{
  "version": "1.2.0",
  "chapters": [
    {
      "title": "1 [00:00:00]: Introduction to Jordan and Vector 35\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "of Jordan's role and dedication to solving ongoing problems in the reverse engineering field.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "to the podcast and the guests, focusing on the guest’s background and company journey.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "2 [00:01:00]: Founding of Vector 35\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "of the formation of Vector 35 and its 10-year journey.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "into the DARPA CTF contract which gave the company its start.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "3 [00:05:00]: Binary Ninja's Development\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "of the development history of Binary Ninja from an internal CTF tool to a commercial product.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "transition from Python to a full C++ rewrite to enhance capabilities and performance.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "4 [00:10:00]: Early Career and Education\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "Wiens’ formative years, education in math and computer science, and first job experiences.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "journey from university IT support roles to a focus on network security and forensics.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "5 [00:20:00]: Network Defense and Security Work\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "recount of early projects and learnings in network defense at the University of Florida.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "examples of handling security incidents and implementing automated security measures.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "6 [00:25:00]: Capture The Flag (CTF) Competitions and Impact\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "introduction to CTF competitions and their significance in his transition to offensive security roles.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "development of a strong skill set in reverse engineering and exploit writing through CTF participation.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "7 [00:35:00]: Evolution and Experiences in DEFCON CTF\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "evolution of DEFCON CTF from informal beginnings to a structured and competitive event.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "examples of strategies and shenanigans used in CTF events, highlighting the excitement and challenges involved.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "8 [00:45:00]: Business Lessons and Pricing Strategy\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "discussion on the importance of pricing strategies and administrative efficiency.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "learned from engaging with large institutions and the shift to a no-negotiation policy for low-value deals.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "9 [00:55:00]: Product Competition and Market Position\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "Wiens’ perspective on competing with established products like IDA and Ghidra.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "continuous improvements and new features in Binary Ninja to maintain a competitive edge.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "10 [01:05:00]: Future Plans and Conference Initiatives\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "goals for Vector 35, including potential growth strategies and product announcements.\r",
      "startTime": 0,
      "endTime": 0
    },
    {
      "title": "of the reverse engineering-focused conference \"Reverse\" in Orlando, Florida.",
      "startTime": 0,
      "endTime": 0
    }
  ]
}