{
  "version": "1.2.0",
  "chapters": [
    {
      "title": "Intro",
      "startTime": 0,
      "endTime": 164.26
    },
    {
      "title": "Our trip through the galaxy",
      "startTime": 164.26,
      "endTime": 218.26
    },
    {
      "title": "What kind of literature is the Hitchikerʼs Guide to the Galaxy?",
      "startTime": 218.26,
      "endTime": 269.26
    },
    {
      "title": "Don't Panic",
      "startTime": 269.26,
      "endTime": 318.26
    },
    {
      "title": "The Agentic Revolution",
      "startTime": 318.26,
      "endTime": 356.26
    },
    {
      "title": "Cast of Characters",
      "startTime": 356.26,
      "endTime": 464.26
    },
    {
      "title": "The State of AI in the Enterprise - Deloitte",
      "startTime": 464.26,
      "endTime": 653.26
    },
    {
      "title": "How do teams build agents?",
      "startTime": 653.26,
      "endTime": 731.26
    },
    {
      "title": "What are teams using agents for?",
      "startTime": 731.26,
      "endTime": 797.26
    },
    {
      "title": "Why build on Bedrock + AWS",
      "startTime": 797.26,
      "endTime": 857.26
    },
    {
      "title": "Are we learning? Or not learning?",
      "startTime": 857.26,
      "endTime": 958.26
    },
    {
      "title": "Are you the fixed point in a shifting universe?",
      "startTime": 958.26,
      "endTime": 1021.26
    },
    {
      "title": "TL;DR the majority of these are the same threats we have been dealing with",
      "startTime": 1021.26,
      "endTime": 1096.26
    },
    {
      "title": "Prompt Injection is the new SQL Injection",
      "startTime": 1096.26,
      "endTime": 1153.26
    },
    {
      "title": "Sandbox Escape",
      "startTime": 1153.26,
      "endTime": 1220.26
    },
    {
      "title": "Shared Structure: General Software & AI Supply Chains",
      "startTime": 1220.26,
      "endTime": 1383.26
    },
    {
      "title": "The Bad News",
      "startTime": 1383.26,
      "endTime": 1469.26
    },
    {
      "title": "Threate Vector Coverage",
      "startTime": 1469.26,
      "endTime": 1524.26
    },
    {
      "title": "The Expanding Universe of Secrets",
      "startTime": 1524.26,
      "endTime": 1695.26
    },
    {
      "title": "Hope is not a strategy! But a strategy can give us hope.",
      "startTime": 1695.26,
      "endTime": 1716.26
    },
    {
      "title": "(Yes we AI-Removed Andrew's Coughs)",
      "startTime": 1716.26,
      "endTime": 1780.26
    },
    {
      "title": "back to: Hope is not a strategy! But a strategy can give us hope.",
      "startTime": 1780.26,
      "endTime": 1847.26
    },
    {
      "title": "Plan for maximum risk scenarios",
      "startTime": 1847.26,
      "endTime": 1983.26
    },
    {
      "title": "Squishy Stuff",
      "startTime": 1983.26,
      "endTime": 2078.26
    },
    {
      "title": "KIRO",
      "startTime": 2078.26,
      "endTime": 2231.26
    },
    {
      "title": "Infrastructure and Data Protection",
      "startTime": 2231.26,
      "endTime": 2351.26
    },
    {
      "title": "Priveledge Escalation Paths – https://pathfinding.cloud",
      "startTime": 2351.26,
      "endTime": 2458.26
    },
    {
      "title": "The AI Stuff",
      "startTime": 2458.26,
      "endTime": 2521.26
    },
    {
      "title": "So anyway, here's Firewall",
      "startTime": 2521.26,
      "endTime": 2614.26
    },
    {
      "title": "OpenTelementry",
      "startTime": 2614.26,
      "endTime": 2807.26
    },
    {
      "title": "You still have to have logs",
      "startTime": 2807.26,
      "endTime": 2902.26
    },
    {
      "title": "MCP",
      "startTime": 2902.26,
      "endTime": 2962.26
    },
    {
      "title": "Learn more from Andrew in: Securing the Cloud Foundations",
      "startTime": 2962.26,
      "endTime": 3023.26
    },
    {
      "title": "Post Show Q&A",
      "startTime": 3023.26,
      "endTime": 3539.14
    }
  ]
}