Don’t miss out
14 Apr 2026
Well& by Durst, One Five One, New York
Welcome to CIOXNew York, the premier event exclusively designed for accomplished CIOs across NY, US. Step into the forefront of strategic technology leadership as we navigate the evolving post-pandemic landscape and unlock unparalleled opportunities for enterprise success. Join us at CIOXNew York, where visionary CIOs converge to engage in transformative discussions, gain strategic insights, and address the pressing challenges shaping the world of enterprise technology.

Secure up to twelve exclusive meetings with relevant leads at CIOXNewYork maximising your opportunity to forge valuable connections and drive business growth.
Become a sponsor
Immerse yourself in thought-provoking discussions, as top leaders share their expertise and provide you with invaluable insights to propel your strategic initiatives forward.
Engage with industry peers, thought-leaders, and solution providers to foster meaningful connections and explore collaborative opportunities that drive innovation and growth.
Discover what awaits you at CIOXNew York.
In 2026, enterprise leadership is no longer judged by uptime, cost savings, or isolated KPIs. Boards, investors, and regulators are asking for answers to tougher questions:
How does technology drive growth? How is AI adoption impacting enterprise performance and risk? How resilient is the business under pressure?
This opening panel brings CIOs and CISOs together to explore the metrics that truly matter to boards – from digital resilience to AI-enabled business outcomes. Participants will learn how to translate complex technology initiatives into measurable business impact, align IT and security priorities with corporate goals, and take ownership of the outcomes that matter most. We will identify what to measure, what to retire, and how to align technology, security, and business leadership around shared metrics that drive growth, resilience, and long-term value.
Key Discussion Points:
• Identify the enterprise performance and resilience metrics boards will prioritise in 2026.
• Understand how AI initiatives create shared accountability across technology and business teams.
• Learn how CIOs and CISOs can translate technology and security outcomes into business language that drives strategic decisions.
Security leaders are under pressure to demonstrate resilience, justify investment, and explain risk in terms boards actually understand. Yet most security metrics still measure activity, such as vulnerabilities scanned, controls deployed, and tools purchased, not whether attackers can succeed.
After running more than 200k autonomous pentests across on-prem, cloud, and hybrid environments, a consistent pattern has emerged: attackers rarely need CVEs. They exploit weak credentials, misconfigurations, and misplaced security efforts to create real attack paths that lead to data access, ransomware, or domain-level control, often in minutes.
In this session, Joshua Knox, Principal Cybersecurity Strategist at Horizon3.ai, explains what these attack patterns mean for executives accountable for cyber risk. Drawing on an attacker’s perspective and real-world outcomes, he shows how leading organizations are rethinking prioritization, measurement, and remediation by shifting from vulnerability volume to attack-path risk, and from effort-based reporting to proof of resilience.
Attendees will leave with a practical framework for:
– Understanding why attack paths, not individual vulnerabilities, are the right unit of risk for executive decision-making
– Identifying the small set of metrics that show whether cyber risk is actually decreasing over time
– Turning proof of exploitability into faster remediation, clearer ownership, and fewer repeat failures
Cyber resilience isn’t about eliminating every weakness. It’s about knowing and proving what attackers can actually do, and getting measurably better over time.
As AI agents become autonomous decision-makers, collaborators, and digital representatives, enterprises must confront a new question: how does human identity evolve alongside machine identity? This open forum explores the cultural, ethical, and operational implications of agentive AI, from workforce augmentation to digital trust, and invites participants to share real-world experiences shaping this emerging landscape.
Key Takeaways:
• Understand how AI agents are reshaping personal, organizational, and digital identity.
• Explore the implications for workforce roles, privacy, trust, and governance.
• Discuss practical steps enterprises can take to balance human autonomy with machine-driven efficiency.
CISOs are challenged by the growing sophistication of cyberattacks and the increasing complexity of IT environments, making traditional recovery approaches insufficient. Ensuring rapid, reliable recovery is now central to organizational resilience and trust, yet many security leaders struggle to integrate recovery into overall security strategy. Exploring new paradigms in cyber recovery can empower CISOs to proactively safeguard business continuity.
Join this session to explore:
• Integrating recovery into incident response plans
• Assessing cyber resilience beyond prevention
• Bridging gaps between security and IT operations
The Unmanaged Endpoint Problem: Rethinking Risk in a Distributed Workforce
Today’s distributed workforces extend well beyond full-time employees on corporate-issued hardware. Contractors, consultants, offshore teams, and hybrid workers routinely access regulated data and critical systems from personal laptops – devices that live entirely outside IT’s control. Most enterprise security architectures weren’t designed for this reality, and the gap between policy and exposure is where risk accumulates.
In this roundtable, we’ll examine what governance, auditability, and data protection actually look like when the company doesn’t own the device: how forward-looking CIOs and CISOs are defining enforceable boundaries on unmanaged endpoints, enforcing policy, maintaining regulatory defensibility, and evaluating whether their remote compute model is built to scale securely under today’s threat and compliance conditions. You’ll hear from your peers and leave with a sharper framework for assessing your current architecture – and the tradeoffs you may have quietly accepted.
Discussion Focus
• Peer share-out: what’s working, what isn’t, and where the gaps remain
• What “control” actually means when IT doesn’t own the device
• Staying audit-ready on endpoints you don’t manage
• Enabling contractors at scale without trading speed for security
• Why legacy approaches – VDI, shipped laptops, MDM – aren’t built for a dynamic, distributed workforce
Managing the Invisible Insider: When Agentic AI Becomes the Threat
Agentic AI systems have moved beyond answering questions. They are taking actions in the real world. That shift introduces a new, insider-like risk profile: autonomous systems operating at machine speed, with broad access to tools, workflows, and data. This roundtable is designed to make that risk concrete and practical. We will start by mapping the emerging threat landscape, drawing on real-world adversarial research against major agentic platforms to show how prompt injection, tool poisoning, and cascading compromise can quietly turn trusted agents into threats at scale. From there, we will focus on what to do about it: how to scope permissions, establish accountability for autonomous actions, and define pragmatic boundaries for human oversight. We will also explore guardrails that meaningfully constrain agent behavior without eroding the speed and utility that make agentic AI attractive in the first place.
What You’ll Gain:
1.Hear how peers are assessing insider-like risk in agentic systems, including prompt injection, tool poisoning, and cascading agent compromise.
2.Compare approaches to governance: permission scoping, accountability models, and where teams are drawing the line on human oversight.
3.Leave with actionable strategies and sharper questions to bring back to your team as you operationalize controls for autonomous AI.
From Insight to Action: Redefining Cyber Risk with Intelligent Defense
As digital ecosystems expand, CISOs face an increasingly complex and dynamic threat landscape. Traditional risk frameworks struggle to keep pace with the scale and speed of attacks. This session explores how threat intelligence, advanced analytics, and AI-driven insights can help organizations predict, prioritize, and prevent cyber risk across internal and third-party environments.
Join fellow security leaders to uncover how actionable intelligence and automation can bridge the gap between awareness and response—transforming cyber risk management into a proactive, data-driven discipline.
Key Learnings:
• Ways to integrate threat intelligence into enterprise and third-party risk programs
• Strategies to turn complex data into actionable, real-time defense decisions
• Best practices for aligning people, processes, and technology for intelligent resilience
Agentic Velocity vs. Zero Trust: Redefining Governance for the AI Workforce
Your business is facing pressure from all sides to automate tasks with AI Agents, but your traditional security perimeters can’t keep up. Will you stop your organization from leveraging the most revolutionary productivity tools in history? Or will you expose your business to a limitless threat with endless breach possibilities?
This session tackles the tension between rapid AI deployment and zero-trust principles. We’ll share insights on moving away from “all-or-nothing” API keys toward identity-aware control layers.
Key topics include: securing agent to tool connections, mitigating prompt injection at the execution layer, and using behavior based scoring to determine agent permissions in real time.
In this interactive session, our event partners will take the lead in initiating and facilitating conversations centered on challenges and solutions within the industry. Attendees can expect dynamic discussions where diverse perspectives are shared, fostering collaborative problem-solving and the exploration of innovative solutions to common industry hurdles.
We like to believe we are rational creatures living in rational systems, but we are emotional primates operating inside planetary-scale software. Every new technology doesn’t just add tools – it reshapes behaviour, incentives, and culture at scale. This session explores how the collision of human nature and exponential technology is quietly rewriting leadership, organizations, and society, and why the future isn’t artificial intelligence, but augmented humanity – if we’re brave enough to design it that way. Are we?
As workforces become more distributed, automated, and AI-enabled, security culture has become a leadership imperative. This session explores how organizations in 2026 are moving beyond awareness training to embed security into everyday decision-making. Learn how leaders are aligning people, processes, and technology to reduce human risk, support productivity, and build a resilient security culture at scale.
While many organizations have experimented with AI, moving from pilots to measurable operational impact remains a challenge. This session will share practical lessons from enterprises using AI to streamline internal workflows, improve efficiency, and support teams without adding complexity. We’ll cover where AI is delivering real value today, common friction points that slow adoption, and how leaders can prioritize the right use cases and measure outcomes effectively.
3 Key Takeaways:
• How to identify AI use cases that drive real operational value, not just experimentation
• Where teams typically face friction when scaling AI beyond pilots
• Practical approaches to measuring impact and aligning AI initiatives with business goals
Cybercrime has become an industry with its own supply chains, customer service models, and R&D divisions. This session explores how the underground cyber economy operates and what CISOs must do to counteract it.
Key Takeaways:
How cybercriminals operate as businesses.
Emerging threats from cybercrime-as-a-service.
Strategies to proactively disrupt cybercriminal ecosystems.
Financial institutions are under growing pressure to modernize legacy platforms while maintaining resilience, security, and regulatory compliance. This session explores how AI-driven digital transformation enables organizations to evolve complex, mission-critical systems into scalable, cloud-ready, and intelligent platforms. Drawing from real-world financial services experience, it highlights how software intelligence, automation, and AI can reduce technical debt, improve operational transparency, and accelerate modernization without disrupting core business functions. Attendees will gain practical insights into integrating AI with legacy environments to enhance resilience, optimize performance, and build a future-ready digital foundation that supports innovation at scale.
Discover how AI eliminates the grind of audit evidence collection. Regulatory exams are accelerating and so is the complexity of the evidence they demand. This session gives an inside look at how AI is transforming one of the most operationally painful areas of cyber oversight: compiling, validating, and delivering audit ready evidence. You’ll hear how Information Security teams are cutting turnaround times by up to 70%, reducing audit observations, and strengthening control assurance through AI driven retrieval and analysis.
YASH delivers Data Readiness for AI and Data as a Product through a unified, governed, and scalable data platform engineered for modern BFSI needs. By orchestrating data from diverse enterprise systems into a structured, high quality pipeline — from ingestion and staging to modeling and domain driven consumption — YASH enables institutions to build the trust, accuracy, and explainability required for AI. This foundation converts raw data into reliable, reusable data products that accelerate analytics, automation, and enterprise AI adoption. With YASH, CIOs gain a future proof data backbone that reduces operational friction and unlocks faster time to value for GenAI and Agentic AI initiatives.
Key Takeaways:
• A Unified Data Platform ensures end to end trust—ingestion → staging → modeling → governed domain products → AI and BI consumption.
• Data as a Product turns fragmented sources into reusable, SLA backed assets powering analytics, AI/ML, and customer experiences.
• Data Quality Management, E2E lineage, Data Catalogue, and Data Governance across the pipeline are non negotiable for accurate, explainable, and compliant AI outcomes.
• CIOs who invest in data readiness + productized domains unlock faster time to value, reduced operational friction, and scalable innovation in Gen AI & Agentic AI.
Your agents are already out there. Running autonomously. Making decisions. Connecting to systems nobody approved. Handling data nobody expected. And in most cases, doing all of this completely invisibly to every security tool in your stack.
This session draws on real findings from enterprise agent deployments to show security leaders what AI agent risk actually looks like in the wild — not in theory, not in a lab, but in production environments at organizations scaling agents across their core business operations right now. We cover shadow agent sprawl, insider threats, credential leakage, privilege escalation, goal drift and a novel class of supply chain exploits targeting the agentic layer specifically.
In this Quick Tech Tale, Dilip Nath cuts through the AI hype to share a pragmatic view of why so many AI initiatives fail to deliver real business value. Despite accelerating investment and executive pressure to adopt AI, organisations continue to struggle with poor planning, unrealistic expectations, weak data foundations, and unclear ownership between technology and the business. Drawing on real-world experience, Dilip explores the gap between promising AI pilots and scalable, value-driven outcomes. He highlights why technical performance alone is not enough, and why success depends on operational integration, measurable business impact, and leadership alignment. The session will also touch on the human dimension of AI adoption – from cross-functional collaboration and skills to trust in AI-driven decisions. This fast-paced session offers practical insights on how to avoid common pitfalls, set realistic expectations, and turn AI ambition into sustainable, business-led execution.
Cybersecurity teams are often seen as blockers rather than enablers, but that perception is changing. This session explores how leaders can shift from a reactive, approval-based model to a proactive, influential role within the organisation. By leveraging well-established behavioral techniques and really well thought-through metrics, cyber leaders can better demonstrate value, align with business goals, and build trust across functions. Learn how to reframe conversations, measure what truly matters, and position cybersecurity as a driver of innovation and resilience, ultimately transforming it from a perceived constraint into a powerful motivator for organisational success.
The Adaptive Leader – Navigating Disruption and Digital Complexity
Digital disruption and increasing complexity are reshaping how organisations lead, decide, and execute. Discuss how leaders are adapting leadership approaches, governance, and decision-making to remain effective in fast-changing, technology-driven environments.
AI Upskilling at Scale: Lessons Learned from Early Adopters
As AI adoption accelerates, the real challenge is building the skills and confidence to use it effectively. This roundtable will explore how leaders can deliver AI training that moves beyond awareness to real capability, discussing what good AI training looks like, how to scale it across roles, and how AI literacy supports responsible and impactful use.
Half the Talent, Double the Risk: Rethinking Gender and the Cyber Workforce Gap
The global cybersecurity skills shortage continues to grow, yet large segments of potential talent remain underrepresented. This roundtable explores how gender diversity plays a critical role in closing the cyber skills gap, retention challenges, and practical strategies organizations can use to build more resilient cyber teams. Attendees will share perspectives on how the talent gap is not only an equity issue, but a security and business imperative.
Resilience Before Recovery: Strengthening Strategy and Security in a Continuously Changing Technology World
In a technology landscape defined by constant change, resilience must be built in before disruption occurs. Join this table to explore with peers how to strengthen strategy and security to stay resilient, responsive, and prepared in an environment where recovery alone is no longer enough.
Take a break, engage in meetings or join a discussion roundtable! During this PM Power Break, fellow enterprise leaders will guide discussions on their favorite topic, fostering an environment of open exchange, exploration of diverse perspectives and experiences. Attendees can grab a coffee and anticipate engaging conversations through 1-2-1 meetings and roundtables. Conversations will be driven by shared challenges and interests, offering valuable insights and opportunities for collaborative learning and networking.
AI won’t fix broken data. Governance is the key to transforming fragmented, unreliable information into trusted, strategic insight. As AI becomes embedded across the enterprise, the divide between information security and the data and analytics function is collapsing. Security leaders focused on protecting data now intersect with data leaders tasked with leveraging it. AI governance sits at the center of this convergence—where innovation meets accountability. CISOs have a unique opportunity to move from backend defenders to strategic enablers, shaping how AI scales safely across the business.
Join this session to learn how to:
o Build governance models that bridge security and data strategy
o Mitigate AI risk through cross-functional collaboration
o Enable trust through unified governance practices
Spending on technology, risk, and resilience continues to accelerate as organisations respond to regulation, digital change, and growing operational complexity. Yet disruption, skills gaps, and execution challenges persist, raising questions about how effectively this investment is translating into real and ROI. . This panel brings together different executives to provide an industry view on how investment decisions are made, prioritised, and evaluated across the organisation. From board-level strategy to operational execution, speakers will share how different leadership roles assess value and impact in an increasingly complex risk environment. Join us for this closing session as we focus on how organisations can approach investment more intelligently and how success should be measured when budgets are under pressure and risk is constant.
Key Discussion Takeaways
• Why higher spend hasn’t consistently reduced risk
• How finance, executive, and technology leaders assess value differently
• What smarter investment and measurement should look like going forward
Well& by Durst - Amenity, Events & Meeting Space, West 42nd Street, New York, NY, USA
Well& by Durst - Amenity, Events & Meeting Space, West 42nd Street, New York, NY, USA
See what attendees, speakers and sponsors say about our events.
“I attended because the list of speakers was an attraction, and the time of the year also worked for me. It met my expectations. I was planning on leaving earlier, but stayed all through because I did not want to miss anything."
“I enjoyed the people, the interaction, the conversations and insights on what happening currently or near term in the industry, also the exceptional customer service by the team and staff, the intimacy EDS showed me throughout the event, I wasn’t left on an island. "
“I had lots of fun and met a lot of great people there & most importantly I learned a few things as well."
“I attended last year’s EDS CIO CISO event and thought the speakers and content were excellent. This year was even better with a good mix of topics and some interesting participants."
“I was impressed by all of the speakers and took away some interesting insights from the participants. The EDS team was well organized and made things flow well, and the event location / venue was great."
“This was well worth the trip and would certainly attend again if invited."
“This event is definitely better than others I've attended - service-oriented and really focused on ensuring a lot of dialogue. Both in 1:1 interactions and at the tables. Very well done."
“Interesting agenda, top experts and speakers, expectations were fully met by the participants and presentations. The event was great, vibrant until the end and at a great venue!"
“This is in the Top 5 of my best IT conferences to date, including commercial events. I already recommended EDS to my colleagues."
“It was a real value for me to be part of your event. You did a great job in organizing and performing."
“Attending EDS events as a CTO opened doors to insightful discussions and connections that felt truly genuine. It's not often you find such a perfect blend of knowledge sharing and camaraderie."
“Another great event! The atmosphere is relaxed yet intellectually stimulating, making it easy to connect with peers and exchange real-world insights with real CISOs."
“Thank you EDS. Your gatherings are refreshing and I always leave feeling inspired and armed with actionable ideas for our digital strategy."
“Sponsoring EDS events has been a fantastic opportunity for us. The focus on genuine engagement rather than just promotion allows us to build lasting relationships with industry leaders in a natural, authentic way."
“I've been attending EDS dinners as a CIO for a while now, and they never disappoint. The blend of thought-provoking discussions and genuine connections is unmatched in the industry."
“EDS events provide an invaluable platform for CISOs like myself to exchange ideas and best practices in a relaxed, yet professional setting. The conversations are always real and relevant. Thank you EDS team!"
“We're repeat sponsors of EDS dinners for a reason! Each time, we get unique opportunities to connect with decision-makers on a personal level. It's not just about business; it's about building authentic relationships, every time"
“EDS events have become a staple for me as a CDO"
“Sponsoring EDS events has been a breath of fresh air. The focus on quality over quantity ensures that our brand gets genuine exposure to the right audience in a way that feels natural and human."
Attendance is reserved for C-Suite executives and Senior Executives within IT, including Chief Information Officers, Chief Technology Officers, and other senior IT decision-makers from a wide array of industries. Joined by our select sponsor partners, enriching networking opportunities and offering cutting-edge solutions.
Thanks to our sponsors, your access is entirely complimentary, providing you with full-day access to all presentations, exclusive networking sessions, personalised one-to-one meetings, delectable catering, and an open bar for added networking.
These 25-minute meetings provide invaluable opportunities to discover new solutions and expand your network with leading innovative providers that can help solve your current or future complex challenges.
Professional business attire is appropriate.
No preparation is needed on your part. We take care of all the final details. Simply arrive at the specified time, date, and location, and we’ll handle the rest to ensure you have a seamless and enjoyable experience.
Our events offer unparalleled experiences where interactive sessions spark innovation, keynotes unveil insights from industry luminaries, and exclusive one-on-one meetings with best-in-breed solution providers unfold in some of the world’s most prestigious venues. This unique format ensures that your challenges are addressed directly, providing invaluable insights, connections, and maximising value for your time. With a compact schedule featuring a variety of presentations, you’ll gain a comprehensive view of the latest innovations and have ample opportunity to network with like-minded peers—all under one roof, and in just one day. This fosters collaboration and forges invaluable connections among executives with a genuine influence, setting the standard for elite gatherings in the industry.
Get in touch here