Information Security Expert Witnesses

Information security expert witnesses and consultants listed here may be able to form expert opinions, draft expert witness reports, provide expert witness testimony at deposition and/or trial as or serve as consulting (non-testifying) experts on information security. The information security expert witness listings on this page are typically from fields/areas of expertise such as: Computers and Cybersecurity.

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Arizona
Computers, Cybersecurity - Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I am an information security and digital forensics practitioner with significant experience in eDiscovery. My most frequent practical contributions in litigation consulting are as follows: • Distinguishing useful ESI from non probative data • Overcoming adverse party’s resistance to producing ESI • Producing ESI with confidence it will be admissible • Delivering concise written reports that clarify rather than confuse • Incorporating digital evidence into the legal strategy • Advising methods that will contain costs and save time for all parties • Served as litigation consultant or expert witness in Arizona, California, Florida, Illinois, Mississippi, Nevada, New Mexico. New York, Texas, and Utah I have six (6) advanced technical certifications: • G2700, GCFA, GPCI, GSEC, CGEIT, GRISC. • These certifications cover information security, information governance, the ISO security standard, compliance, and digital forensics. Additional qualificati...

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Las Vegas, Nevada
Computers, Cybersecurity - Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I am an information security and digital forensics practitioner with significant experience in eDiscovery. My most frequent practical contributions in litigation consulting are as follows: • Distinguishing useful ESI from non probative data • Overcoming adverse party’s resistance to producing ESI • Producing ESI with confidence it will be admissible • Delivering concise written reports that clarify rather than confuse • Incorporating digital evidence into the legal strategy • Advising methods that will contain costs and save time for all parties • Served as litigation consultant or expert witness in Arizona, California, Florida, Illinois, Mississippi, Nevada, New Mexico. New York, Texas, and Utah I have six (6) advanced technical certifications: • G2700, GCFA, GPCI, GSEC, CGEIT, GRISC. • These certifications cover information security, information governance, the ISO security standard, compliance, and digital forensics. Additional qualificati...

C. Matthew Curtin, CISSP Interhack Corporation

Columbus, Ohio
Computers, Cybersecurity - Data Breach, Security Incident, Information Security, Computer Science, Encryption
C. Matthew Curtin, CISSP is the Founder and CEO of Interhack Corporation. Curtin is Interhack’s lead computer scientist and cybersecurity expert. Curtin has been engaged in criminal, civil, administrative, and military processes by plaintiffs, defendants, and the courts directly. His opinion has been accepted by federal and state courts throughout the country in hearings, trials, and appeals. Curtin and his team help attorneys and executives understand the meaning and context of data and how they affect business, operations, or a legal case. Curtin’s vast knowledge and experience in the field of computer science and cybersecurity enables him to convey the optimal path forward and offer an opinion within a degree of scientific certainty. Curtin’s experience in the field enables him to train his team to operate in specialized task forces organized to respond to high-stakes situations such as data breaches. Curtin's work centers on the intersection of law and technology. The U.S. Cou...