{"version":"1.2.0","chapters":[{"startTime":0,"title":"Intro"},{"startTime":37.280000000000001,"title":"Prolog"},{"startTime":154.83799999999999,"title":"Hackertool-Paragraphen"},{"startTime":608.39099999999996,"title":"IT-Sicherheit: Quo vadis?"},{"startTime":955.78099999999995,"title":"IT-Sicherheit: Was ist das?"},{"startTime":1368.213,"title":"Ausschuss Digitale Agenda"},{"startTime":1640.3589999999999,"title":"Eckpunkte deutscher Kryptopolitk"},{"startTime":1715.4280000000001,"title":"Staatstrojaner"},{"startTime":2186.2539999999999,"title":"Vulnerabilities Equities Process"},{"startTime":3160.0999999999999,"title":"IT Sicherheitsgesetz 1.0"},{"startTime":3620.819,"title":"ITSG 2.0"},{"startTime":3728.5810000000001,"title":"Passwort-Herausgabe"},{"startTime":4760.0990000000002,"title":"Strafma\u00dferh\u00f6hungen \u00a7202"},{"startTime":4834.5320000000002,"title":"Digitaler Hausfriedensbruch"},{"startTime":5018.1840000000002,"title":"Aktive Ma\u00dfnahmen"},{"startTime":5803.4059999999999,"title":"Rechtswidrig erlangte Daten"},{"startTime":6200.0609999999997,"title":"Anh\u00f6rung im Innenausschuss am 8. April 2019"},{"startTime":6755.326,"title":"Abschlie\u00dfende Bewertung"}]}