{"version":"1.2.0","chapters":[{"startTime":0,"endTime":623,"title":"The Role of CIOs and CSOs"},{"startTime":623,"endTime":1366,"title":"Security in Leadership: Lessons from Family Life"},{"startTime":1366,"endTime":2056,"title":"Managing Risks in Corporate Culture"},{"startTime":2056,"endTime":2871,"title":" Building Trust in Teams and Technology"},{"startTime":2871,"endTime":3721,"title":"Personal Growth Through Professional Challenges"},{"startTime":3721,"endTime":4636,"title":"Balancing Work, Life, and Innovation"},{"startTime":4636,"endTime":5461,"title":"The Ethics of Cybersecurity and Privacy"},{"startTime":5461,"endTime":6231,"title":"Empowering Future Leaders in Cybersecurity"},{"startTime":6231,"endTime":7211,"title":"Facing the Future: Challenges and Opportunities"},{"startTime":7211,"endTime":8400,"title":"Hypothetical Risk Scenarios and Leadership Responsibility"},{"startTime":8400,"endTime":9600,"title":"Adapting Security Practices and Tools"},{"startTime":9600,"endTime":10380,"title":" Building Connections and Sharing Expertise"},{"startTime":10380,"endTime":10666.924,"title":"Final Reflections and Future Plans"}]}