{
  "version": "1.2.0",
  "chapters": [
    {
      "title": "Panelist Intros",
      "startTime": 0,
      "endTime": 341.64
    },
    {
      "title": "Whitworth Breach",
      "startTime": 341.64,
      "endTime": 616.64
    },
    {
      "title": "What to do Months After a Breach",
      "startTime": 616.64,
      "endTime": 715.64
    },
    {
      "title": "Ways to be Prepared for a Breach",
      "startTime": 715.64,
      "endTime": 1162.64
    },
    {
      "title": "Phishing and Training",
      "startTime": 1162.64,
      "endTime": 1371.64
    },
    {
      "title": "Susceptibility After a Breach",
      "startTime": 1371.64,
      "endTime": 1493.64
    },
    {
      "title": "Communication of a Breach",
      "startTime": 1493.64,
      "endTime": 1869.64
    },
    {
      "title": "Lessons to Learn from a Breach",
      "startTime": 1869.64,
      "endTime": 2123.64
    },
    {
      "title": "How to Leverage Students in the IT Programs ",
      "startTime": 2123.64,
      "endTime": 2287.64
    },
    {
      "title": "Is Physical Security Still a Part of the Conversation?",
      "startTime": 2287.64,
      "endTime": 2495.64
    }
  ]
}