{
  "version": "1.2.0",
  "chapters": [
    {
      "title": "PreShow Banter™ — Beau Has a Fan Club",
      "startTime": 0,
      "endTime": 1959
    },
    {
      "title": "FEATURE PRESENTATION: Getting Started in Blockchain Security and Smart Contract Auditing",
      "startTime": 1959,
      "endTime": 2199
    },
    {
      "title": "Roadmap",
      "startTime": 2199,
      "endTime": 2271
    },
    {
      "title": "Why Blockchain Security",
      "startTime": 2271,
      "endTime": 2361
    },
    {
      "title": "Growing Use Cases for Blockchain",
      "startTime": 2361,
      "endTime": 2603
    },
    {
      "title": "Blockchain Elements That Need Securing",
      "startTime": 2603,
      "endTime": 2940
    },
    {
      "title": "What Are Smart Contracts",
      "startTime": 2940,
      "endTime": 3082
    },
    {
      "title": "EVM : Ethereum Virtual Machine",
      "startTime": 3082,
      "endTime": 3240
    },
    {
      "title": "Solidity",
      "startTime": 3240,
      "endTime": 3593
    },
    {
      "title": "Smart Contract Vulns",
      "startTime": 3593,
      "endTime": 3839
    },
    {
      "title": "– Reentrancy",
      "startTime": 3839,
      "endTime": 3952
    },
    {
      "title": "– Front-Running",
      "startTime": 3952,
      "endTime": 4059
    },
    {
      "title": "– Inter Overflow and Underflow",
      "startTime": 4059,
      "endTime": 4150
    },
    {
      "title": "– Denial-of-Service",
      "startTime": 4150,
      "endTime": 4238
    },
    {
      "title": "– Access Control",
      "startTime": 4238,
      "endTime": 4361
    },
    {
      "title": "– Timestamp Dependence",
      "startTime": 4361,
      "endTime": 4517
    },
    {
      "title": "Case Studies – Uranium Finance Hack",
      "startTime": 4517,
      "endTime": 4641
    },
    {
      "title": "– Poly Network Hack",
      "startTime": 4641,
      "endTime": 4862
    },
    {
      "title": "– Cream Finance Hack",
      "startTime": 4862,
      "endTime": 5077
    },
    {
      "title": "DEMO: Live Exploit",
      "startTime": 5077,
      "endTime": 5710
    },
    {
      "title": "Exploit Recap",
      "startTime": 5710,
      "endTime": 5740
    },
    {
      "title": "Security Tools – VS Code + Solidity Visual Developer",
      "startTime": 5740,
      "endTime": 5795
    },
    {
      "title": "– Slither",
      "startTime": 5795,
      "endTime": 5813
    },
    {
      "title": "– Mythril & MythX",
      "startTime": 5813,
      "endTime": 5843
    },
    {
      "title": "Get-Started Resources",
      "startTime": 5843,
      "endTime": 5910
    },
    {
      "title": "Bug Bounties",
      "startTime": 5910,
      "endTime": 5926
    },
    {
      "title": "Key Takeaways",
      "startTime": 5926,
      "endTime": 5996
    },
    {
      "title": "This is the End – Q & A",
      "startTime": 5996,
      "endTime": 6656
    }
  ]
}