Hacking Expert Witnesses

Hacking expert witnesses and consultants listed here may be able to form expert opinions, draft expert witness reports, provide expert witness testimony at deposition and/or trial as or serve as consulting (non-testifying) experts on hacking. The hacking expert witness listings on this page are typically from fields/areas of expertise such as: Computers, Cybersecurity, Technology, and Telecommunications.

Scott Greene Evidence Solutions, Inc.

Tucson, Arizona
Technology, Telecommunications - Cell Phone Forensics, Digital Forensics, Technology, EDR, ECM, Triangulation, Black Boxes, Electronic Medical Records, EHR,Investigation, Email, Cell phone apps, information Technology, intellectual property, internet, electronics, cyber security, Documents, hacking, data retrieval, Digital evidence
• Accounting Systems • Black Boxes • ECU, EDR, ECM, Etc. • Cell Phones • Call Data Records (CDRs) • Computer Systems • Databases • Digital Cameras • Digital Fraud • Digital Media • Digital Security • Documents • Electronic Logging Devices • Electronic Medical Records (EMR / EHR) • Email / E-mail • Fax Machines • Google Data • GPS Systems • GPS Records • Hacking Events • iCloud data • Intellectual Property • Internet Browsing History • Intrusions • Medical Systems • Other Electronic Devices • Password Cracking • Photo Copiers • Photos and Images • Printers & Fax Machines • Software Applications Custom & Commercial • Software Design & Development • Social Media • Source Code Analysis • Spreadsheets • Telematics Systems • Websites • And More TESTIFYING EXPERIENCE • Civil & Criminal • Special Master • Plaintiff and Defense • Insurance, Corporate, Family Law • Justice, Superior & District Courts as well as Arbitration Hearing CASE BREAKDOWN • Civil Defendants-30%• Civil Plaintiffs-50%•...

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Arizona
Computers, Cybersecurity - Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I am an information security and digital forensics practitioner with significant experience in eDiscovery. My most frequent practical contributions in litigation consulting are as follows: • Distinguishing useful ESI from non probative data • Overcoming adverse party’s resistance to producing ESI • Producing ESI with confidence it will be admissible • Delivering concise written reports that clarify rather than confuse • Incorporating digital evidence into the legal strategy • Advising methods that will contain costs and save time for all parties • Served as litigation consultant or expert witness in Arizona, California, Florida, Illinois, Mississippi, Nevada, New Mexico. New York, Texas, and Utah I have six (6) advanced technical certifications: • G2700, GCFA, GPCI, GSEC, CGEIT, GRISC. • These certifications cover information security, information governance, the ISO security standard, compliance, and digital forensics. Additional qualificati...

John Horst, CISSP®-ISSAP® Xanesti Technology Services, LLC

San Diego, California
Computers, Cybersecurity - Computer, Digital Forensics, Discovery, Databases, Class Action, Hacking, Breach, Encryption Safe Harbor, Health Care Data, Digital Medical Records, HIPAA, PII
John Horst, CISSP®-ISSAP®, is the Managing Member for Technology and Innovation for Xanesti Technology Services, LLC. John has provided expert information technology consulting across several lines of business such as pharmaceutical development, medical billing, general liability insurance, clinical laboratory systems, mortgage financing, and automotive aftermarket products. John has provided cybersecurity engineering, software development, installation and training, and troubleshooting for 11 years in support of multiple U.S. Navy programs of record, including programs operating at both unclassified and secret levels. John maintains an active national security clearance at the SECRET level. John has taught information technology courses for the University of Phoenix (San Diego and Online campuses) and Coleman University (San Diego) where John pioneered the development of computer game software development instruction, now a core part of the Coleman curriculum. John has also ta...

Jonathan Gibney Southridge Technology

Brookfield, Connecticut
Cybersecurity, Computers - business technology, ransomware, firewall, network, end-user, business continuity, hacking, security, computer, disaster recovery, managed services, cybersecurity, server, virus, IT, email, education
Jonathan Gibney Southridge Technology Co-owner and CEO  With more than 25 years of experience in technology and 8 more in finance, Jonathan Gibney is the co-owner and CEO of Southridge Technology, a leading IT firm and multi-year winner of the Marcum Tech Top 40 Award. He holds a certificate in Cybersecurity from MIT and, as an expert in HIPAA security, Cloud Computing and the use of technology in small and mid-sized businesses, Jonathan has been published in several regional and state dental association professional journals and is a regular conference presenter.

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Las Vegas, Nevada
Computers, Cybersecurity - Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I am an information security and digital forensics practitioner with significant experience in eDiscovery. My most frequent practical contributions in litigation consulting are as follows: • Distinguishing useful ESI from non probative data • Overcoming adverse party’s resistance to producing ESI • Producing ESI with confidence it will be admissible • Delivering concise written reports that clarify rather than confuse • Incorporating digital evidence into the legal strategy • Advising methods that will contain costs and save time for all parties • Served as litigation consultant or expert witness in Arizona, California, Florida, Illinois, Mississippi, Nevada, New Mexico. New York, Texas, and Utah I have six (6) advanced technical certifications: • G2700, GCFA, GPCI, GSEC, CGEIT, GRISC. • These certifications cover information security, information governance, the ISO security standard, compliance, and digital forensics. Additional qualificati...

Steven Bergin Cybertek Forensics, Inc.

King of Prussia, Pennsylvania
Cybersecurity, Technology - Digital Forensics, Cell Phones, Call Data Records, Digital Security, Hacking, Intellectual Property, Password Cracking, Mobile Forensics, E-Discovery, Cyber Security, Investigation, Computer Hacking
Experienced military veteran and IT Specialist in Digital Forensics, Network Administration and Management, with a demonstrated history of working in the U.S. defense industry, Federal law enforcement, military and the financial industry. Skilled in network management, Digital Forensics, Blacklight forensic software, AccessData AD lab forensics software, Internet Evidence Finder (IEF), Griffeye modular digital investigation platform, Cellibrite UFED 4PC mobile device forensics, evidence collection and chain of custody procedures, write-blocking forensic imaging hardware tools. Strong professional currently enrolled in a M.S in Digital Forensics program at Champlain College. Holds a B.S. in Communications from Liberty University and a A.S. focused on Information Systems Technology from Community College of the United States Air Force. Certificates & Training & Navy Awards o AccessData Certified Examiner (ACE), 2016 o CompTIA Security + certification, 2009 o Cyber Systems Operation...