{
  "version": "1.2.0",
  "chapters": [
    {
      "title": "Intro",
      "startTime": 0,
      "endTime": 380
    },
    {
      "title": "Aikido Origin Story",
      "startTime": 380,
      "endTime": 769.35
    },
    {
      "title": "What Does AutoFix Mean?",
      "startTime": 769.35,
      "endTime": 935.35
    },
    {
      "title": "Security Automation and Developers",
      "startTime": 935.35,
      "endTime": 1429.35
    },
    {
      "title": "Lessons from Onboarding Customers",
      "startTime": 1429.35,
      "endTime": 1527.35
    },
    {
      "title": "Reducing Noise and Alert Fatigue with Aikido",
      "startTime": 1527.35,
      "endTime": 1787.35
    },
    {
      "title": "Aikido in the CI/CD Process",
      "startTime": 1787.35,
      "endTime": 2023.35
    },
    {
      "title": "AI Security Integration",
      "startTime": 2023.35,
      "endTime": 2081.35
    },
    {
      "title": "GitHub Actions and Dependencies as Attack Vector",
      "startTime": 2081.35,
      "endTime": 2497.35
    },
    {
      "title": "Dependencies in Programming Languages",
      "startTime": 2497.35,
      "endTime": 2627.35
    },
    {
      "title": "Infrastructure as Code and Cloud Security",
      "startTime": 2627.35,
      "endTime": 3034.35
    },
    {
      "title": "Runtime Protection with Aikido Zen",
      "startTime": 3034.35,
      "endTime": 3402.35
    },
    {
      "title": "Agent Involvement in Scanning",
      "startTime": 3402.35,
      "endTime": 3611.35
    },
    {
      "title": "Tools to Use Alongside Aikido",
      "startTime": 3611.35,
      "endTime": 3813.35
    },
    {
      "title": "Getting Started with Aikido",
      "startTime": 3813.35,
      "endTime": 3852.35
    }
  ]
}