{
  "version": "1.2.0",
  "chapters": [
    {
      "title": "Introduction to Enterprise IT Security",
      "startTime": 0,
      "endTime": 64
    },
    {
      "title": "Meet the Experts: Brad Bussie and Svetla Yankova",
      "startTime": 64,
      "endTime": 96
    },
    {
      "title": "Exploring the Evolving Landscape of SecOps",
      "startTime": 96,
      "endTime": 178
    },
    {
      "title": "The Google SecOps Journey",
      "startTime": 178,
      "endTime": 344
    },
    {
      "title": "Understanding SecOps: A Simplified Explanation",
      "startTime": 344,
      "endTime": 502
    },
    {
      "title": "The Evolution of SecOps Technology",
      "startTime": 502,
      "endTime": 918
    },
    {
      "title": "The Broken Promise of SIEM",
      "startTime": 918,
      "endTime": 1590
    },
    {
      "title": "Best Practices for Effective SecOps Implementation",
      "startTime": 1590,
      "endTime": 1796
    },
    {
      "title": "The Future of SecOps: AI and Cloud-Native Solutions",
      "startTime": 1796,
      "endTime": 2085
    },
    {
      "title": "Conclusion and Final Thoughts",
      "startTime": 2085,
      "endTime": 2119
    }
  ]
}