{
  "version": "1.2.0",
  "chapters": [
    {
      "startTime": 51,
      "title": "Introducing James Lee"
    },
    {
      "startTime": 79,
      "title": "ChoicePoint and Data Security"
    },
    {
      "startTime": 538,
      "title": "Data Use: What You Can Do vs. Should Do"
    },
    {
      "startTime": 957,
      "title": "Joining the Identity Theft Resource Center"
    },
    {
      "startTime": 1159,
      "title": "Declining Breach Transparency"
    },
    {
      "startTime": 1494,
      "title": "Data-Fueled Frauds and Scams"
    },
    {
      "startTime": 1834,
      "title": "The Rising Value of Driver's Licenses"
    },
    {
      "startTime": 2044,
      "title": "KYC Processes and Fake Identities"
    },
    {
      "startTime": 2561,
      "title": "Fraud and Self-Custodied Money"
    },
    {
      "startTime": 2953,
      "title": "The Case for Data Minimization"
    },
    {
      "startTime": 3258,
      "title": "Individual Control vs. Custodianship"
    },
    {
      "startTime": 3491,
      "title": "Redesigning Identity from Scratch"
    },
    {
      "startTime": 3691,
      "title": "Actions to Take After a Breach"
    },
    {
      "startTime": 4021,
      "title": "Advice for Small Business Owners"
    }
  ]
}