Defending Against AI-Enabled Threats

A Hands-On Playbook for Defenders

Learn how AI is being weaponised — and how to defend against it.

Date March 20, 2026
Location Copenhagen
Duration Full Day
Investment 250 DKK / €35
Register Now Download Workshop Flyer (PDF)

AI Has Been Weaponized

In November 2025, Anthropic disclosed that Chinese state-sponsored hackers had weaponized their AI coding tool to execute 80-90% of a sophisticated cyber espionage campaign. The AI operated autonomously, with human intervention at only four to six decision points per campaign.

AI acceleration of adversary capabilities has reached its logical conclusion: AI as primary operator.

The attack surface has shifted. Traditional security frameworks were designed for human-speed threats. Machine-speed operations compress detection windows, requiring corresponding shifts in defensive mindset and capabilities.

Pre-Workshop Reading

This workshop builds on the analysis in "Weaponising AI: The New Cyber Attack Surface" by Rafal Rohozinski and Chris Spirito, published in IISS Survival (February 2026). Registered participants will receive a copy.

Who This Workshop Is For

Anyone who wants to understand how AI is changing the threat landscape — and what to do about it.

Diverse backgrounds make the workshop better. You will learn from each other.

Six Core Themes

Workshop Structure

70% hands-on exercises. 30% framing and synthesis.
You will work, not just listen.

08:00–08:30

Registration & Networking

Coffee and introductions with fellow participants across sectors

08:30–10:00

Session 1: The New Threat Landscape

Understanding the Shift

  • Real-world cases where AI ran the attack — not just assisted it
  • What changes when your adversary operates at machine speed
10:00–10:25

Break

10:25–12:00

Session 2: Threat Scenario Generation

Thinking Like the Adversary

  • Build realistic AI-powered attack scenarios
  • Share and stress-test scenarios with your group
12:00–12:45

Lunch

12:45–14:30

Session 3: Attack Surface Mapping

From Scenarios to Exposure

  • Use your scenarios to map where you're exposed
  • Learn how to use vibe coding methods to identify blind spots
14:30–14:55

Break

14:55–16:00

Session 4: Building Your Defence Playbook

From Analysis to Action

  • Pull everything together into a playbook you can use on Monday
  • Learn what others are building and defending against
16:00–16:30

Synthesis & Close

Key insights across sectors. The collective playbook as ongoing resource. Network maintenance.

What You Leave With

Adversarial AI Defensive Playbook

Threat scenarios, attack surface maps, and defense strategies specific to your organization—completed during the workshop.

Scenario Generation Framework

A repeatable process for generating plausible AI-enabled attack scenarios against your organization.

Threat Analysis Framework

A methodology for assessing, prioritizing, and responding to AI-enabled threats.

Community

A room full of people working on the same problems. Ongoing collaboration and shared learning.

A Course Built From Your Problems

This is not a generic workshop. When you register, you submit your organization's threat concerns and use cases. We review every submission and dynamically build the course content around what participants bring.

The result: every scenario we work through is real. Every vulnerability we map is yours or your peer's. The playbook reflects actual threats — not hypotheticals from a textbook.

Your problem becomes everyone's learning. Everyone's problem becomes your playbook.

Register

One day. Hands-on. Walk out with a defensive playbook you can actually use.

250 DKK / €35

Includes all materials, catering, and playbook development guide.

Questions? Email workshop@sanctumsec.com

Chris Spirito

Hacker, Teacher, Storyteller

My parents were teachers, so it only makes sense that I followed in their footsteps. Over three decades ago my teaching journey started with classes on mathematics and emergency medicine, topics that perhaps seem distant, but overlap in both chaos and beauty. Through the decades I have delivered courses in hacking, cyber security and defence, information operations, nuclear security, insider threat analysis, and even improv comedy sketch writing and storytelling. I hope to bring to you an immersive learning experience, one which will help you feel empowered and ready for what's next.

Download full instructor profile and workshop details (PDF)