{
  "version": "1.2.0",
  "chapters": [
    {
      "title": "Intro",
      "startTime": 0,
      "endTime": 69.26
    },
    {
      "title": "Webcast Agenda",
      "startTime": 69.26,
      "endTime": 141.26
    },
    {
      "title": "Workshop: Hacking AI-LLM Applications",
      "startTime": 141.26,
      "endTime": 169.26,
      "url": "https://www.antisyphontraining.com/product/workshop-hacking-ai-llm-applications-with-brian-fehrman-joff-thyer-and-derek-banks/"
    },
    {
      "title": "Training: Attacking, Defending, and Leveraging AI-LLM Systems",
      "startTime": 169.26,
      "endTime": 191.26,
      "url": "https://www.antisyphontraining.com/product/attacking-defending-and-leveraging-ai-llm-systems/"
    },
    {
      "title": "BHIS AI Security Assessments",
      "startTime": 191.26,
      "endTime": 204.26,
      "url": "https://www.blackhillsinfosec.com/services/ai-security-assessments/"
    },
    {
      "title": "AI Security Ops Podcast",
      "startTime": 204.26,
      "endTime": 236.26,
      "url": "https://aisecurityops.transistor.fm"
    },
    {
      "title": "LLM Security Introduction",
      "startTime": 236.26,
      "endTime": 357.26
    },
    {
      "title": "Foundation Model Training",
      "startTime": 357.26,
      "endTime": 575.26
    },
    {
      "title": "Chatbot",
      "startTime": 575.26,
      "endTime": 898.26
    },
    {
      "title": "AI Agents",
      "startTime": 898.26,
      "endTime": 1076.26
    },
    {
      "title": "LLM Safety Versus Security",
      "startTime": 1076.26,
      "endTime": 1434.26
    },
    {
      "title": "OWASP Top 10 for LLM Applications",
      "startTime": 1434.26,
      "endTime": 1473.26
    },
    {
      "title": "– Prompt Injection",
      "startTime": 1473.26,
      "endTime": 1751.26
    },
    {
      "title": "– Sensitive Information Disclosure",
      "startTime": 1751.26,
      "endTime": 1966.26
    },
    {
      "title": "– Supply Chain",
      "startTime": 1966.26,
      "endTime": 2222.26
    },
    {
      "title": "– Data and Model Poisoning",
      "startTime": 2222.26,
      "endTime": 2418.26
    },
    {
      "title": "– Improper Output Handling",
      "startTime": 2418.26,
      "endTime": 2511.26
    },
    {
      "title": "– Exessive Agency",
      "startTime": 2511.26,
      "endTime": 2627.26
    },
    {
      "title": "– System Prompt Leakage",
      "startTime": 2627.26,
      "endTime": 2717.26
    },
    {
      "title": "– Vector and Embedding Weaknesses",
      "startTime": 2717.26,
      "endTime": 2809.26
    },
    {
      "title": "– Misinformation",
      "startTime": 2809.26,
      "endTime": 2985.26
    },
    {
      "title": "– Unbounded Consumption",
      "startTime": 2985.26,
      "endTime": 3130.26
    },
    {
      "title": "Red Team Methodology",
      "startTime": 3130.26,
      "endTime": 3186.26
    },
    {
      "title": "Threat Modeling an LLM App",
      "startTime": 3186.26,
      "endTime": 3281.26
    },
    {
      "title": "Defense-in-Depth for LLM Apps",
      "startTime": 3281.26,
      "endTime": 3349.26
    },
    {
      "title": "Red Team Tools & Frameworks",
      "startTime": 3349.26,
      "endTime": 3391.26
    },
    {
      "title": "Key Takeaways",
      "startTime": 3391.26,
      "endTime": 3634.26
    },
    {
      "title": "Q&A",
      "startTime": 3634.26,
      "endTime": 3990.26
    }
  ]
}