Computer Expert Witnesses

Computer expert witnesses and consultants listed here may be able to form expert opinions, draft expert witness reports, provide expert witness testimony at deposition and/or trial as or serve as consulting (non-testifying) experts on computer. The computer expert witness listings on this page are typically from fields/areas of expertise such as: Automotive, Computers, Cybersecurity, Forensic Science, Information Technology, Motorcycle, and Telecommunications.

Frank S Will, PhD Ino8

Alabama
Automotive, Motorcycle - Engine, Motor, Defect, Damage, Failure, Exhaust, Emission, Carbon, Monoxide, NOx, Test, Measure, Defeat Device, Computer, Control, Software, Calibration, Tuning, Performance, Power, Fuel, Economy, Combustion, Leak, Heat, Burn, Fire, Gas, Diesel, Motorcycle, Autocycle, Bike, Bicycle, Battery, Lemon
Dr. Will is a technology leader with 30+ years of experience in research, development, operations, and administration, in both academia and manufacturing industry. He holds over 30 patents and is the author or co-author of 24 articles in refereed technical journals and technical conferences, and multiple standards contributions. He was the invited key-note speaker at several conferences. He has significant expert witness experience in vehicle defects and emissions fraud across 4 continents. 100% of his non-pending cases resulted in a win or a very favourable settlement for his clients. In 2016 he prepared an analysis for a defendant to save multi-billions of dollars. In 2018, he was the lead expert witness in a case that resulted in a $120M settlement for his plaintiff clients only 4 weeks after his report about the defendants’ expert report was handed down; His reports in another case resulted in a landmark judgement for clients worth up to $2B. A further client saved millions of...

John Horst, CISSP®-ISSAP® Xanesti Technology Services, LLC

San Diego, California
Computers, Cybersecurity - Computer, Digital Forensics, Discovery, Databases, Class Action, Hacking, Breach, Encryption Safe Harbor, Health Care Data, Digital Medical Records, HIPAA, PII
John Horst, CISSP®-ISSAP®, is the Managing Member for Technology and Innovation for Xanesti Technology Services, LLC. John has provided expert information technology consulting across several lines of business such as pharmaceutical development, medical billing, general liability insurance, clinical laboratory systems, mortgage financing, and automotive aftermarket products. John has provided cybersecurity engineering, software development, installation and training, and troubleshooting for 11 years in support of multiple U.S. Navy programs of record, including programs operating at both unclassified and secret levels. John maintains an active national security clearance at the SECRET level. John has taught information technology courses for the University of Phoenix (San Diego and Online campuses) and Coleman University (San Diego) where John pioneered the development of computer game software development instruction, now a core part of the Coleman curriculum. John has also ta...

Frank S Will, PhD Ino8

Los Gatos , California
Automotive, Motorcycle - Engine, Motor, Defect, Damage, Failure, Exhaust, Emission, Carbon, Monoxide, NOx, Test, Measure, Defeat Device, Computer, Control, Software, Calibration, Tuning, Performance, Power, Fuel, Economy, Combustion, Leak, Heat, Burn, Fire, Gas, Diesel, Motorcycle, Autocycle, Bike, Bicycle, Battery, Lemon
Dr. Will is a technology leader with 30+ years of experience in research, development, operations, and administration, in both academia and manufacturing industry. He holds over 30 patents and is the author or co-author of 24 articles in refereed technical journals and technical conferences, and multiple standards contributions. He was the invited key-note speaker at several conferences. He has significant expert witness experience in vehicle defects and emissions fraud across 4 continents. 100% of his non-pending cases resulted in a win or a very favourable settlement for his clients. In 2016 he prepared an analysis for a defendant to save multi-billions of dollars. In 2018, he was the lead expert witness in a case that resulted in a $120M settlement for his plaintiff clients only 4 weeks after his report about the defendants’ expert report was handed down; His reports in another case resulted in a landmark judgement for clients worth up to $2B. A further client saved millions of...

Jonathan Gibney Southridge Technology

Brookfield, Connecticut
Cybersecurity, Computers - business technology, ransomware, firewall, network, end-user, business continuity, hacking, security, computer, disaster recovery, managed services, cybersecurity, server, virus, IT, email, education
Jonathan Gibney Southridge Technology Co-owner and CEO  With more than 25 years of experience in technology and 8 more in finance, Jonathan Gibney is the co-owner and CEO of Southridge Technology, a leading IT firm and multi-year winner of the Marcum Tech Top 40 Award. He holds a certificate in Cybersecurity from MIT and, as an expert in HIPAA security, Cloud Computing and the use of technology in small and mid-sized businesses, Jonathan has been published in several regional and state dental association professional journals and is a regular conference presenter.

Brad A LaPorte High Tide Advisors

Juno Beach, Florida
Cybersecurity, Information Technology - Gartner, Defamation, Analyst, Ransomware, Endpoint, network, cyber, insurance, hygiene, penetration, testing, malware, computer, breach, managed, risk, vulnerability, crime, threat, attack, hack, forensic, digital, incident response, compliance, audit, identity, cloud, software, patent, trade secret
Brad A. LaPorte is a cybersecurity and IT consultant and currently serving as a founder of High Tide Advisors. He has over 18+ years of experience as a consultant in the cybersecurity industry spanning various industry segments. Prior to joining High Tide Advisors, he served as a top Gartner Research Analyst, including but not limited to the following specialties: security information and event management (“SIEM”), security orchestration, automation, and response (“SOAR”), Threat and Exposure Management, Vulnerability Management, Pen Testing, Cloud Security, managed security service provider (“MSSP”), managed detection and response (“MDR”), endpoint protection platforms/endpoint detection and response (“EPP/EDR”), Extended Detection & Response (“XDR”), Threat Intelligence, Digital Risk Protection, Social Media Protection, and Attack Surface Management. Mr. LaPorte was the lead author of the Gartner Market Guide for Threat Intelligence, Market Guide for Endpoint Detection and Respon...

John J. Carney, Esq. Carney Forensics

Scandia, Minnesota
Computers, Forensic Science - digital, forensic, computer, cell, phone, mobile, device, cloud, online, Internet, collect, email, document, text, message, electronic, discovery, smartphone, evidence, recover, preserve, fitness, tracker, Android, distracted, driving, personal, injury, fraud, iPhone, Apple, Google, laptop, watch
I recover digital evidence from cell phones and computers like text messages, email, documents, contacts, call logs, web browsing history, Google searches, photos, videos, and GPS track points. I produce timelines, maps, and user-friendly reports. I obtain deleted and hidden digital evidence for production and presentation in investigations and civil and criminal matters. My clients enjoy quick, convenient service and effective expert witness testimony. I assist attorneys in drafting preservation letters, requests for production of digital evidence, and provide accurate, probing language for subpoenas. Please call or email me today for your no-cost, initial consultation. Studied at Massachusetts Institute of Technology (MIT), Cambridge, MA. - Earned Bachelor of Science with GPA of 4.6 on a 5.0 scale. - Ranked in the 1st quartile from the top out of 1,007 students in my undergraduate class. Studied at Mitchell Hamline School of Law, Saint Paul, MN. - Earned Juris Doctor with Certif...

Philip Isaak, PE, P.Eng., DCDC, RCDD, SMIEEE Isaak Technologies, Inc.

Victoria, Minnesota
Information Technology, Telecommunications - Cloud Computing, Computer, Construction Claims, Contracts, Data Center, Engineering, Fiber Optic, Forensic Engineering, Internet, Intellectual Property, Life Safety, Network, Operations, Outsourcing, Project Management, Service Level Agreement, Systems Implementation, Telecom, Trade Secret
Professional Engineer, Certified Data Center Design Consultant & Registered Communications Distribution Designer with 20+ years as a design & operations consultant & training provider with a focus in the data center, telecommunications & networking industries. International expertise in 28 countries across 6 continents, encompassing data center facilities, power, cooling, networking infrastructure, fiber optic & copper network cabling, IT & Telecom systems and services, implementing enterprise, colocation & cloud service strategies. Publications & Awards ♦ANSI/BICSI 002, Data Center Design & Implementation Best Practices Standard, Author/Editor ♦ANSI/BICSI 009, Data Center Operations Standard, Chair/Author/Editor ♦Data Center Handbook, Wiley Publishing One of 50 Subject Matter Experts from around the world that authored the content, providing the fundamentals, technologies, and best practices in designing, constructing & managing mission critical, energy efficient data centers. ...

Brad A LaPorte High Tide Advisors

Rhode Island
Cybersecurity, Information Technology - Gartner, Defamation, Analyst, Ransomware, Endpoint, network, cyber, insurance, hygiene, penetration, testing, malware, computer, breach, managed, risk, vulnerability, crime, threat, attack, hack, forensic, digital, incident response, compliance, audit, identity, cloud, software, patent, trade secret
Brad A. LaPorte is a cybersecurity and IT consultant and currently serving as a founder of High Tide Advisors. He has over 18+ years of experience as a consultant in the cybersecurity industry spanning various industry segments. Prior to joining High Tide Advisors, he served as a top Gartner Research Analyst, including but not limited to the following specialties: security information and event management (“SIEM”), security orchestration, automation, and response (“SOAR”), Threat and Exposure Management, Vulnerability Management, Pen Testing, Cloud Security, managed security service provider (“MSSP”), managed detection and response (“MDR”), endpoint protection platforms/endpoint detection and response (“EPP/EDR”), Extended Detection & Response (“XDR”), Threat Intelligence, Digital Risk Protection, Social Media Protection, and Attack Surface Management. Mr. LaPorte was the lead author of the Gartner Market Guide for Threat Intelligence, Market Guide for Endpoint Detection and Respon...