{
  "version": "1.2.0",
  "chapters": [
    {
      "title": "Introduction",
      "startTime": 0.78,
      "endTime": 15.42
    },
    {
      "title": "The Ransomware Pivot to Encryption",
      "startTime": 15.42,
      "endTime": 30.5
    },
    {
      "title": "Conclusion",
      "startTime": 30.5,
      "endTime": 240.17
    },
    {
      "title": "Mobile Spyware and Stalkerware Leaks",
      "startTime": 30.5,
      "endTime": 30.5
    },
    {
      "title": "Critical Infrastructure and BeyondTrust Vulnerabilities",
      "startTime": 30.5,
      "endTime": 30.5
    }
  ]
}