{"version":"1.2.0","chapters":[{"startTime":0,"title":"Intro"},{"startTime":33.631999999999998,"title":"Prolog"},{"startTime":73.111999999999995,"title":"Feedback: SCADA"},{"startTime":285.43000000000001,"title":"Vierer und Achter"},{"startTime":854.76199999999994,"title":"Tkmog und die Datenautobahn"},{"startTime":1549.056,"title":"Anh\u00f6rung IT-Sicherheitsgesetz 2.0"},{"startTime":1752.8910000000001,"title":"IT-SiG 2.0: Eingangsstatement"},{"startTime":2195.1959999999999,"title":"IT-SiG 2.0: Stellungnahme"},{"startTime":4138.0929999999998,"title":"IT-SiG 2.0: Rolle des BSI"},{"startTime":4505.4430000000002,"title":"IT-SiG 2.0: Portscans"},{"startTime":4798.8100000000004,"title":"IT-SiG 2.0: Eingriffe in Systeme"},{"startTime":5950.4340000000002,"title":"IT-SiG 2.0: Anh\u00f6rungsverlauf"},{"startTime":6785.9409999999998,"title":"IT-SiG 2.0: Lex Huawei"},{"startTime":8011.1289999999999,"title":"IT-SiG 2.0:  IT-Sicherheitskennzeichen"},{"startTime":8657.1810000000005,"title":"IT-SiG 2.0: Roundup"},{"startTime":8821.6450000000004,"title":"Epilog"}]}