Track

Date & Time
Thursday, April 23, 2026, 1:20 PM - 2:10 PM
Room Location
Boisdale 1 & 2
Session Code
WK09
Name
Command, Control, Conversation: Detecting and Mitigating LLM Cyber-Attacks and C2
Description

Interactive Deep Dive: As the adoption of AI accelerates, so too does its use within offensive cyber workflows across the kill chain; from offensive cyber operations and hacking, to command and control, and exploitation. Industry, academia, and government must ensure that our defensive capabilities evolve at this same pace.

This interactive, scenario driven, workshop will focus on the dual nature of AI in cyber security - covering two key themes. The first theme will explore the real threat posed by attackers who are weaponising LLMs in the wild. We will explore open‑source threat reporting on LLM-powered malware, cyber operations, and hacking, looking at the technical details behind these attacks.

The second theme will focus on defence. We will introduce the current art of the possible in AI attack detection, highlight what we are seeing from industry and academia, and connect this with more conventional deception techniques. 

This workshop is ideal for researchers, industry, and academia working, or seeking to work, in identifying and responding to AI enabled cyber-attacks.

In this workshop participants will: understand how the threat landscape is evolving as LLMs are misused; explore techniques for detecting and mitigating LLM cyber-attacks and C2; and engage with academia, industry, and government on existing capabilities and how the threat landscape may evolve in future.

James S7 Rachel P Kate C Matthew B8
Session Keywords
AI enabled threat, AI Security, Detection, response, and forensics, Threat landscape and intelligence
With thanks to our Partner