A Hands-On Playbook for Defenders
Learn how AI is being weaponised — and how to defend against it.
Register Now Download Workshop Flyer (PDF)In November 2025, Anthropic disclosed that Chinese state-sponsored hackers had weaponized their AI coding tool to execute 80-90% of a sophisticated cyber espionage campaign. The AI operated autonomously, with human intervention at only four to six decision points per campaign.
AI acceleration of adversary capabilities has reached its logical conclusion: AI as primary operator.
The attack surface has shifted. Traditional security frameworks were designed for human-speed threats. Machine-speed operations compress detection windows, requiring corresponding shifts in defensive mindset and capabilities.
This workshop builds on the analysis in "Weaponising AI: The New Cyber Attack Surface" by Rafal Rohozinski and Chris Spirito, published in IISS Survival (February 2026). Registered participants will receive a copy.
Anyone who wants to understand how AI is changing the threat landscape — and what to do about it.
Diverse backgrounds make the workshop better. You will learn from each other.
70% hands-on exercises. 30% framing and synthesis.
You will work, not just listen.
Coffee and introductions with fellow participants across sectors
Understanding the Shift
Thinking Like the Adversary
From Scenarios to Exposure
From Analysis to Action
Key insights across sectors. The collective playbook as ongoing resource. Network maintenance.
Threat scenarios, attack surface maps, and defense strategies specific to your organization—completed during the workshop.
A repeatable process for generating plausible AI-enabled attack scenarios against your organization.
A methodology for assessing, prioritizing, and responding to AI-enabled threats.
A room full of people working on the same problems. Ongoing collaboration and shared learning.
This is not a generic workshop. When you register, you submit your organization's threat concerns and use cases. We review every submission and dynamically build the course content around what participants bring.
The result: every scenario we work through is real. Every vulnerability we map is yours or your peer's. The playbook reflects actual threats — not hypotheticals from a textbook.
Your problem becomes everyone's learning. Everyone's problem becomes your playbook.
One day. Hands-on. Walk out with a defensive playbook you can actually use.
Includes all materials, catering, and playbook development guide.
Questions? Email workshop@sanctumsec.com
Hacker, Teacher, Storyteller
My parents were teachers, so it only makes sense that I followed in their footsteps. Over three decades ago my teaching journey started with classes on mathematics and emergency medicine, topics that perhaps seem distant, but overlap in both chaos and beauty. Through the decades I have delivered courses in hacking, cyber security and defence, information operations, nuclear security, insider threat analysis, and even improv comedy sketch writing and storytelling. I hope to bring to you an immersive learning experience, one which will help you feel empowered and ready for what's next.