00:00 Introduction
00:35 The Need for Layered Security
01:32 Decentralization & Phishing
01:47 Irreversible Transactions
03:03 Security Enforcement
04:10 Assuming Security By Default
06:09 New Attack Surfaces
07:00 Government Hackers
08:33 Custodian vs Non-Custodian
09:34 Web2 vs Web3 Breach Severity
