Cybersecurity Expert Witnesses

The SEAK Expert Witness Directory contains a comprehensive list of cybersecurity expert witnesses who testify, consult and provide litigation support on cybersecurity and related issues. Cybersecurity expert witnesses and consultants on this page may form expert opinions, draft expert witness reports, and provide expert witness testimony at deposition and trial. The issues and subjects these cybersecurity expert witnesses testify regarding may include: Cybersecurity, Digital Forensics, Computer Forensics, Email, Ransomware, Meta Data, Software, Artificial Intelligence, E Discovery, Fraud, Hacking, Information Security, Intellectual Property, Ai, and Blockchain.

Use the search box above to further refine your search for cybersecurity expert witnesses by keyword and state. Attorneys contact the experts directly – with no middleman.

Eric Cole

Secure Anchor Consulting

Cybersecurity, Computers - Computer Forensics, Computer Investigations, Computer Security, Cyber Breach, Intellectual Property, Loss Prevention, Network Security, Security Management, Security Negligence, Trade Secrets, Security Standards, Data Privacy, Cloud Security, Patents, Apportionment, Infringement, Damages, Meta Data
Dr. Eric Cole is a computer and cybersecurity expert who has built a solid reputation in the information technology industry over the last three decades. His educational experience includes a master’s degree in computer science from the New York Institute of Technology, and a doctorate in Professional Studies from Pace University. Dr. Cole’s expert involvement in the cybersecurity industry is demonstrated by being appointed as the commissioner on cybersecurity for the 44th president, holding a position as a senior fellow at SANS, and being elected to the Purdue University Executive Advisory Board. His extensive real-world experience includes being the former Chief Technology Officer for McAfee, former Chief Scientist at Lockheed Martin, and former Program Manager at the Central Intelligence Agency. Currently, he is the CEO and Founder of Secure Anchor Consulting. His consulting clients include Fortune 500 companies, Fortune 50 companies, international organizations, and the feder...

Scott Greene

Digital Evidence Expert

Evidence Solutions, Inc.

Tucson, Arizona
Technology, Telecommunications - Call Detail Records, Text Message retrieval, app data, GPS, Triangulation, Digital Forensics, ELDs, Black Box Data, Electronic Medical Records, electronic evidence, Cybersecurity, Document Authentication, data retrieval, meta data, Audio/video/imagery analysis, computers, eDiscovery,data fabrication
For over 42 years, Scott Greene has been helping judges, attorneys, and organizations understand data. He collects, analyzes, and explains complex electronic and digital evidence in legal matters. His extensive and diverse experience allows him to be an expert in many facets of digital technology, including Cell Phone Forensics, Black Boxes / Event Data Recorders (EDRs), Triangulation, Electronic Logging Devices (ELDs), Computers, Electronic Medical Records (EMR) Forensics eDiscovery, Mobile Device Passcode Breaking, and much more. Scott founded Evidence Solutions, Inc., a premier forensics and expert witness firm, and Great Scott Enterprises, Inc., which provided superior computer consulting services. Today, Scott is an Affiliated Professional Member of the American Bar Association and heads the Digital Forensics Division of Evidence Solutions, Inc., working as an Expert Witness and Digital Forensics professional. He has served as an Expert Witness and Special Master in both Feder...

Jeff M Martin

Digital Forensics Expert

Evidence Solutions, Inc.

Tucson, Arizona
Technology, Telecommunications - Cell Phone Forensics, Call Detail Records, EMR/EHR Forensics, Cell Tower Triangulation, GPS Triangulation, Computer Forensics, Cybersecurity, Data Communications, Data Retrieval & Analysis, Digital Media, Email, GPS Systems, iCloud Data, Information Technology, Internet, Software, Malware Analyst
Jeff Martin is a Digital Forensics Expert specializing in Cell Phone Forensics, Black Box/EDR Forensics, Cybersecurity, EMR/EHR Forensics, Audio/Video/Imagery Forensics and more. Jeff has conducted hundreds of digital forensics investigations on cases involving the acquisition, preservation, and analysis of data in legal disputes in both state and federal courts. Jeff is a certified digital forensics examiner with over 15 years of experience. He initially made a mark as a small business IT consultant, lauded for his knack for simplifying technical information to non-technical audiences. Following a successful decade as the Director of Information Technology & Security in the Financial Industry, he earned the Certified Credit Union Executive (CCUE) certification after attending the Credit Union National Association’s (CUNA) Management School. Jeff then applied his passion for technology to solving crimes as a Digital Forensics Analyst for the Michigan State Police. Today, Jeff is...

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Arizona
Computers, Cybersecurity - Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I work with attorneys to interpret digital evidence, and tell a powerful story. My technical expertise saves time and money: pre-discovery communications, forensically-sound data preservation, and reports that pack a punch. Expert analysis for electronic medical records, business espionage, employee misconduct, vehicle computer systems, video surveillance, cybercrime, divorce, probate and more (ask about your case -- initial consultation is free). I have more than two decades in the field. Court appearances in multiple states. A live person always answers the phone. My most frequent practical contributions in litigation consulting are as follows: • Distinguishing useful ESI from non probative data • Overcoming adverse party’s resistance to producing ESI • Producing ESI with confidence it will be admissible • Delivering concise written reports that clarify rather than confuse • Incorporating digital evidence into the legal strategy • Advising methods that ...

Alex AKulikov, MS, CFCS, GAAP, PMP

Forensic, Risk and Financial Crimes Expert Witness

Expert CA

Dublin, San Francisco, Sacramento, Los Angeles, California
Financial, Forensic Science - Financial crimes, Forensic examination, Delay damages, Standard of care, Unfair trade practices, Conflict resolution, Damages calculation, Breach of contract, Money laundering, Cybersecurity, Misappropriation of funds, Disputes, Compliance, Risk Management, Fraud, Corruption, Sanctions, Finance, AML
Mr. Alex Kulikov, M.S. (Master of Science), CFCS (Certified Financial Crimes Specialist), GAAP (General Accounting), PMP (Project Management Professional) is a risk management, compliance, forensic examination and financial crimes prevention consulting professional with nearly 30 years of corporate and private consulting, serving over 200 clients across the U.S. and Canada. Among his proven consulting proficiency in financial, construction, health, technology and other industry claims are matters involving risk management; general financial analysis; forensic examination; breach of contract; dispute resolution; data analytics; general accounting (GAAP); due diligence; standard of care; fiduciary duties; negligence and liability claims; AIA and general conditions; procurement risk management; analysis of schedule delays and impacts; budget and cost analysis; general conditions and code compliance; LEAN management; project methodologies; green design, manufacturing and environment; q...

Joseph Greenfield, PhD

Digital Forensics Expert and USC Professor

Maryman & Associates

Los Angeles, California
Computers, Information Technology - Digital Forensics, Computer Forensics, Electronic Evidence, Electronic Discovery, eDiscovery, Email Analysis, Mobile, Computers, Cybersecurity, Cyber Breach Investigations, Cyber Investigations, Incident Response, DFIR
Dr. Joseph Greenfield is the Vice President and Chief Forensic Examiner at Maryman & Associates and an award-winning educator. He is a renowned computer forensics expert with over 15 years of investigative experience, including cyber breach investigations, employee misconduct, and email recovery and analysis. He has worked over 1000 cases and analyzed over 2000 pieces of digital evidence. His is known for deep forensic analysis while being able to explain technical details to non-technical decision-makers. He has provided expert witness testimony in state, federal, and international legal matters. Dr. Greenfield is also an Associate Professor of Information Technology Practice at the Viterbi School of Engineering at the University of Southern California, where he authored the undergraduate programs in both cybersecurity and digital forensics. In 2014, the Ponemon Institute ranked USC as 6th in the nation for “Best Schools for Cybersecurity” and the highest ranked on the West Coas...

John Horst, CISSP®-ISSAP®

Xanesti Technology Services, LLC

San Diego, California
Computers, Cybersecurity - Cybersecurity, Forensics, HIPAA, Privacy Act, NIST, Discovery, Breach, AI
John Horst, CISSP®-ISSAP®, is the owner and Chief Technology Officer for Xanesti Technology Services, LLC. John has provided expert information technology consulting across several lines of business such as pharmaceutical development, medical billing, general liability insurance, clinical laboratory systems, mortgage financing, and automotive aftermarket products. John has provided cybersecurity engineering, software development, installation and training, and troubleshooting for 11 years in support of multiple U.S. Navy programs of record, including programs operating at both unclassified and secret levels. John maintains an active national security clearance at the TOP SECRET level. John has taught information technology courses for the University of Phoenix (San Diego and Online campuses) and Coleman University (San Diego) where John pioneered the development of computer game software development instruction, now a core part of the Coleman curriculum. John has also taught ph...

Brad A LaPorte

Top Cybersecurity & Information Technology Expert

High Tide Advisors

California
Cybersecurity, Information Technology - Fraud, Defamation, Analyst, Ransomware, Endpoint, network, cyber, insurance, penetration, testing, malware, computer, breach, managed, risk, vulnerability, crime, threat, attack, hack
Brad A. LaPorte is a cybersecurity and Information Technology consultant and currently serving as a founder of High Tide Advisors. He has over 20+ years of experience as a consultant in the cybersecurity industry spanning various industry segments. Pior Cases: Pior cases have involved high profile companies and persons such as Bungie the Video Gaming Division of Sony, SentinelOne, BlackBerry, Red Canary, and the Miami-Dade Mayor Candidate and Influencer Alexander Otaola. Topics have included intellectual property theft, wire fraud, real estate fraud, lack of adherence to cybersecurity best practices and regulations, conflicts of interest, malicious tampering and reverse engineering of software and hardware, interference with business relationships, defamation, and matters involving impersonation with malicious intent. Career History and Expertise: Prior to forming High Tide Advisors, he served as a top Gartner Research Analyst, including but not limited to the following spec...

Randy A Winters

Software Engineering, AI, Privacy, Forensics, IPR

MatrixHCI, LLC

California
Software Engineering, Computers - Cybersecurity, Software Architecture, Artificial Intelligence, Cryptocurrency / Blockchain, Speech & Face Recognition, ESI Protocol, Social Media Forensics, Biometric Identifiers, Code Review, Patent Infringement, Trade Secret, IPR, PTAB, Claim Analysis, Forensic Data Extraction, BIPA
“Mr. Winters was both helpful & enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, & dedicated in providing feedback & expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - 30+ years experience in the industry with a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) - Expert in all facets of Software Engineering - AI Expert in knowledge base systems, chatGPT & other Large Language Models - Experienced AI prompt engineering - Holds AI patents in the US & abroad - Expert retained for numerous cases involving user privacy to include cases involving the Illinois Biometric Information Protection Act (BIPA) - Expert knowledge in speech / facial recognition, detection & other biometric identifiers - Experience challenging Viola-Jones facial detection argument - Expert in all privacy cases involving Speech / Facial Recognition, Biometric Identifiers, Voiceprints & the use & stora...

Jonathan Gibney

Expert Witness in Cybersecurity, IT & Technology

Southridge Technology

Brookfield, Connecticut
Cybersecurity, Computers - business technology, ransomware, firewall, network, end-user, business continuity, hacking, security, computer, disaster recovery, managed services, cybersecurity, server, virus, IT, email, education
Jonathan Gibney Southridge Technology Co-owner and CEO  With more than 25 years of experience in technology and 8 more in finance, Jonathan Gibney is the co-owner and CEO of Southridge Technology, a leading IT firm and multi-year winner of the Marcum Tech Top 40 Award. He holds a certificate in Cybersecurity from MIT and, as an expert in HIPAA security, Cloud Computing and the use of technology in small and mid-sized businesses, Jonathan has been published in several regional and state dental association professional journals and is a regular conference presenter.

Jonathan E Hochman

Hochman Consultants

Cheshire, Connecticut
Internet, Cybersecurity - E-commerce, Ecommerce, SEO, Search Engine Optimization, PPC, Pay Per Click Advertising, Internet Marketing, Web Development, Mobile Apps, Google Analytics, Google Ads, Digital Forensics, Internet Security, Privacy, Wiretapping, Patent, Trademark, Reputation Management, Online Defamation
Jonathan Hochman serves as consulting and testifying expert for cases related to Internet marketing, e-commerce, website development, digital forensics, search engine optimization (SEO), pay-per-click (PPC) advertising, privacy, securities fraud in the technology industry, and disputes related to technology startups. Since 2007 he has provided expert witness services to plaintiffs and defendants alike for disputes involving trademarks, patents, trade secrets, copyrights, contracts, defamation and online reputation, unfair competition, conspiracy and fraud. Hochman has testified at eighteen trials and fifty-six depositions. He has served as a consulting expert in many more cases. His clients have been located in the United States, the United Kingdom, Canada, Australia, Israel, Ukraine, and Romania. A Yale University graduate with two degrees in computer science, Hochman has worked as a sales, marketing and technology consultant for 34 years. After managing several prior business...

Brad A LaPorte

Top Cybersecurity & Information Technology Expert

High Tide Advisors

Juno Beach, Florida
Cybersecurity, Information Technology - Fraud, Defamation, Analyst, Ransomware, Endpoint, network, cyber, insurance, penetration, testing, malware, computer, breach, managed, risk, vulnerability, crime, threat, attack, hack
Brad A. LaPorte is a cybersecurity and Information Technology consultant and currently serving as a founder of High Tide Advisors. He has over 20+ years of experience as a consultant in the cybersecurity industry spanning various industry segments. Pior Cases: Pior cases have involved high profile companies and persons such as Bungie the Video Gaming Division of Sony, SentinelOne, BlackBerry, Red Canary, and the Miami-Dade Mayor Candidate and Influencer Alexander Otaola. Topics have included intellectual property theft, wire fraud, real estate fraud, lack of adherence to cybersecurity best practices and regulations, conflicts of interest, malicious tampering and reverse engineering of software and hardware, interference with business relationships, defamation, and matters involving impersonation with malicious intent. Career History and Expertise: Prior to forming High Tide Advisors, he served as a top Gartner Research Analyst, including but not limited to the following spec...

Joseph L Sutherland, PhD

Data, analytics, and technology - Emory Faculty

J.L. Sutherland & Associates, Inc.

Atlanta, Georgia
Business Damages, Technology - Economics, Econometrics, Data, Analytics, Big Data, Machine Learning (ML), Artificial Intelligence (AI), Software, Cloud Computing, Data Science, Survey Research, Digital Advertising, Finance, Banking, Healthcare, Antitrust, Class Action, Class Certification, Contractual Disputes, Cybersecurity
Dr. Joe Sutherland is the founding director of Emory's Center for AI Learning, a professor in Emory’s Department of Quantitative Theory & Methods, associate faculty at the Empathetic AI for Health Institute at Emory Healthcare, principal investigator of the Emory branch of the U.S. AI Safety Institute Consortium, and fellow of the Weidenbaum Center on the Economy, Public Policy, and Government at Washington University in St. Louis. His work has been featured on FOX 5 Good Day Atlanta, Atlanta Journal-Constitution, Forbes, Georgia Trend, Government Technology, MIT Sloan Management Review, and many other venues. His professional background includes leadership service at The White House, Cisco, Amazon, and as CEO of an AI startup. His research exploring the utilization of machine learning and AI in congressional lawmaking, state policy leadership, and development economics is published in top peer-reviewed journals. He holds patents for systems that manage and analyze petabyte-level da...

Mehdi Tarrit Mirakhorli, PhD

Honolulu, Hawaii
Computers, Cybersecurity - Software Development, source code, Artificial Intelligence, Cybersecurity, Software Design, Trade Secret, Database, API, Software, Copy Right, Software programming, Software maintenance, software security, Offensive Security, Defensive Security, AI
Mehdi Tarrit Mirakhorli is software engineering professor in the department of Information and Computer Sciences at University of Hawaii at Manoa. Prior to that Dr. Mirakhorli served as Kodak Endowed Chair, Associate Professor and Director of Research at ESL Global Cybersecurity Institute and Software Engineering Department at Rochester Institute of Technology. Mirakhorli is also the director of Software Assurance Laboratory. He has carried out various projects of national importance in the areas of software engineering, software design, trustworthy software, cybersecurity, Artificial Intelligence (AI) and AI-enabled software. Additionally, Dr. Tarrit Mirakhorli has supported the implementation of President Biden's Executive Order on Improving the Nation’s Cybersecurity. Dr. Tarrit Mirakhorli, has been ALTA Distinguished Speaker at Alcatel-Lucent, and has delivered numerous technical briefings to public policymakers, members of Congress, government officials, and the general public...

Gregory Bailey

Springfield, Illinois
Cybersecurity, Information Technology - Cyber, Cyber Security, Information Security, Infosec, IT, Incident Response, Hack, Red Team, Penetration Testing, Pentest, Ransomware, Threat Actor, Hacker
Principal Instructor at the SANS Institute with the following certifications: Offensive Security Certified Professional (OSCP), GIAC Penetration Tester (GPEN), GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), GIAC Certified Forensic Analyst (GCFA), among others.

Randy A Winters

Software Engineering, AI, Privacy, Forensics, IPR

MatrixHCI, LLC

Illinois
Software Engineering, Computers - Cybersecurity, Software Architecture, Artificial Intelligence, Cryptocurrency / Blockchain, Speech & Face Recognition, ESI Protocol, Social Media Forensics, Biometric Identifiers, Code Review, Patent Infringement, Trade Secret, IPR, PTAB, Claim Analysis, Forensic Data Extraction, BIPA
“Mr. Winters was both helpful & enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, & dedicated in providing feedback & expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - 30+ years experience in the industry with a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) - Expert in all facets of Software Engineering - AI Expert in knowledge base systems, chatGPT & other Large Language Models - Experienced AI prompt engineering - Holds AI patents in the US & abroad - Expert retained for numerous cases involving user privacy to include cases involving the Illinois Biometric Information Protection Act (BIPA) - Expert knowledge in speech / facial recognition, detection & other biometric identifiers - Experience challenging Viola-Jones facial detection argument - Expert in all privacy cases involving Speech / Facial Recognition, Biometric Identifiers, Voiceprints & the use & stora...

Bruce Schneier

Cambridge, Massachusetts
Cybersecurity, Information Technology - Cryptography, internet security, denial-of-service attacks, ransomware, internet-of-things security, privacy, surveillance, supply chain security, 5G security, blockchain, cryptocurrencies, artificial intelligence, LLMs, adversarial machine learning, election security, spyware, stalkerware
Bruce Schneier is an internationally renowned security technologist, called a “security guru” by the Economist. He is the New York Times best-selling author of 14 books -- ­including "A Hacker's Mind" -- ­as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and blog "Schneier on Security" are read by over 250,000 people. Schneier is a Lecturer in Public Policy at the Harvard Kennedy School, a fellow at the Berkman-Klein Center for Internet and Society at Harvard University, a board member of the Electronic Frontier Foundation and AccessNow, and an advisory board member of EPIC and VerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc.

Randy A Winters

Software Engineering, AI, Privacy, Forensics, IPR

MatrixHCI, LLC

Massachusetts
Software Engineering, Computers - Cybersecurity, Software Architecture, Artificial Intelligence, Cryptocurrency / Blockchain, Speech & Face Recognition, ESI Protocol, Social Media Forensics, Biometric Identifiers, Code Review, Patent Infringement, Trade Secret, IPR, PTAB, Claim Analysis, Forensic Data Extraction, BIPA
“Mr. Winters was both helpful & enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, & dedicated in providing feedback & expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - 30+ years experience in the industry with a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) - Expert in all facets of Software Engineering - AI Expert in knowledge base systems, chatGPT & other Large Language Models - Experienced AI prompt engineering - Holds AI patents in the US & abroad - Expert retained for numerous cases involving user privacy to include cases involving the Illinois Biometric Information Protection Act (BIPA) - Expert knowledge in speech / facial recognition, detection & other biometric identifiers - Experience challenging Viola-Jones facial detection argument - Expert in all privacy cases involving Speech / Facial Recognition, Biometric Identifiers, Voiceprints & the use & stora...

Stacy R Eldridge, CFCE, ICMDE, GCFE, MCFE, GSEC, GCCC, LPD

iPhone & Android Forensics. Computer Forensics.

Silicon Prairie Cyber Services

Lincoln, Nebraska
Computers, Cybersecurity - Computer Forensics, Digital Forensics, Mobile Forensics, Cell Phone, iPhone, Android, Email, Meta Data, Data Recovery, Deleted Files, Video Analysis, Image Analysis, RAM, Data Loss Prevention, Insider Threat, Cybersecurity, Cybercrime, FBI, Forensic Analysis, Computer Investigation
Stacy Eldridge is a former Senior Forensic Examiner with the FBI, and began her security career over 20 years ago in the FBI. Today, she is a leading force behind Silicon Prairie Cyber Services, bringing two decades of digital forensics and cybersecurity expertise to the company. Stacy's services include iPhone forensics, Android Forensics, digital forensics, litigation support, expert witness testimony, cybersecurity consulting and teaching . As a respected educator, she is an adjunct professor teaching digital forensics and cybersecurity classes for OSU and Bellevue University, and she also coaches IACIS. Stacy's passion goes beyond just finding evidence - it's about understanding it and helping others comprehend its significance. With a keen eye for the truth, Stacy's unwavering dedication to her craft makes her a trusted authority in digital forensics and cybersecurity. Whether it's a complete digital forensics examination, a second opinion, or a report review, Stacy offers a n...

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Las Vegas, Nevada
Computers, Cybersecurity - Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I work with attorneys to interpret digital evidence, and tell a powerful story. My technical expertise saves time and money: pre-discovery communications, forensically-sound data preservation, and reports that pack a punch. Expert analysis for electronic medical records, business espionage, employee misconduct, vehicle computer systems, video surveillance, cybercrime, divorce, probate and more (ask about your case -- initial consultation is free). I have more than two decades in the field. Court appearances in multiple states. A live person always answers the phone. My most frequent practical contributions in litigation consulting are as follows: • Distinguishing useful ESI from non probative data • Overcoming adverse party’s resistance to producing ESI • Producing ESI with confidence it will be admissible • Delivering concise written reports that clarify rather than confuse • Incorporating digital evidence into the legal strategy • Advising methods that ...

Brad A LaPorte

Top Cybersecurity & Information Technology Expert

High Tide Advisors

New York
Cybersecurity, Information Technology - Fraud, Defamation, Analyst, Ransomware, Endpoint, network, cyber, insurance, penetration, testing, malware, computer, breach, managed, risk, vulnerability, crime, threat, attack, hack
Brad A. LaPorte is a cybersecurity and Information Technology consultant and currently serving as a founder of High Tide Advisors. He has over 20+ years of experience as a consultant in the cybersecurity industry spanning various industry segments. Pior Cases: Pior cases have involved high profile companies and persons such as Bungie the Video Gaming Division of Sony, SentinelOne, BlackBerry, Red Canary, and the Miami-Dade Mayor Candidate and Influencer Alexander Otaola. Topics have included intellectual property theft, wire fraud, real estate fraud, lack of adherence to cybersecurity best practices and regulations, conflicts of interest, malicious tampering and reverse engineering of software and hardware, interference with business relationships, defamation, and matters involving impersonation with malicious intent. Career History and Expertise: Prior to forming High Tide Advisors, he served as a top Gartner Research Analyst, including but not limited to the following spec...

Patrick M. OLeary, MBA, BSEE, CISSP, CEH

ExpertWitness.com

Hauppauge, New York
Internet, Information Technology - Computers/IT, Cybersecurity, Internet Forensics, Data Forensics, Internet Expert Witness, Software, MBA, Intellectual Property, Prior Art, Patents, Internet Hosting, Email, World Wide Web (WWW), Internet Litigation, Computer Science, Internet Liability/Damages, Litigation. Support, CISSP, CEH, CHFI
I am an entrepreneur who has been the founder of several different startup companies across a variety of information technology industries yielding me diverse Business, Technical & Internet expertise. I have worked as an Internet Litigation Consultant working for law firms as an Internet Expert Witness. Early business entry, which was a way to pass the time, soon paved my career path. I became the CEO and sole proprietor of MatchMaker.com in 1995. My site generated an adequate amount of revenue, thus being self-funded and be free of any venture capital. By 1999, my company expanded to employ over 30 people and generate more than $7 million every year. When we sold to Lycos in July 2000 for 45 million dollars, the 30 employees expanded to more than 120 people, signifying exponential growth in such a short period. With lots of success and a growth rate of 8% (or greater) per month, MatchMaker.com was designated as the "2nd stickiest website on the internet" by Jupiter Media and was ...

Randy A Winters

Software Engineering, AI, Privacy, Forensics, IPR

MatrixHCI, LLC

New York
Software Engineering, Computers - Cybersecurity, Software Architecture, Artificial Intelligence, Cryptocurrency / Blockchain, Speech & Face Recognition, ESI Protocol, Social Media Forensics, Biometric Identifiers, Code Review, Patent Infringement, Trade Secret, IPR, PTAB, Claim Analysis, Forensic Data Extraction, BIPA
“Mr. Winters was both helpful & enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, & dedicated in providing feedback & expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - 30+ years experience in the industry with a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) - Expert in all facets of Software Engineering - AI Expert in knowledge base systems, chatGPT & other Large Language Models - Experienced AI prompt engineering - Holds AI patents in the US & abroad - Expert retained for numerous cases involving user privacy to include cases involving the Illinois Biometric Information Protection Act (BIPA) - Expert knowledge in speech / facial recognition, detection & other biometric identifiers - Experience challenging Viola-Jones facial detection argument - Expert in all privacy cases involving Speech / Facial Recognition, Biometric Identifiers, Voiceprints & the use & stora...

C. Matthew Curtin, CISSP

Interhack Corporation

Columbus, Ohio
Computers, Cybersecurity - Data Breach, Security Incident, Information Security, Computer Science, Encryption
C. Matthew Curtin, CISSP is the Founder and CEO of Interhack Corporation. Curtin is Interhack’s lead computer scientist and cybersecurity expert. Curtin has been engaged in criminal, civil, administrative, and military processes by plaintiffs, defendants, and the courts directly. His opinion has been accepted by federal and state courts throughout the country in hearings, trials, and appeals. Curtin and his team help attorneys and executives understand the meaning and context of data and how they affect business, operations, or a legal case. Curtin’s vast knowledge and experience in the field of computer science and cybersecurity enables him to convey the optimal path forward and offer an opinion within a degree of scientific certainty. Curtin’s experience in the field enables him to train his team to operate in specialized task forces organized to respond to high-stakes situations such as data breaches. Curtin's work centers on the intersection of law and technology. The U.S. Cou...

Steven Bergin

Cybertek Forensics, Inc.

King of Prussia, Pennsylvania
Cybersecurity, Technology - Digital Forensics, Cell Phones, Call Data Records, Digital Security, Hacking, Intellectual Property, Password Cracking, Mobile Forensics, E-Discovery, Cyber Security, Investigation, Computer Hacking
Experienced military veteran and IT Specialist in Digital Forensics, Network Administration and Management, with a demonstrated history of working in the U.S. defense industry, Federal law enforcement, military and the financial industry. Skilled in network management, Digital Forensics, Blacklight forensic software, AccessData AD lab forensics software, Internet Evidence Finder (IEF), Griffeye modular digital investigation platform, Cellibrite UFED 4PC mobile device forensics, evidence collection and chain of custody procedures, write-blocking forensic imaging hardware tools. Strong professional currently enrolled in a M.S in Digital Forensics program at Champlain College. Holds a B.S. in Communications from Liberty University and a A.S. focused on Information Systems Technology from Community College of the United States Air Force. Certificates & Training & Navy Awards o AccessData Certified Examiner (ACE), 2016 o CompTIA Security + certification, 2009 o Cyber Systems Operation...

Paul Sibenik

Pittsburgh, Pennsylvania
Cryptocurrency, Securities & Investments - blockchain, bitcoin, blockchain forensics, hacks, theft, fraud, pig butchering, embezzlement, ransomware, ethereum, crypto, SIM Swaps, compliance, cybersecurity, cryptocurrency tracking, cryptocurrency tracing, staking, NFTs, ponzi schemes, smart contracts
Paul Sibenik is a blockchain forensics and cryptocurrency tracing expert. He frequently conducts investigations in a range of niches, including cryptocurrency hacks, exploits, vulnerabilities, thefts, fraud, SIM Hijacking, fraud, ransomware, embezzlement, and pig butchering scams. Tracking cryptocurrency such as Bitcoin and Ethereum often plays a critical role in his investigations. Additionally, Paul has been appointed as an expert in many civil disputes, including bankruptcy divorce matters, having worked on more than 100 cases involving cryptocurrency in divorce alone. He has also frequently been asked to open on matters related to Anti-money laundering (AML), compliance, cybersecurity, NFTs, and staking.

Brad A LaPorte

Top Cybersecurity & Information Technology Expert

High Tide Advisors

Texas
Cybersecurity, Information Technology - Fraud, Defamation, Analyst, Ransomware, Endpoint, network, cyber, insurance, penetration, testing, malware, computer, breach, managed, risk, vulnerability, crime, threat, attack, hack
Brad A. LaPorte is a cybersecurity and Information Technology consultant and currently serving as a founder of High Tide Advisors. He has over 20+ years of experience as a consultant in the cybersecurity industry spanning various industry segments. Pior Cases: Pior cases have involved high profile companies and persons such as Bungie the Video Gaming Division of Sony, SentinelOne, BlackBerry, Red Canary, and the Miami-Dade Mayor Candidate and Influencer Alexander Otaola. Topics have included intellectual property theft, wire fraud, real estate fraud, lack of adherence to cybersecurity best practices and regulations, conflicts of interest, malicious tampering and reverse engineering of software and hardware, interference with business relationships, defamation, and matters involving impersonation with malicious intent. Career History and Expertise: Prior to forming High Tide Advisors, he served as a top Gartner Research Analyst, including but not limited to the following spec...

Randy A Winters

Software Engineering, AI, Privacy, Forensics, IPR

MatrixHCI, LLC

Saint George, Utah
Software Engineering, Computers - Cybersecurity, Software Architecture, Artificial Intelligence, Cryptocurrency / Blockchain, Speech & Face Recognition, ESI Protocol, Social Media Forensics, Biometric Identifiers, Code Review, Patent Infringement, Trade Secret, IPR, PTAB, Claim Analysis, Forensic Data Extraction, BIPA
“Mr. Winters was both helpful & enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, & dedicated in providing feedback & expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - 30+ years experience in the industry with a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) - Expert in all facets of Software Engineering - AI Expert in knowledge base systems, chatGPT & other Large Language Models - Experienced AI prompt engineering - Holds AI patents in the US & abroad - Expert retained for numerous cases involving user privacy to include cases involving the Illinois Biometric Information Protection Act (BIPA) - Expert knowledge in speech / facial recognition, detection & other biometric identifiers - Experience challenging Viola-Jones facial detection argument - Expert in all privacy cases involving Speech / Facial Recognition, Biometric Identifiers, Voiceprints & the use & stora...

Eric Cole

Secure Anchor Consulting

Ashburn, Virginia
Cybersecurity, Computers - Computer Forensics, Computer Investigations, Computer Security, Cyber Breach, Intellectual Property, Loss Prevention, Network Security, Security Management, Security Negligence, Trade Secrets, Security Standards, Data Privacy, Cloud Security, Patents, Apportionment, Infringement, Damages, Meta Data
Dr. Eric Cole is a computer and cybersecurity expert who has built a solid reputation in the information technology industry over the last three decades. His educational experience includes a master’s degree in computer science from the New York Institute of Technology, and a doctorate in Professional Studies from Pace University. Dr. Cole’s expert involvement in the cybersecurity industry is demonstrated by being appointed as the commissioner on cybersecurity for the 44th president, holding a position as a senior fellow at SANS, and being elected to the Purdue University Executive Advisory Board. His extensive real-world experience includes being the former Chief Technology Officer for McAfee, former Chief Scientist at Lockheed Martin, and former Program Manager at the Central Intelligence Agency. Currently, he is the CEO and Founder of Secure Anchor Consulting. His consulting clients include Fortune 500 companies, Fortune 50 companies, international organizations, and the feder...
You can also find Cybersecurity Expert Witnesses in:
Arizona, California, Connecticut, Florida, Georgia, Hawaii , Illinois, Massachusetts, Nebraska, Nevada, New York, Ohio, Pennsylvania, Utah, and Virginia