools, workflows, and data. This roundtable is designed to make that risk concrete and practical. We will start by mapping the emerging threat landscape, drawing on real-world adversarial research against major agentic platforms to show how prompt injection, tool poisoning, and cascading compromise can quietly turn trusted agents into threats at scale. From there, we will focus on what to do about it: how to scope permissions, establish accountability for autonomous actions, and define pragmatic boundaries for human oversight. We will also explore guardrails that meaningfully constrain agent behavior without eroding the speed and utility that make agentic AI attractive in the first place.

    What You’ll Gain:
    1.Hear how peers are assessing insider-like risk in agentic systems, including prompt injection, tool poisoning, and cascading agent compromise.
    2.Compare approaches to governance: permission scoping, accountability models, and where teams are drawing the line on human oversight.
    3.Leave with actionable strategies and sharper questions to bring back to your team as you operationalize controls for autonomous AI.

  • From Insight to Action: Redefining Cyber Risk with Intelligent Defense

    As digital ecosystems expand, CISOs face an increasingly complex and dynamic threat landscape. Traditional risk frameworks struggle to keep pace with the scale and speed of attacks. This session explores how threat intelligence, advanced analytics, and AI-driven insights can help organizations predict, prioritize, and prevent cyber risk across internal and third-party environments.

    Join fellow security leaders to uncover how actionable intelligence and automation can bridge the gap between awareness and response—transforming cyber risk management into a proactive, data-driven discipline.

    Key Learnings:
    • Ways to integrate threat intelligence into enterprise and third-party risk programs
    • Strategies to turn complex data into actionable, real-time defense decisions
    • Best practices for aligning people, processes, and technology for intelligent resilience

  • Agentic Velocity vs. Zero Trust: Redefining Governance for the AI Workforce

    Your business is facing pressure from all sides to automate tasks with AI Agents, but your traditional security perimeters can’t keep up. Will you stop your organization from leveraging the most revolutionary productivity tools in history? Or will you expose your business to a limitless threat with endless breach possibilities?
    This session tackles the tension between rapid AI deployment and zero-trust principles. We’ll share insights on moving away from “all-or-nothing” API keys toward identity-aware control layers.

    Key topics include: securing agent to tool connections, mitigating prompt injection at the execution layer, and using behavior based scoring to determine agent permissions in real time.

In this interactive session, our event partners will take the lead in initiating and facilitating conversations centered on challenges and solutions within the industry. Attendees can expect dynamic discussions where diverse perspectives are shared, fostering collaborative problem-solving and the exploration of innovative solutions to common industry hurdles.

CIO TRACK: Carbon Meets Silicon: How Technology Is Quietly Rewriting Humanity

  • Atti Riazi
    CIO Hearst

We like to believe we are rational creatures living in rational systems, but we are emotional primates operating inside planetary-scale software. Every new technology doesn’t just add tools – it reshapes behaviour, incentives, and culture at scale. This session explores how the collision of human nature and exponential technology is quietly rewriting leadership, organizations, and society, and why the future isn’t artificial intelligence, but augmented humanity – if we’re brave enough to design it that way. Are we?

CISO TRACK: Building a Security Culture for the 2026 Workforce

  • Jim Trainor
    Vice President Cybersecurity State Street

As workforces become more distributed, automated, and AI-enabled, security culture has become a leadership imperative. This session explores how organizations in 2026 are moving beyond awareness training to embed security into everyday decision-making. Learn how leaders are aligning people, processes, and technology to reduce human risk, support productivity, and build a resilient security culture at scale.

CIO TRACK: Quick Tech Tale! From AI Pilots to Real Impact: What’s Actually Working in the Enterprise

  • JD Geiger
    Head of Enterprise Solutions Stack AI

While many organizations have experimented with AI, moving from pilots to measurable operational impact remains a challenge. This session will share practical lessons from enterprises using AI to streamline internal workflows, improve efficiency, and support teams without adding complexity. We’ll cover where AI is delivering real value today, common friction points that slow adoption, and how leaders can prioritize the right use cases and measure outcomes effectively.

3 Key Takeaways:
• How to identify AI use cases that drive real operational value, not just experimentation
• Where teams typically face friction when scaling AI beyond pilots
• Practical approaches to measuring impact and aligning AI initiatives with business goals

CISO TRACK: Quick Tech Tale! The Dark Web Economy: How Cybercriminals Are Evolving Their Business Models

  • Spencer Smitherman
    Head of Customer Success Sublime Security

Cybercrime has become an industry with its own supply chains, customer service models, and R&D divisions. This session explores how the underground cyber economy operates and what CISOs must do to counteract it.

Key Takeaways:

How cybercriminals operate as businesses.
Emerging threats from cybercrime-as-a-service.
Strategies to proactively disrupt cybercriminal ecosystems.

LUNCH & 1:1 Xchange

CIO TRACK: AI-Driven Digital Transformation in Financial Services: Modernizing Legacy Platforms for Resilience and Scale

  • Girish Gajwani
    Vice President Information Technology Barclays

Financial institutions are under growing pressure to modernize legacy platforms while maintaining resilience, security, and regulatory compliance. This session explores how AI-driven digital transformation enables organizations to evolve complex, mission-critical systems into scalable, cloud-ready, and intelligent platforms. Drawing from real-world financial services experience, it highlights how software intelligence, automation, and AI can reduce technical debt, improve operational transparency, and accelerate modernization without disrupting core business functions. Attendees will gain practical insights into integrating AI with legacy environments to enhance resilience, optimize performance, and build a future-ready digital foundation that supports innovation at scale.

CISO TRACK: Quick Tech Tale! AI Success Story - Regulatory Examination Evidence Handling

  • Angela Silva
    Vice President, Information Security Lloyds Banking Group

Discover how AI eliminates the grind of audit evidence collection. Regulatory exams are accelerating and so is the complexity of the evidence they demand. This session gives an inside look at how AI is transforming one of the most operationally painful areas of cyber oversight: compiling, validating, and delivering audit ready evidence. You’ll hear how Information Security teams are cutting turnaround times by up to 70%, reducing audit observations, and strengthening control assurance through AI driven retrieval and analysis.

CIO TRACK: Data Readiness for AI and Data as a Product: The foundation for Accuracy and Trust

  • Mirnal Dubey (MD)
    Vice President – Business Leader & IT Services Partner Yash
  • Dhanunjay Kondapally (DJ)
    Vice President – Data & Analytics Service Line Partner Yash

YASH delivers Data Readiness for AI and Data as a Product through a unified, governed, and scalable data platform engineered for modern BFSI needs. By orchestrating data from diverse enterprise systems into a structured, high quality pipeline — from ingestion and staging to modeling and domain driven consumption — YASH enables institutions to build the trust, accuracy, and explainability required for AI. This foundation converts raw data into reliable, reusable data products that accelerate analytics, automation, and enterprise AI adoption. With YASH, CIOs gain a future proof data backbone that reduces operational friction and unlocks faster time to value for GenAI and Agentic AI initiatives.

Key Takeaways:
• A Unified Data Platform ensures end to end trust—ingestion → staging → modeling → governed domain products → AI and BI consumption.
• Data as a Product turns fragmented sources into reusable, SLA backed assets powering analytics, AI/ML, and customer experiences.
• Data Quality Management, E2E lineage, Data Catalogue, and Data Governance across the pipeline are non negotiable for accurate, explainable, and compliant AI outcomes.
• CIOs who invest in data readiness + productized domains unlock faster time to value, reduced operational friction, and scalable innovation in Gen AI & Agentic AI.

CISO TRACK: For better or worse: Real AI Agents Working as (un)-intended

  • Josh Kriss
    COO Geordie AI

Your agents are already out there. Running autonomously. Making decisions. Connecting to systems nobody approved. Handling data nobody expected. And in most cases, doing all of this completely invisibly to every security tool in your stack.
This session draws on real findings from enterprise agent deployments to show security leaders what AI agent risk actually looks like in the wild — not in theory, not in a lab, but in production environments at organizations scaling agents across their core business operations right now. We cover shadow agent sprawl, insider threats, credential leakage, privilege escalation, goal drift and a novel class of supply chain exploits targeting the agentic layer specifically.

CIO TRACK: Quick Tech Tale! Diagnosing AI Failure - Why Business-Led Projects Collapse and How to Turn Them Around

  • Dilip Nath
    VP & CIO SUNY Downstate Health Sciences University

In this Quick Tech Tale, Dilip Nath cuts through the AI hype to share a pragmatic view of why so many AI initiatives fail to deliver real business value. Despite accelerating investment and executive pressure to adopt AI, organisations continue to struggle with poor planning, unrealistic expectations, weak data foundations, and unclear ownership between technology and the business. Drawing on real-world experience, Dilip explores the gap between promising AI pilots and scalable, value-driven outcomes. He highlights why technical performance alone is not enough, and why success depends on operational integration, measurable business impact, and leadership alignment. The session will also touch on the human dimension of AI adoption – from cross-functional collaboration and skills to trust in AI-driven decisions. This fast-paced session offers practical insights on how to avoid common pitfalls, set realistic expectations, and turn AI ambition into sustainable, business-led execution.

CISO TRACK: Moving from Beggar to Extreme Motivator: Transforming Cybers Effectiveness in the Organization

  • Bradley Hildreth
    CISO Oppenheimer

Cybersecurity teams are often seen as blockers rather than enablers, but that perception is changing. This session explores how leaders can shift from a reactive, approval-based model to a proactive, influential role within the organisation. By leveraging well-established behavioral techniques and really well thought-through metrics, cyber leaders can better demonstrate value, align with business goals, and build trust across functions. Learn how to reframe conversations, measure what truly matters, and position cybersecurity as a driver of innovation and resilience, ultimately transforming it from a perceived constraint into a powerful motivator for organisational success.

PM BREAK & 1:1 Xchange + Community Conversations

Community Conversations

  • Patrick Alderson
    CIO Albany County NY
  • Sharon Dhall
    CIO Kroll
  • Ralph Peavy
    Deputy CISO Delta Dental of NJ & CT
  • Faith Rotimi
    AVP - Operational Risk Tech. Business & Cyber Resilience Morgan Stanley
  • The Adaptive Leader – Navigating Disruption and Digital Complexity
    Digital disruption and increasing complexity are reshaping how organisations lead, decide, and execute. Discuss how leaders are adapting leadership approaches, governance, and decision-making to remain effective in fast-changing, technology-driven environments.

  • AI Upskilling at Scale: Lessons Learned from Early Adopters
    As AI adoption accelerates, the real challenge is building the skills and confidence to use it effectively. This roundtable will explore how leaders can deliver AI training that moves beyond awareness to real capability, discussing what good AI training looks like, how to scale it across roles, and how AI literacy supports responsible and impactful use.

  • Half the Talent, Double the Risk: Rethinking Gender and the Cyber Workforce Gap
    The global cybersecurity skills shortage continues to grow, yet large segments of potential talent remain underrepresented. This roundtable explores how gender diversity plays a critical role in closing the cyber skills gap, retention challenges, and practical strategies organizations can use to build more resilient cyber teams. Attendees will share perspectives on how the talent gap is not only an equity issue, but a security and business imperative.

  • Resilience Before Recovery: Strengthening Strategy and Security in a Continuously Changing Technology World
    In a technology landscape defined by constant change, resilience must be built in before disruption occurs. Join this table to explore with peers how to strengthen strategy and security to stay resilient, responsive, and prepared in an environment where recovery alone is no longer enough.

Take a break, engage in meetings or join a discussion roundtable! During this PM Power Break, fellow enterprise leaders will guide discussions on their favorite topic, fostering an environment of open exchange, exploration of diverse perspectives and experiences. Attendees can grab a coffee and anticipate engaging conversations through 1-2-1 meetings and roundtables. Conversations will be driven by shared challenges and interests, offering valuable insights and opportunities for collaborative learning and networking.

Security and Data Collide - Navigating AI Risk and Innovation

  • Rob Preta
    Data Security and AI Governance Officer Cyera

AI won’t fix broken data. Governance is the key to transforming fragmented, unreliable information into trusted, strategic insight. As AI becomes embedded across the enterprise, the divide between information security and the data and analytics function is collapsing. Security leaders focused on protecting data now intersect with data leaders tasked with leveraging it. AI governance sits at the center of this convergence—where innovation meets accountability. CISOs have a unique opportunity to move from backend defenders to strategic enablers, shaping how AI scales safely across the business.

Join this session to learn how to:
o Build governance models that bridge security and data strategy
o Mitigate AI risk through cross-functional collaboration
o Enable trust through unified governance practices

CLOSING PANEL: The Cost of Technology - Where Investment Delivers and Where It Doesn’t

  • Jim Panos
    CIO Central National Gottesman Inc
  • Sumeet Sharma
    Director Global Corporate Technologies International Flavors & Fragrances
  • Josh Felipe
    VP Data Analytics and Innovation TD Securities
  • Jason LaBerteaux
    AVP & Assistant General Counsel MetLife

Spending on technology, risk, and resilience continues to accelerate as organisations respond to regulation, digital change, and growing operational complexity. Yet disruption, skills gaps, and execution challenges persist, raising questions about how effectively this investment is translating into real and ROI. . This panel brings together different executives to provide an industry view on how investment decisions are made, prioritised, and evaluated across the organisation. From board-level strategy to operational execution, speakers will share how different leadership roles assess value and impact in an increasingly complex risk environment. Join us for this closing session as we focus on how organisations can approach investment more intelligently and how success should be measured when budgets are under pressure and risk is constant.

Key Discussion Takeaways
• Why higher spend hasn’t consistently reduced risk
• How finance, executive, and technology leaders assess value differently
• What smarter investment and measurement should look like going forward

Closing Remarks

Drinks Reception

Apply to Attend

Location

Well& by Durst - Amenity, Events & Meeting Space, West 42nd Street, New York, NY, USA

Well& by Durst - Amenity, Events & Meeting Space, West 42nd Street, New York, NY, USA

Past Events

Testimonials

See what attendees, speakers and sponsors say about our events.

FAQs

Who attends?

Attendance is reserved for C-Suite executives and Senior Executives within IT, including Chief Information Officers, Chief Technology Officers, and other senior IT decision-makers from a wide array of industries. Joined by our select sponsor partners, enriching networking opportunities and offering cutting-edge solutions.

What does my delegate pass include?

Thanks to our sponsors, your access is entirely complimentary, providing you with full-day access to all presentations, exclusive networking sessions, personalised one-to-one meetings, delectable catering, and an open bar for added networking.

What are the one-on-one meetings?

These 25-minute meetings provide invaluable opportunities to discover new solutions and expand your network with leading innovative providers that can help solve your current or future complex challenges.

What is the dress code?

Professional business attire is appropriate.

Do I need to prepare anything?

No preparation is needed on your part. We take care of all the final details. Simply arrive at the specified time, date, and location, and we’ll handle the rest to ensure you have a seamless and enjoyable experience.

Why attend?

Our events offer unparalleled experiences where interactive sessions spark innovation, keynotes unveil insights from industry luminaries, and exclusive one-on-one meetings with best-in-breed solution providers unfold in some of the world’s most prestigious venues. This unique format ensures that your challenges are addressed directly, providing invaluable insights, connections, and maximising value for your time. With a compact schedule featuring a variety of presentations, you’ll gain a comprehensive view of the latest innovations and have ample opportunity to network with like-minded peers—all under one roof, and in just one day. This fosters collaboration and forges invaluable connections among executives with a genuine influence, setting the standard for elite gatherings in the industry.

Have any more questions?

Get in touch here

Have any more questions?

Get in touch