A Cross-Sector Defensive Playbook for Strategic Industries
Register InterestIn November 2025, Anthropic disclosed that Chinese state-sponsored hackers had weaponized their AI coding tool to execute 80-90% of a sophisticated cyber espionage campaign. The AI operated autonomously, with human intervention at only four to six decision points per campaign.
AI acceleration of adversary capabilities has reached its logical conclusion: AI as primary operator.
The attack surface has shifted. Traditional security frameworks were designed for human-speed threats. Machine-speed operations compress detection windows, requiring corresponding shifts in defensive mindset and capabilities.
This workshop builds on the analysis in "Weaponising AI: The New Cyber Attack Surface" by Rafal Rohozinski and Chris Spirito, published in IISS Survival (February 2026). Registered participants will receive a copy.
Security practitioners and strategic leaders defending against AI-enabled threats to operations, IP, and critical systems.
Classified system targeting, intelligence collection, supply chain infiltration, strategic decision manipulation
IP theft, clinical trial data, drug safety disinformation, regulatory manipulation
Research data exfiltration, supply chain compromise, investor manipulation
Critical infrastructure attacks, safety narratives, technology theft, geopolitical targeting
Talent targeting, acquisition manipulation, research theft, sovereign technology concerns
Dual-use technology theft, export control circumvention, foreign investment risks, contractor targeting
Cross-sector participation is intentional. You will learn from threats facing adjacent industries.
70% hands-on exercises. 30% framing and synthesis.
You will work, not just listen.
Coffee and introductions with fellow participants across sectors
Understanding the Shift
Thinking Like the Adversary
From Scenarios to Exposure
From Analysis to Action
Key insights across sectors. The collective playbook as ongoing resource. Network maintenance.
Threat scenarios, attack surface maps, and defense strategies specific to your organization—completed during the workshop.
A repeatable process for generating plausible AI-enabled attack scenarios against your organization.
A methodology for assessing, prioritizing, and responding to AI-enabled threats.
Security practitioners across strategic sectors. Ongoing collaboration and intelligence sharing.
This is not a generic workshop. When you register, you submit your organization's threat concerns and use cases. We review every submission and dynamically build the course content around what participants bring.
The result: every scenario we work through is real. Every vulnerability we map is yours or your peer's. The cross-sector playbook reflects actual threats facing Copenhagen's strategic industries—not hypotheticals from a textbook.
Your problem becomes everyone's learning. Everyone's problem becomes your playbook.
Capacity is limited to 35 participants to ensure meaningful hands-on engagement. Registration includes submission of your use case, which shapes the course content.
Email: workshop@sanctumsec.com
Include in your message:
Investment: 2,000 DKK / €275 / 2,850 SEK — includes all materials, catering, and cross-sector playbook.
Response time: 72 hours. All inquiries handled with confidentiality.
Organizations sending multiple participants may inquire about group arrangements.
Founder of Sanctum Security. Co-author of "Weaponising AI: The New Cyber Attack Surface" (IISS Survival, February 2026). Specialist in supply chain risk, AI security, and methodologies that democratize access to sophisticated security analysis.
Hacker from birth. 30+ years of experience across defense, critical infrastructure, and emerging technology sectors. Practitioner, not theorist. The frameworks taught in this workshop are the same ones used in client engagements.