Defending Against AI-Enabled Threats

A Cross-Sector Defensive Playbook for Strategic Industries

Date March 20, 2026
Location Copenhagen
Duration Full Day
Capacity 35 Seats
Register Interest

AI Has Been Weaponized

In November 2025, Anthropic disclosed that Chinese state-sponsored hackers had weaponized their AI coding tool to execute 80-90% of a sophisticated cyber espionage campaign. The AI operated autonomously, with human intervention at only four to six decision points per campaign.

AI acceleration of adversary capabilities has reached its logical conclusion: AI as primary operator.

The attack surface has shifted. Traditional security frameworks were designed for human-speed threats. Machine-speed operations compress detection windows, requiring corresponding shifts in defensive mindset and capabilities.

Pre-Workshop Reading

This workshop builds on the analysis in "Weaponising AI: The New Cyber Attack Surface" by Rafal Rohozinski and Chris Spirito, published in IISS Survival (February 2026). Registered participants will receive a copy.

Who This Workshop Is For

Security practitioners and strategic leaders defending against AI-enabled threats to operations, IP, and critical systems.

National Security & Defense

Classified system targeting, intelligence collection, supply chain infiltration, strategic decision manipulation

Pharmaceutical

IP theft, clinical trial data, drug safety disinformation, regulatory manipulation

Biotech

Research data exfiltration, supply chain compromise, investor manipulation

Energy & Fusion

Critical infrastructure attacks, safety narratives, technology theft, geopolitical targeting

Deep Tech

Talent targeting, acquisition manipulation, research theft, sovereign technology concerns

DefenseTech

Dual-use technology theft, export control circumvention, foreign investment risks, contractor targeting

Cross-sector participation is intentional. You will learn from threats facing adjacent industries.

Six Core Themes

Workshop Structure

70% hands-on exercises. 30% framing and synthesis.
You will work, not just listen.

08:00–08:30

Registration & Networking

Coffee and introductions with fellow participants across sectors

08:30–10:00

Session 1: The New Threat Landscape

Understanding the Shift

  • The Anthropic case: AI as primary operator, not just accelerant
  • Why traditional security frameworks fail against machine-speed operations
  • Sector-specific threat briefings: what adversaries want from your industry
  • The six domains where AI changes the attack surface
10:00–10:25

Break

10:25–12:00

Session 2: Threat Scenario Generation

Thinking Like the Adversary

  • Hands-on: Generate plausible attack scenarios against your organization
  • Identify high-value targets, likely attack vectors, and adversary objectives
  • Cross-table sharing: learn from threats facing adjacent sectors
  • Deliverable: Scenario Generation Framework you can reuse
12:00–12:45

Lunch

12:45–14:30

Session 3: Attack Surface Mapping

From Scenarios to Exposure

  • Hands-on: Map your attack surface using your threat scenarios
  • Identify vulnerable entry points, third-party dependencies, and data flows
  • AI-assisted gap analysis: where are you exposed and where are you blind?
  • Deliverable: Threat Analysis Framework for ongoing assessment
14:30–14:55

Break

14:55–16:00

Session 4: Building Your Defense Playbook

From Analysis to Action

  • Hands-on: Complete your Adversarial AI Defensive Playbook
  • Prioritize defenses based on threat likelihood and impact
  • Cross-sector synthesis: patterns and insights from the full group
  • Deliverable: Organizational playbook ready for immediate use
16:00–16:30

Synthesis & Close

Key insights across sectors. The collective playbook as ongoing resource. Network maintenance.

What You Leave With

Adversarial AI Defensive Playbook

Threat scenarios, attack surface maps, and defense strategies specific to your organization—completed during the workshop.

Scenario Generation Framework

A repeatable process for generating plausible AI-enabled attack scenarios against your organization.

Threat Analysis Framework

A methodology for assessing, prioritizing, and responding to AI-enabled threats.

Professional Network

Security practitioners across strategic sectors. Ongoing collaboration and intelligence sharing.

A Course Built From Your Problems

This is not a generic workshop. When you register, you submit your organization's threat concerns and use cases. We review every submission and dynamically build the course content around what participants bring.

The result: every scenario we work through is real. Every vulnerability we map is yours or your peer's. The cross-sector playbook reflects actual threats facing Copenhagen's strategic industries—not hypotheticals from a textbook.

Your problem becomes everyone's learning. Everyone's problem becomes your playbook.

Register Your Interest

Capacity is limited to 35 participants to ensure meaningful hands-on engagement. Registration includes submission of your use case, which shapes the course content.

Express Interest

Email: workshop@sanctumsec.com

Include in your message:

  • Name and role
  • Organization and sector
  • Your primary AI/cyber threat concern (2-3 sentences)
  • What you hope to leave with

Investment: 2,000 DKK / €275 / 2,850 SEK — includes all materials, catering, and cross-sector playbook.

Response time: 72 hours. All inquiries handled with confidentiality.

Organizations sending multiple participants may inquire about group arrangements.

Chris Spirito

Founder of Sanctum Security. Co-author of "Weaponising AI: The New Cyber Attack Surface" (IISS Survival, February 2026). Specialist in supply chain risk, AI security, and methodologies that democratize access to sophisticated security analysis.

Hacker from birth. 30+ years of experience across defense, critical infrastructure, and emerging technology sectors. Practitioner, not theorist. The frameworks taught in this workshop are the same ones used in client engagements.