Cybersecurity Expert Witness Listings

Welcome to our Cybersecurity expert directory. Browse the profiles below to find the right expert witness in Cybersecurity for your case. Our SEAK Expert Witness Database is always free to search.

SEAK, Inc. is The Expert Witness Training Company. We have trained thousands of expert witnesses, through our seminars, on-site corporate training, assisting retaining counsel to prepare their witnesses, and one-on-one training for individual experts. For additional information please visit testifyingtraining.com

Unable to find the right expert? For personalized assistance in locating an expert witness, please click here.

Dr. Eric Cole, CISSP Secure Anchor Consulting

Cybersecurity, Computers - Computer Forensics, Computer Investigations, Computer Security, Cyber Breach, Information Technology, Intellectual Property, Loss Prevention, Network Security, Security, Security Management, Security Negligence, Technology,
A computer and cybersecurity expert witness with over 30 years of hands-on experience, Dr. Cole is an expert witness in information technology with a focus on cybersecurity. Dr. Cole works on a wide range of cases, including IP litigation (IPR, PGR, infringement, invalidity, damages), criminal and civil cases including gross negligence, SEC litigation, and cybersecurity breaches. He has taught at the SANS Institute, Georgetown University, NY Institute of Technology, and has been a guest lecturer at Purdue, MIT, Harvard, and Berkeley. He has his certification in CISSP and created the GIAC certification programs and exams. He served as a member of the Commission on Cybersecurity for the 44th President and is a member of several advisory boards such as the Purdue University Executive Advisory Board. While working for the Central Intelligence Agency (CIA), Dr. Cole received six exceptional performance awards, and has received the Cyber Wingman award from the U.S. Air Force. Dr. Cole...
Click for Full Listing and Contact Info

Steven G Burgess Burgess Consulting / Forensics

San Luis Obispo, California
Computers, Cryptocurrency - Mobile, Digital, Cell Phone, Email, Cybersecurity, Hacking, Document, Employee Fraud, Child Pornography, Criminal Defense
Expert in most computer hardware, peripherals, operating systems, and applications. Expert witness testimony in California, Idaho, Louisiana, New York, Texas; in State, Federal, Municipal Courts, and Labor Board, as well as General Court Martial Military Courts.. Specialist in computer and digital forensics - data discovery. ediscovery World-renowned as leading expert in recovery of data from disk drives and other electronic media. Has personally performed recovery and forensics analysis on more than 15,000 drives and other media. Also generally knowledgeable in the emerging field of Molecular Nanotechnology Registered Apple Developer
Click for Full Listing and Contact Info

John Horst, CISSP®-ISSAP® Xanesti Technology Services, LLC

San Diego, California
Computers, Cybersecurity - Computer, Digital Forensics, Discovery, Databases, Class Action, Hacking, Breach, Encryption Safe Harbor, Health Care Data, Digital Medical Records, HIPAA, PII
John Horst, CISSP®-ISSAP®, is the Managing Member for Technology and Innovation for Xanesti Technology Services, LLC. John has provided expert information technology consulting across several lines of business such as pharmaceutical development, medical billing, general liability insurance, clinical laboratory systems, mortgage financing, and automotive aftermarket products. John has provided cybersecurity engineering, software development, installation and training, and troubleshooting for 11 years in support of multiple U.S. Navy programs of record, including programs operating at both unclassified and secret levels. John maintains an active national security clearance at the SECRET level. John has taught information technology courses for the University of Phoenix (San Diego and Online campuses) and Coleman University (San Diego) where John pioneered the development of computer game software development instruction, now a core part of the Coleman curriculum. John has also ta...
Click for Full Listing and Contact Info

Ryan McKamie, CISSP, CISM Certus Cybersecurity Solutions LLC

Redwood City, California
Cybersecurity, Intellectual Property - Cybersecurity, Information Security, Reasonable Measures, Trade Secret, Intellectual Property, Cybersecurity Standards, Cybersecurity Controls, Software Security, Application Security, Cloud Security, Data Breach, Computers, Forensics
Ryan McKamie is CEO of Certus Cybersecurity, a provider of cybersecurity consulting and expert testimony. Certus Cybersecurity specializes in: Intellectual Property (IP) and Trade Secret Misappropriation – Cybersecurity analysis, consulting and expert testimony in intellectual property litigation related to misappropriation of alleged trade secrets, including analysis and opinion of cybersecurity reasonable measures for alleged trade secrets. Cyber-Related Insurance and Contract Disputes – Analysis, consulting and expert testimony in cybersecurity-related insurance and contractual litigation, including analysis and opinion on whether specific security standards were maintained. Cybersecurity Consulting and Expert Testimony – Analysis, consulting and expert testimony in business litigation concerning data privacy and cybersecurity issues. Providing technical evaluation, forensics, and strategic advice to Fortune 100 corporations and Am Law 100 law firms before, during, and after ...
Click for Full Listing and Contact Info

Robert Kelso Forensic Pursuit

Denver, Colorado
Computers, Cybersecurity - Computer forensics, mobile device forensics, cell phone forensics, audio forensics, video forensics, computer imaging, deleted file recovery, data collections, denver, new york, dallas, los angeles, nashville, albuquerque, licensed, certified
Robert, CEO, co-founded Forensic Pursuit in 2006. He has over 25 years experience in computer forensics, engineering and software technology. A graduate of the University of Colorado at Boulder, Robert holds Bachelor’s and Master’s degrees in aerospace engineering and astrodynamics, respectively (yes, he actually is a rocket scientist!). Robert has testified in both District and Federal court as an expert witness in computer forensics dozens of times and has been appointed a “special master” by the court on multiple occasions. Robert is a current adjunct instructor at University of Denver teaching computer forensics at the master’s level. Robert has published numerous articles including “Moving to Secure The Image – Valuable Data May Be Overwritten Forever” published in Law Week August 2007. Robert holds multiple computer forensics certifications including EnCE, CHFI, ACE, and AME. These certifications emphasize the use of forensics tools, procedures, and analytical techniques ne...
Click for Full Listing and Contact Info

Timothy Smit

Erie, Colorado
Cybersecurity, Information Technology - Privacy, HIPAA, GDPR, CCPA, Information Risk Management, Data Protection, PCI, Data Breach, Vendor Risk Management, Cyber Insurance, Privacy Regulatory, Data Retention and Destruction
Fellow of Information Privacy (FIP) Certified Data Privacy Solutions Engineer (CDPSE) Certified Information Privacy Manager (CIPM) Certified Information Privacy Professional/Europe (CIPP/E) Certified Information Privacy Professional/United States (CIPP/US) Cyber Insurance & Risk Manager (CyRM) Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Certified in Risk and Information Systems Control (CRISC) Healthcare Information Security and Privacy Professional (HCISPP) Certified Healthcare Privacy and Security Professional (CHPS) Certified HIPAA Professional (CHP) State of Colorado Resident Producer License, Casualty, Property, Current 07/2022
Click for Full Listing and Contact Info

Jonathan E Hochman Hochman Consultants

Cheshire, Connecticut
Internet, Cybersecurity - E-commerce, Ecommerce, SEO, Search Engine Optimization, PPC, Pay Per Click, Web Development, Online Advertising, Internet Marketing, Google Analytics, Google AdWords, Digital Forensics, Internet Security, Mobile Marketing, Mobile Advertising, Patent, Trademark, Reputation Management, Defamation,
Jonathan Hochman serves as consulting and testifying expert for cases related to Internet marketing, e-commerce, website development, digital forensics, search engine optimization (SEO), pay-per-click (PPC) advertising, mobile advertising, and digital advertising. Since 2007 he has provided expert witness services to plaintiffs and defendants alike for disputes involving trademarks, patents, trade secrets, copyrights, contracts, defamation and online reputation, unfair competition, conspiracy and fraud. Hochman has testified at eight trials and twenty-three depositions. He has served as a consulting expert in more than fifty cases. His clients are located in the United States, the United Kingdom, Canada, Israel and Romania. A Yale University graduate with two degrees in computer science, Hochman has worked as a sales, marketing and technology consultant for 30 years. After managing several prior businesses, he founded Hochman Consultants in 2004. Then in 2008 Hochman became cha...
Click for Full Listing and Contact Info

Barlow Keener, JD, CIPP Summit Ridge Group, LLC

District Of Columbia
Telecommunications, Internet - mobile, wireless, privacy, cybersecurity, data center, spectrum, cable, network, FCC, FTC, Wi-Fi, satellite
Mr. Keener has over 20 years of telecommunications, spectrum, Internet, and privacy law experience. He has earned an exam certification as CIPP/US privacy law certification, or “Certified Information Privacy Professional”, from the IAPP (International Association of Privacy Professionals). He is Co-Chair of the FCBA (Federal Communications Bar Association) Wireless Committee and a Member, Forum on Communications Law, American Bar Association. Barlow has provided counsel and in-depth regulatory and financial analysis for clients involved with investments in innovative FCC related spectrum issues, satellite spectrum matters, terrestrial radio technologies, small cell technologies, long-haul fiber networks, and data centers. He has actively handled state regulatory proceedings as an attorney and provided expert witness services and support for state regulators in telecommunications administrative matters involving FCC classifications of central offices, service quality failures, and 91...
Click for Full Listing and Contact Info

Christopher Bradley Storm Force Cyber

Tampa, Florida
Cybersecurity, Technology - Data breaches, Insider Threats, Supply Chain Attacks, Government IT Compliance, Cybercrime, COMSEC, eDiscovery, Vulnerability Assessment
A business and technically focused cybersecurity professional with 20 years of experiencing addressing various technical and information management solutions. Strong background with multiple information technology disciplines that focus on Government and Military compliance, standards and procedures.
Click for Full Listing and Contact Info

Lee M Neubecker Enigma Forensics, Inc.

Chicago, Illinois
Computers, Cybersecurity - Electronic Medical Records (EMR), Telephone Consumer Protection Act (TCPA), Defend Trade Secrets Act, Trade Secret Misappropriation, Data Breach, Database Forensics, Computer Fraud & Abuse Act, Electronic Document Email Authenticity Analysis, Cyber Security Investigation, eDiscovery, ESI Protocols
Lee Neubecker is the President and CEO of EnigmaForensics.com, a Chicago based Computer Forensics and Cyber Investigation consultancy. Neubecker assists fortune 500 clients, government agencies and private organizations with cyber related investigations involving theft of electronic data, fraud, counterfeiting, and online identity unmasking. Neubecker also is the founder of IT Security Blog leeneubecker.com. Before starting Enigma Forensics, Neubecker had served as CISO for HaystackID and following the acquisition of Envision Discovery and Inspired Review by HaystackID, Neubecker was promoted to serve as CIO over the combined entities. Neubecker was named one of the top Global Computer Forensics and Cyber security experts by Who’s who Legal in 2019 and many years prior to that. Neubecker has a track record of uncovering Cyber Data Breaches and has performed investigations on the State Governmental and Federal Government Agency levels. Neubecker identified and reported the hack of ...
Click for Full Listing and Contact Info

Michael Barr

Germantown, Maryland
Software Engineering, Cybersecurity - embedded systems, operating systems, computer software, automotive electronics, medical devices, industrial automation, computer security, software malfunction, programming languages, reverse engineering, source code review, software quality
Michael Barr is a former adjunct professor of computer engineering with more than twenty-five years of experience in the software industry, including over a decade spent developing software for embedded systems. Software he wrote has powered millions of products. Mr. Barr is the author of three books and more than seventy articles and papers about embedded software design and architecture and is internationally recognized as an expert in the field. He is also a founder of three companies, including Barr Group. In his work as a software expert witness, Mr. Barr has testified more than twenty times before judges and juries in matters ranging from patent infringement and validity to product liability to theft of copyrighted software and trade secrets. He has been qualified in U.S. and Canadian courts as an expert in computer software, electrical engineering, and satellite TV security and piracy.
Click for Full Listing and Contact Info

Barlow Keener, JD, CIPP Summit Ridge Group, LLC

Boston, Massachusetts
Telecommunications, Internet - mobile, wireless, privacy, cybersecurity, data center, spectrum, cable, network, FCC, FTC, Wi-Fi, satellite
Mr. Keener has over 20 years of telecommunications, spectrum, Internet, and privacy law experience. He has earned an exam certification as CIPP/US privacy law certification, or “Certified Information Privacy Professional”, from the IAPP (International Association of Privacy Professionals). He is Co-Chair of the FCBA (Federal Communications Bar Association) Wireless Committee and a Member, Forum on Communications Law, American Bar Association. Barlow has provided counsel and in-depth regulatory and financial analysis for clients involved with investments in innovative FCC related spectrum issues, satellite spectrum matters, terrestrial radio technologies, small cell technologies, long-haul fiber networks, and data centers. He has actively handled state regulatory proceedings as an attorney and provided expert witness services and support for state regulators in telecommunications administrative matters involving FCC classifications of central offices, service quality failures, and 91...
Click for Full Listing and Contact Info

William A. Mason Wamason.com

Las Vegas, Nevada
Computers, Cybersecurity - Operating Systems, Device Drivers, File Systems, Computer Storage, Distributed Systems, Cryptography, Encryption, Blockchain, Computer Security, Distributed Consensus, Educational Technology, Human Computer Interaction, Computer Networks, Machine Learning, Artificial Intelligence
My expertise is in computer systems and computer technologies including consensus protocols as used by databases, distributed file systems, key-value stores, cryptocurrency, etc. Much of my work has been in data storage: databases, file systems, operating systems, device drivers, etc. I have extensive experience teaching complex technical topics, which allows me to explain concepts in approachable terms. I have authored peer-reviewed literature, technical books, and informational articles within my specialized field, and have been awarded 11 patents pertaining to my work. My litigation support experience is in patent litigation, most recently KOM v. Network Appliance (2018).
Click for Full Listing and Contact Info

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Las Vegas, Nevada
Computers, Cybersecurity - Computers and Mobile Devices, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Ecommerce, Vehicle Electronics, Electronic Banking, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I am an information security and digital forensics practitioner. I have more than two decades of experience in the field. I have significant experience with banking attacks, cloud data, ESI, electronic health records, email security, meta data, mobile devices, ransomeware, smartphones, wire fraud, and unauthorized access. I have earned six (6) advanced technical certifications, G2700, GCFA, GPCI, GSEC, CGEIT, GRISC. These certifications cover information security, information governance, the ISO security standard, compliance, and digital forensics. I am the co-inventor of technical advancements in email and information security (United States Patents granted). My methodology is science-based, with results that are reproducible. I pride myself on recovering useful digital evidence, in admissible form, and delivering concise written reports that clarify rather than confuse. I have been an advisor on data privacy and security laws to Nevada State Legislators, and to the Nevada Attor...
Click for Full Listing and Contact Info

William A. Mason Wamason.com

New York
Computers, Cybersecurity - Operating Systems, Device Drivers, File Systems, Computer Storage, Distributed Systems, Cryptography, Encryption, Blockchain, Computer Security, Distributed Consensus, Educational Technology, Human Computer Interaction, Computer Networks, Machine Learning, Artificial Intelligence
My expertise is in computer systems and computer technologies including consensus protocols as used by databases, distributed file systems, key-value stores, cryptocurrency, etc. Much of my work has been in data storage: databases, file systems, operating systems, device drivers, etc. I have extensive experience teaching complex technical topics, which allows me to explain concepts in approachable terms. I have authored peer-reviewed literature, technical books, and informational articles within my specialized field, and have been awarded 11 patents pertaining to my work. My litigation support experience is in patent litigation, most recently KOM v. Network Appliance (2018).
Click for Full Listing and Contact Info

C. Matthew Curtin, CISSP Interhack Corporation

Columbus, Ohio
Computers, Cybersecurity - Data Breach, Security Incident, Information Security, Computer Science, Encryption
C. Matthew Curtin, CISSP is the Founder and CEO of Interhack Corporation. Curtin is Interhack’s lead computer scientist and cybersecurity expert. Curtin has been engaged in criminal, civil, administrative, and military processes by plaintiffs, defendants, and the courts directly. His opinion has been accepted by federal and state courts throughout the country in hearings, trials, and appeals. Curtin and his team help attorneys and executives understand the meaning and context of data and how they affect business, operations, or a legal case. Curtin’s vast knowledge and experience in the field of computer science and cybersecurity enables him to convey the optimal path forward and offer an opinion within a degree of scientific certainty. Curtin’s experience in the field enables him to train his team to operate in specialized task forces organized to respond to high-stakes situations such as data breaches. Curtin's work centers on the intersection of law and technology. The U.S. Cou...
Click for Full Listing and Contact Info

Sauvik Das, PhD

Pittsburgh, Pennsylvania
Cybersecurity, Human Factors - Privacy, Privacy by Design, Consumer Safety, User Experience Research, iOS, Android, Artificial Intelligence, Machine Learning, Ethics, Social Network Analysis, Social Media, Data Science, Cryptocurrency, Blockchain, Distributed Ledger, Human-Computer Interaction
I am a professor of Interactive Computing at Georgia Tech's College of Computing (a top 10 department in computer science). Prior to that, I got my Ph.D. in Human-Computer Interaction at Carnegie Mellon University (from the #1 ranked computer science department in the country). I have previously worked as a researcher and technologist at Facebook, Google and Microsoft, as well as at a small technology start-up company. I direct the GT SPUD (Security, Privacy, Usability and Design) Lab. Our work, at the intersection of HCI, data science and cybersecurity, is oriented around answering two questions: (i) How can we design systems that encourage better cybersecurity and privacy behaviors? (ii) How can we design systems that shift power away from surveillance institutions and back into the hands of end-users? I've given talks on my research both USENIX Enigma and RSA — both premier venues for cybersecurity professionals — in addition to many top universities: e.g., Stanford, Princeton...
Click for Full Listing and Contact Info

Shawn H. Malone, CISSP, CIPP/US, CTPRP, CTPRA Security Diligence, LLC

Reading, Pennsylvania
Cybersecurity, Information Technology - Third Party Vendor Management, Third Party Security Assessments, Vendor Security Assessments, Cybersecurity Risk Management, Cybersecurity Programs, Cybersecurity Governance, Cybersecurity Regulatory Compliance, Information Security Programs, Information Security Policies, Data Security Compliance
Award winning information security and cyber risk expert. Thirty-five years of experience including secure communications systems, network security, data protection, security program management, policy development, compliance oversight, cybersecurity assessments and third party risk management. Delivery of cybersecurity solutions and third party risk management programs in the financial services/insurance, consulting/advisory and defense industries. Degrees in electrical engineering technology and network security. Co-developed industry leading Third Party Risk Management professional certification. Certified Information Systems Security Professional (CISSP), Certified Information Privacy Professional/United States (CIPP/US), Certified Third Party Risk Professional (CTPRP) and Certified Third-Party Risk Assessor (CTPRA). Experienced public speaker and trainer.
Click for Full Listing and Contact Info

Richard Sanders CipherBlade

Pittsburgh, Pennsylvania
Cryptocurrency, Cybersecurity - Blockchain, Blockchain Forensics, Bitcoin, Ethereum, Digital Forensics, Device Forensics, Ponzi Scheme, ICO, cybercrime, SIM Swapping, audit, proof of reserves
CipherBlade is a team of experienced and credentialed experts and investigators for all matters involving cryptocurrency, bitcoin and blockchain technology. We are available to testify, audit, track, investigate and advise on any technical aspects involving cryptocurrency. We conduct full-scale investigations, conduct forensic analysis or accounting for cryptocurrency assets and act as expert witnesses when requested. We're frequently requested for support with investigating and generating reports on: - Suspect ICOs, in which we discover mismanagement, misappropriation of funds, embezzlement, securities violations, and other items that may result in compulsory refund of investor assets - Investment fraud cases, such as OTC deals gone south, ponzi/MLM schemes, or the variety of exit-scam, impersonation scam, or other types of fraud resulting in cryptocurrency asset loss - SIM-swapping and all other cryptocurrency cybercrime/theft cases - Audits of exchanges, bank accounts, & inve...
Click for Full Listing and Contact Info

Dr. Eric Cole, CISSP Secure Anchor Consulting

Ashburn, Virginia
Cybersecurity, Computers - Computer Forensics, Computer Investigations, Computer Security, Cyber Breach, Information Technology, Intellectual Property, Loss Prevention, Network Security, Security, Security Management, Security Negligence, Technology,
A computer and cybersecurity expert witness with over 30 years of hands-on experience, Dr. Cole is an expert witness in information technology with a focus on cybersecurity. Dr. Cole works on a wide range of cases, including IP litigation (IPR, PGR, infringement, invalidity, damages), criminal and civil cases including gross negligence, SEC litigation, and cybersecurity breaches. He has taught at the SANS Institute, Georgetown University, NY Institute of Technology, and has been a guest lecturer at Purdue, MIT, Harvard, and Berkeley. He has his certification in CISSP and created the GIAC certification programs and exams. He served as a member of the Commission on Cybersecurity for the 44th President and is a member of several advisory boards such as the Purdue University Executive Advisory Board. While working for the Central Intelligence Agency (CIA), Dr. Cole received six exceptional performance awards, and has received the Cyber Wingman award from the U.S. Air Force. Dr. Cole...
Click for Full Listing and Contact Info

William A. Mason Wamason.com

Washington
Computers, Cybersecurity - Operating Systems, Device Drivers, File Systems, Computer Storage, Distributed Systems, Cryptography, Encryption, Blockchain, Computer Security, Distributed Consensus, Educational Technology, Human Computer Interaction, Computer Networks, Machine Learning, Artificial Intelligence
My expertise is in computer systems and computer technologies including consensus protocols as used by databases, distributed file systems, key-value stores, cryptocurrency, etc. Much of my work has been in data storage: databases, file systems, operating systems, device drivers, etc. I have extensive experience teaching complex technical topics, which allows me to explain concepts in approachable terms. I have authored peer-reviewed literature, technical books, and informational articles within my specialized field, and have been awarded 11 patents pertaining to my work. My litigation support experience is in patent litigation, most recently KOM v. Network Appliance (2018).
Click for Full Listing and Contact Info

Steve Simpson, CCE, CISSP, CPTC, CSFA, PMP S2 Forensics

Gig Harbor, Washington
Computers, Cybersecurity - Digital Forensics, Mobile Forensics, Computer Forensics, Network Forensics, Email Forensics, Call Data Record analysis, Cell Tower Data analysis, Social Media Forensic analysis, Computer Crime Investigations, Cyber Investigations, Payment Card Industry Compliance, Digital Analyst
Steve Simpson, CCE, CISSP, CPTC, CSFA, PMP has over 35 years of experience in digital forensics, computer engineering, and data networking. His expertise includes criminal defense Litigation Support and Expert Witness testimony in cases involving cyberstalking, sexual harassment, No Contact Order violation, Domestic Violence, possession and distribution of child pornography, rape, kidnapping, unlawful imprisonment, and Net Nanny charges including attempted rape of a child and communication with a child for immoral purposes. Steve has extensive experience and training with computer and mobile device data extraction for cases involving social media apps including Facebook, Instagram, Snapchat, email, voice mail, text messaging, call data record analysis, and cell tower data analysis. Steve holds multiple computer forensics and management certifications including Certified Computer Examiner (CCE), Certified Information System Security Professional (CISSP), Certified Penetration Test...
Click for Full Listing and Contact Info
You can also find Cybersecurity Expert Witnesses in:
Maryland, Florida, Virginia, Ohio, Pennsylvania, Connecticut, California, Colorado, Nevada, Illinois, and Washington