{
  "version": "1.2.0",
  "chapters": [
    {
      "title": "166 Cloud Security: Exploring the Latest Trends and Challenges in Cloud Security and Systems Architecture",
      "startTime": 0,
      "endTime": 150.64
    },
    {
      "title": "Panelist Introductions",
      "startTime": 150.64,
      "endTime": 332.64
    },
    {
      "title": "Cloud Backround and Intro",
      "startTime": 332.64,
      "endTime": 382.64
    },
    {
      "title": "Cloud is not new, so what has changed in the last 5 to 10 years that we are still talking about it as an Info Sec thing?",
      "startTime": 382.64,
      "endTime": 818.64
    },
    {
      "title": "More people work from home than they used to, what do you see in terms of shifts in either architecture, approach use, either good or bad?",
      "startTime": 818.64,
      "endTime": 978.64
    },
    {
      "title": "Insight from some of the panelists about mistakes in setups or uses of cloud services. ",
      "startTime": 978.64,
      "endTime": 1496.64
    },
    {
      "title": "In a post quantum computing world withnthe injection of AI,  what are the repeatable, consistent, and effective things we can do to continue to successfully protect the cloud?",
      "startTime": 1496.64,
      "endTime": 1891.64
    },
    {
      "title": "Setting up a by design secure architecture, technologically speaking, for their organization. And where can they go to get the right resources to educate themselves so that they understand why that's important, at the right value.",
      "startTime": 1891.64,
      "endTime": 2077.64
    },
    {
      "title": " From a research and development standpoint, how do we shift from being reactive to proactive? ",
      "startTime": 2077.64,
      "endTime": 2365.64
    }
  ]
}