Cybersecurity Expert Witnesses

The SEAK Expert Witness Directory contains a comprehensive list of cybersecurity expert witnesses who testify, consult and provide litigation support on cybersecurity and related issues. Cybersecurity expert witnesses and consultants on this page may form expert opinions, draft expert witness reports, and provide expert witness testimony at deposition and trial. The issues and subjects these cybersecurity expert witnesses testify regarding may include: Digital Forensics, Cybersecurity, Computer Forensics, Meta Data, Data Recovery, Email, Hacking, Intellectual Property, Internet, Mobile Forensics, Patents, Ransomware, Software, Trade Secrets, and Android.

Use the search box above to further refine your search for cybersecurity expert witnesses by keyword and state. Attorneys contact the experts directly – with no middleman.

Eric Cole, Ph.D. Secure Anchor Consulting

Cybersecurity, Computers - Computer Forensics, Computer Investigations, Computer Security, Cyber Breach, Intellectual Property, Loss Prevention, Network Security, Security Management, Security Negligence, Trade Secrets, Security Standards, Data Privacy, Cloud Security, Patents, Apportionment, Infringement, Damages, Meta Data
Dr. Eric Cole, Ph.D. is a computer and cybersecurity expert who has built a solid reputation in the information technology industry over the last three decades. His educational experience includes a master’s degree in computer science from the New York Institute of Technology, and a doctorate in network security from Pace University. Dr. Cole’s expert involvement in the cybersecurity industry is demonstrated by being appointed as the commissioner on cybersecurity for the 44th president, holding a position as a senior fellow at SANS, and being elected to the Purdue University Executive Advisory Board. His extensive real-world experience includes being the former Chief Technology Officer for McAfee, former Chief Scientist at Lockheed Martin, and former Program Manager at the Central Intelligence Agency. Currently, he is the CEO and Founder of Secure Anchor Consulting. His consulting clients include Fortune 500 companies, Fortune 50 companies, international organizations, and the fe...

Jeff M Martin Evidence Solutions, Inc.

Tucson, Arizona
Technology, Telecommunications - EMR/EHR Forensics, Call Data Records, Cell Phone Forensics, Cell Tower Triangulation, Computer Forensics, Cybersecurity, Data Communications, Data Retrieval & Analysis, Digital Media, Email, GPS Systems, iCloud Data, Information Technology, Internet, Software, Malware Analysis
Jeff started his Information Technology career as a small business IT consultant where he was quickly identified as someone with a knack for explaining technical information to non-technical audiences. Jeff transitioned to the Financial Industry where he spent ten years as the Director of Information Technology & Security. He was identified as a future leader and selected to attend the Credit Union National Association’s (CUNA) Management School at the University of Wisconsin-Madison, resulting in Jeff earning the Certified Credit Union Executive (CCUE) certification. Jeff then applied his passion for technology solving crimes for the Michigan State Police as a Digital Forensics Analyst for the past 5 years. In addition to obtaining his Master's in Cyber Security, Jeff is an adjunct instructor at Northern Michigan University, teaching Cybercrime and Computer Hacking Forensic Investigations. Jeff was instrumental in creating an interdisciplinary minor in Cybercrime & Digital Forens...

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Arizona
Computers, Cybersecurity - Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I am an information security and digital forensics practitioner with significant experience in eDiscovery. My most frequent practical contributions in litigation consulting are as follows: • Distinguishing useful ESI from non probative data • Overcoming adverse party’s resistance to producing ESI • Producing ESI with confidence it will be admissible • Delivering concise written reports that clarify rather than confuse • Incorporating digital evidence into the legal strategy • Advising methods that will contain costs and save time for all parties • Served as litigation consultant or expert witness in Arizona, California, Florida, Illinois, Mississippi, Nevada, New Mexico. New York, Texas, and Utah I have six (6) advanced technical certifications: • G2700, GCFA, GPCI, GSEC, CGEIT, GRISC. • These certifications cover information security, information governance, the ISO security standard, compliance, and digital forensics. Additional qualificati...

Jack Bicer Septium

Irvine, California
Cybersecurity, Intellectual Property - Authentication, 2FA, 3FA, Login, Security, Internet, Patents, Litigation, Software, Programming, Fraud, iPhone, Android, Cybersecurity, Account Takeover, Passwords, Mobile, Payments, Smartphones, 2-Factor
Inventor of Mobile Push Login and QR Login. Expert Witness in Login, Authentication (2-Factor/3-Factor/Multi-Factor), Account Hacking, Account Takeovers, Fraudulent Transactions, Cryptocurrency Theft, Forensic Analysis, and Cybersecurity. Software Patent Litigation, Claim Mapping. Assisting attorneys in litigation. I am the inventor of: • Mobile Push Login/Authentication (US Patent 9756042) 2FA/3FA/MFA. The new authentication standard for secure logins – used by Chase, Capital One, Apple, Amazon, Google, Facebook, Microsoft, Okta, OneLogin, Cisco/Duo, CA, LastPass, Oracle, Symantec, and others. Used by millions of users. • QR Login/Authentication (US Patent 8677116) 2FA/3FA/MFA.Used by Citibank, Amazon, Apple, Facebook, Google, Microsoft, PayPal, Twitter, Visa, and others. • Mobile Browser 1-Click Login/Authentication ( (US Patent 9015813) 2FA/3FA/MFA. • Automatic Software Updates and Uninstall that run on every computer and every smartphone today, used by trillions of people....

John Horst, CISSP®-ISSAP® Xanesti Technology Services, LLC

San Diego, California
Computers, Cybersecurity - Computer, Digital Forensics, Discovery, Databases, Class Action, Hacking, Breach, Encryption Safe Harbor, Health Care Data, Digital Medical Records, HIPAA, PII
John Horst, CISSP®-ISSAP®, is the Managing Member for Technology and Innovation for Xanesti Technology Services, LLC. John has provided expert information technology consulting across several lines of business such as pharmaceutical development, medical billing, general liability insurance, clinical laboratory systems, mortgage financing, and automotive aftermarket products. John has provided cybersecurity engineering, software development, installation and training, and troubleshooting for 11 years in support of multiple U.S. Navy programs of record, including programs operating at both unclassified and secret levels. John maintains an active national security clearance at the SECRET level. John has taught information technology courses for the University of Phoenix (San Diego and Online campuses) and Coleman University (San Diego) where John pioneered the development of computer game software development instruction, now a core part of the Coleman curriculum. John has also ta...

Jonathan Karchmer, GCFA, GCFE, GCIH iDiscovery Solutions

Costa Mesa, California
Computers, Cybersecurity - Digital Forensics, Data Preservation, Data Analysis
Jonathan is the Manager of Forensics Consulting at iDS and is responsible for the oversight of operational efficiency and project delivery within Forensics – focusing on research, development, and automation of analysis tasks. He has 20 years of experience in managing projects dealing with computer forensic examinations, data breaches and network incidents, ESI collection, processing, and hosting, as well as document review and production. Jonathan has advised counsel in engagements regarding intellectual property and trade secret theft, contractual disputes, electronic document production, FTC second requests, due diligence investigations, embezzlement, harassment, illegal surveillance, network attack/incident handling, and network security auditing. He has also offered sworn testimony in state and federal courts. EDUCATION BS in Management Information Systems, University of Arizona Certifications: GCFA (GIAC Certified Forensic Analyst), GCFE (GIAC Certified Forensic Examiner...

James Vaughn iDiscovery Solutions (iDS)

Costa Mesa, California
Computers, Information Technology - digital forensics, electronic discovery, digital evidence, electronic evidence, computer forensics, cell phone, mobile device, data collection, social media, cloud computing, IT forensics, information governance, cyber security, fake evidence, testimony, forensic investigation, cybersecurity.
Mr. James D. Vaughn, a Managing Director of iDiscovery Solutions (iDS), is a certified, court-recognized expert who has given live testimony in well over 80 cases involving topics such as evidence preservation, documentation of events, and digital forensic methodologies and procedures. Mr. Vaughn has received and maintained several digital forensic certifications over the last 18 years. Mr. Vaughn has trained hundreds of law enforcement officers, attorneys, and other examiners on computer forensics and high technology related issues involving best practices and methodologies. He has 16 years’ law enforcement experience, has codeveloped digital forensic courses for the California Department of Justice, and has been involved in high stakes cases throughout his career. Mr. Vaughn has extensive experience working on litigation and consulting matters in digital forensics, e-Discovery, and other high technology issues. His experience covers Windows, MACs, and mobile device platforms. He s...

Randy A Winters MatrixHCI, LLC

California
Software Engineering, Computers - Speech &, Face Recognition, AI, BIPA, ESI Protocol, Cybersecurity, Cryptocurrency / Blockchain, Software Architecture, Social Media Forensics, Code Review, Artificial Intelligence, IPR, Patent Infringement, Trade Secret, PTAB, Claim Analysis, ESI Protocol, Source Code Review, Biometric Identifiers
“Mr. Winters was both helpful and enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, and dedicated in providing feedback and expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - Decades of experience in the industry and holds a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) and has been an expert in many facets of Software Engineering. - In-depth knowledge of and has worked on cases involving user privacy including cases related to the Illinois Biometric Protection Act (BIPA) in relation to speech recognition, face detection & recognition, biometric identifiers & Viola-Jones. - Expert in all cases involving Speech / Facial Recognition including Biometric Identifiers, Voiceprints and the use & storage of user privacy data. - Cybersecurity, Cryptocurrency and Blockchain. - Social Media tracing and and Forensics. - Retained expert in Patent Infringement, IPR, PTAB, Trad...

Jonathan E Hochman Hochman Consultants

Cheshire, Connecticut
Internet, Cybersecurity - E-commerce, Ecommerce, SEO, Search Engine Optimization, PPC, Pay Per Click, Web Development, Online Advertising, Internet Marketing, Google Analytics, Google AdWords, Digital Forensics, Internet Security, Mobile Marketing, Mobile Advertising, Patent, Trademark, Reputation Management, Defamation,
Jonathan Hochman serves as consulting and testifying expert for cases related to Internet marketing, e-commerce, website development, digital forensics, search engine optimization (SEO), pay-per-click (PPC) advertising, mobile advertising, and digital advertising. Since 2007 he has provided expert witness services to plaintiffs and defendants alike for disputes involving trademarks, patents, trade secrets, copyrights, contracts, defamation and online reputation, unfair competition, conspiracy and fraud. Hochman has testified at eight trials and twenty-three depositions. He has served as a consulting expert in more than fifty cases. His clients are located in the United States, the United Kingdom, Canada, Israel and Romania. A Yale University graduate with two degrees in computer science, Hochman has worked as a sales, marketing and technology consultant for 30 years. After managing several prior businesses, he founded Hochman Consultants in 2004. Then in 2008 Hochman became cha...

Julian Ackert iDiscovery Solutions

Washington, DC, District Of Columbia
Computers, Cybersecurity - Computer Forensics, Structured Data, eDiscovery, Technology Assisted Review, Trade Secrets

Mark D Gianturco, PhD iDS

Washington, District Of Columbia
Software Engineering, Cybersecurity - Software Development Life Cycle, SDLC, Software Plagiarism, Code, Inspection, Trade Secrets, Patents, Trademarks, Technical issues, CTO, CIO, CSO, source code comparison, software inspection.

Dan Regard iDiscovery Solutions

Washington, District Of Columbia
Technology, Cybersecurity - Technology, digital forensics, compliance, cybersecurity, ediscovery, disclosure, information governance, privacy, structured data, analytics, testimony, data identification, information system, data subject access requests, enterprise applications, email archives, software, hardware, investigation
Mr. Regard is an electronic discovery and computer science consultant with 30 years of experience in consulting to legal and corporate entities. A programmer and an attorney by training, Mr. Regard has conducted system investigations, created data collections, and managed discovery on over a thousand matters. He is responsible for the development and implementation of case and matter strategies that leverage technology in litigation and investigations. Mr. Regard has both national and international experience advising on such issues as electronic discovery, computer forensics, structured data, and information management. He is a frequent speaker, teacher, and publisher on issues of electronic discovery. Prior to founding iDiscovery Solutions, Inc. in 2008, Mr. Regard was the national director of e-Discovery for LECG. He was also the national director of Electronic Evidence & Consulting for FTI Consulting and was an electronic discovery and data analytics team leader in Analytical D...

Brad A LaPorte High Tide Advisors

Juno Beach, Florida
Cybersecurity, Information Technology - Gartner, Analyst, Ransomware, Endpoint, network, cyber, insurance, hygiene, penetration, testing, malware, computer, breach, managed, risk, vulnerability, crime, threat, attack, hack, forensic, digital, incident, response, compliance, audit, identity, cloud, software, patent, trade secret, MFA
Brad A. LaPorte is a cybersecurity and IT consultant and currently serving as a founder of High Tide Advisors. He has over 18+ years of experience as a consultant in the cybersecurity industry spanning various industry segments. Prior to joining High Tide Advisors, he served as a top Gartner Research Analyst, including but not limited to the following specialties: (i) security information and event management (“SIEM”), (ii) security orchestration, automation, and response (“SOAR”), (iii) Threat and Exposure Management, (iv) Vulnerability Management, (v) Pen Testing, (vi) Cloud Security, (v) managed security service provider (“MSSP”), (vi) managed detection and response (“MDR”), (vii) endpoint protection platforms/endpoint detection and response (“EPP/EDR”), (viii) Extended Detection & Response (“XDR”), (ix) Threat Intelligence, (x) Digital Risk Protection, (xi) Social Media Protection, and (xii) Attack Surface Management. Mr. LaPorte was the lead author of the Gartner Market Guide ...

Randy A Winters MatrixHCI, LLC

Illinois
Software Engineering, Computers - Speech &, Face Recognition, AI, BIPA, ESI Protocol, Cybersecurity, Cryptocurrency / Blockchain, Software Architecture, Social Media Forensics, Code Review, Artificial Intelligence, IPR, Patent Infringement, Trade Secret, PTAB, Claim Analysis, ESI Protocol, Source Code Review, Biometric Identifiers
“Mr. Winters was both helpful and enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, and dedicated in providing feedback and expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - Decades of experience in the industry and holds a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) and has been an expert in many facets of Software Engineering. - In-depth knowledge of and has worked on cases involving user privacy including cases related to the Illinois Biometric Protection Act (BIPA) in relation to speech recognition, face detection & recognition, biometric identifiers & Viola-Jones. - Expert in all cases involving Speech / Facial Recognition including Biometric Identifiers, Voiceprints and the use & storage of user privacy data. - Cybersecurity, Cryptocurrency and Blockchain. - Social Media tracing and and Forensics. - Retained expert in Patent Infringement, IPR, PTAB, Trad...

Michael Barr

Germantown, Maryland
Software Engineering, Cybersecurity - embedded systems, operating systems, computer software, automotive electronics, medical devices, industrial automation, computer security, software malfunction, programming languages, reverse engineering, source code review, software quality
Michael Barr is a former adjunct professor of computer engineering with more than twenty-five years of experience in the software industry, including over a decade spent developing software for embedded systems. Software he wrote has powered millions of products. Mr. Barr is the author of three books and more than seventy articles and papers about embedded software design and architecture and is internationally recognized as an expert in the field. He is also a founder of three companies, including Barr Group. In his work as a software expert witness, Mr. Barr has testified more than twenty times before judges and juries in matters ranging from patent infringement and validity to product liability to theft of copyrighted software and trade secrets. He has been qualified in U.S. and Canadian courts as an expert in computer software, electrical engineering, and satellite TV security and piracy.

Bruce Schneier

Cambridge, Massachusetts
Cybersecurity, Information Technology - Cryptography, internet security, denial-of-service attacks, ransomware, social engineering, internet-of-things security, privacy, surveillance, supply chain security, 5G security, blockchain, cryptocurrencies, artificial intelligence security, adversarial machine learning, election security, spyware
Bruce Schneier is an internationally renowned security technologist, called a “security guru” by the Economist. He is the New York Times best-selling author of 14 books -- ­including "A Hacker's Mind" -- ­as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and blog "Schneier on Security" are read by over 250,000 people. Schneier is a fellow at the Berkman-Klein Center for Internet and Society at Harvard University, a Lecturer in Public Policy at the Harvard Kennedy School, a board member of the Electronic Frontier Foundation and AccessNow, and an advisory board member of EPIC and VerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc.

Randy A Winters MatrixHCI, LLC

Massachusetts
Software Engineering, Computers - Speech &, Face Recognition, AI, BIPA, ESI Protocol, Cybersecurity, Cryptocurrency / Blockchain, Software Architecture, Social Media Forensics, Code Review, Artificial Intelligence, IPR, Patent Infringement, Trade Secret, PTAB, Claim Analysis, ESI Protocol, Source Code Review, Biometric Identifiers
“Mr. Winters was both helpful and enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, and dedicated in providing feedback and expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - Decades of experience in the industry and holds a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) and has been an expert in many facets of Software Engineering. - In-depth knowledge of and has worked on cases involving user privacy including cases related to the Illinois Biometric Protection Act (BIPA) in relation to speech recognition, face detection & recognition, biometric identifiers & Viola-Jones. - Expert in all cases involving Speech / Facial Recognition including Biometric Identifiers, Voiceprints and the use & storage of user privacy data. - Cybersecurity, Cryptocurrency and Blockchain. - Social Media tracing and and Forensics. - Retained expert in Patent Infringement, IPR, PTAB, Trad...

Stacy R Eldridge, CFCE, GCFE, GSEC, GCCC, LPD Silicon Prairie Cyber Services

Lincoln, Nebraska
Computers, Cybersecurity - Computer Forensics,Digital Forensics,Mobile Forensics,Cell Phone,iPhone,Android,Email,Meta Data,Data Recovery,Deleted Files,Video Analysis,Image Analysis,RAM,Data Loss Prevention, Insider Threat,Cybersecurity,Cybercrime,FBI,Forensic Analysis,Computer Investigation,Criminal Defense,Civil Litigaiton
Stacy Eldridge is a former Senior Forensic Examiner with the FBI, and began her security career 20 years ago in the FBI. Today, she is a leading force behind Silicon Prairie Cyber Services, bringing two decades of digital forensics and cybersecurity expertise to the company. Stacy's services include digital forensics, litigation support, expert witness testimony, cybersecurity consulting and teaching . As a respected educator, she is an Adjunct Professor teaching digital forensics and cybersecurity classes for OSU and Bellevue University while also coaching for IACIS. Stacy's passion goes beyond just finding evidence - it's about understanding it and helping others comprehend its significance. With a keen eye for the truth, Stacy's unwavering dedication to her craft makes her a trusted authority in digital forensics and cybersecurity. Whether it's a complete digital forensics examination, a second opinion, or a report review, Stacy offers a no-nonsense approach to giving you the fa...

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Las Vegas, Nevada
Computers, Cybersecurity - Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I am an information security and digital forensics practitioner with significant experience in eDiscovery. My most frequent practical contributions in litigation consulting are as follows: • Distinguishing useful ESI from non probative data • Overcoming adverse party’s resistance to producing ESI • Producing ESI with confidence it will be admissible • Delivering concise written reports that clarify rather than confuse • Incorporating digital evidence into the legal strategy • Advising methods that will contain costs and save time for all parties • Served as litigation consultant or expert witness in Arizona, California, Florida, Illinois, Mississippi, Nevada, New Mexico. New York, Texas, and Utah I have six (6) advanced technical certifications: • G2700, GCFA, GPCI, GSEC, CGEIT, GRISC. • These certifications cover information security, information governance, the ISO security standard, compliance, and digital forensics. Additional qualificati...

Randy A Winters MatrixHCI, LLC

New York
Software Engineering, Computers - Speech &, Face Recognition, AI, BIPA, ESI Protocol, Cybersecurity, Cryptocurrency / Blockchain, Software Architecture, Social Media Forensics, Code Review, Artificial Intelligence, IPR, Patent Infringement, Trade Secret, PTAB, Claim Analysis, ESI Protocol, Source Code Review, Biometric Identifiers
“Mr. Winters was both helpful and enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, and dedicated in providing feedback and expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - Decades of experience in the industry and holds a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) and has been an expert in many facets of Software Engineering. - In-depth knowledge of and has worked on cases involving user privacy including cases related to the Illinois Biometric Protection Act (BIPA) in relation to speech recognition, face detection & recognition, biometric identifiers & Viola-Jones. - Expert in all cases involving Speech / Facial Recognition including Biometric Identifiers, Voiceprints and the use & storage of user privacy data. - Cybersecurity, Cryptocurrency and Blockchain. - Social Media tracing and and Forensics. - Retained expert in Patent Infringement, IPR, PTAB, Trad...

C. Matthew Curtin, CISSP Interhack Corporation

Columbus, Ohio
Computers, Cybersecurity - Data Breach, Security Incident, Information Security, Computer Science, Encryption
C. Matthew Curtin, CISSP is the Founder and CEO of Interhack Corporation. Curtin is Interhack’s lead computer scientist and cybersecurity expert. Curtin has been engaged in criminal, civil, administrative, and military processes by plaintiffs, defendants, and the courts directly. His opinion has been accepted by federal and state courts throughout the country in hearings, trials, and appeals. Curtin and his team help attorneys and executives understand the meaning and context of data and how they affect business, operations, or a legal case. Curtin’s vast knowledge and experience in the field of computer science and cybersecurity enables him to convey the optimal path forward and offer an opinion within a degree of scientific certainty. Curtin’s experience in the field enables him to train his team to operate in specialized task forces organized to respond to high-stakes situations such as data breaches. Curtin's work centers on the intersection of law and technology. The U.S. Cou...

Michael Yasumoto, CFCE, CAWFE, CCE, GCFE, GCFA Deadbolt Forensics

Beaverton, Oregon
Computers, Cybersecurity - Trade Secret Theft, Intellectual Property, Computer Forensics, cell phone forensics, Email Forensics, Vehicle Electronics, Digital Forensics, Smartphones, mobile forensics, Meta Data, Data Recovery, Forensic Science, Internet, Technology, Information Technology
Michael Yasumoto has worked on hundreds of cases and has over 1,000 hours of specialized forensic training. He has taught computer and mobile phone forensic classes to both US and foreign law enforcement as well as the military. His civil practice is primarily focused on two case types. 1. Employees accused of copying or retaining confidential data when they exit the company. In some cases, a company device is returned by the employee after it has been erased. Michael's expertise covers preserving and examining the associated data to determine what happened. He has worked for both the plaintiff and defense on these cases. 2. Traffic accidents where a driver could have been interacting with their cell phone at the time of the collision. Michael's expertise covers downloading and examining the phone's data as well as associated Call Detail Records (CDRs) from the wireless carrier. If applicable, he can download the data from the infotainment system in the car and provide a r...

Steven Bergin Cybertek Forensics, Inc.

King of Prussia, Pennsylvania
Cybersecurity, Technology - Digital Forensics, Cell Phones, Call Data Records, Digital Security, Hacking, Intellectual Property, Password Cracking, Mobile Forensics, E-Discovery, Cyber Security, Investigation, Computer Hacking
Experienced military veteran and IT Specialist in Digital Forensics, Network Administration and Management, with a demonstrated history of working in the U.S. defense industry, Federal law enforcement, military and the financial industry. Skilled in network management, Digital Forensics, Blacklight forensic software, AccessData AD lab forensics software, Internet Evidence Finder (IEF), Griffeye modular digital investigation platform, Cellibrite UFED 4PC mobile device forensics, evidence collection and chain of custody procedures, write-blocking forensic imaging hardware tools. Strong professional currently enrolled in a M.S in Digital Forensics program at Champlain College. Holds a B.S. in Communications from Liberty University and a A.S. focused on Information Systems Technology from Community College of the United States Air Force. Certificates & Training & Navy Awards o AccessData Certified Examiner (ACE), 2016 o CompTIA Security + certification, 2009 o Cyber Systems Operation...

Shawn H. Malone, CISSP, CTPRP, CTPRA Security Diligence, LLC

Reading, Pennsylvania
Cybersecurity, Information Technology - Third Party Vendor Management, Third Party Security Assessments, Vendor Security Assessments, Cybersecurity Risk Management, Cybersecurity Programs, Cybersecurity Governance, Cybersecurity Regulatory Compliance, Information Security Programs, Information Security Policies, Data Security Compliance
Award winning information security and cyber risk expert. Thirty-five years of experience including secure communications systems, network security, data protection, security program management, policy development, compliance oversight, cybersecurity assessments and third party risk management. Delivery of cybersecurity solutions and third party risk management programs in the financial services/insurance, consulting/advisory and defense industries. Degrees in electrical engineering technology and network security. Co-developed industry leading Third Party Risk Management professional certification. Certified Information Systems Security Professional (CISSP), Certified Third Party Risk Professional (CTPRP) and Certified Third-Party Risk Assessor (CTPRA). Experienced public speaker and trainer.

Paul Sibenik

Pittsburgh, Pennsylvania
Cryptocurrency, Securities & Investments - blockchain, bitcoin, blockchain forensics, hacks, theft, fraud, pig butchering, embezzlement, ransomware, ethereum, crypto, SIM Swaps, embezzlement, compliance, cybersecurity, cryptocurrency tracking, cryptocurrency tracing, staking, NFTs, ponzi schemes, smart contracts
Paul Sibenik is a blockchain forensics and cryptocurrency tracing expert. He frequently conducts investigations in a range of niches, including cryptocurrency hacks, exploits, vulnerabilities, thefts, fraud, SIM Hijacking, fraud, ransomware, embezzlement, and pig butchering scams. Tracking cryptocurrency such as Bitcoin and Ethereum often plays a critical role in his investigations. Additionally, Paul has been appointed as an expert in many civil disputes, including bankruptcy divorce matters, having worked on more than 100 cases involving cryptocurrency in divorce alone. He has also frequently been asked to open on matters related to Anti-money laundering (AML), compliance, cybersecurity, NFTs, and staking.

Brad A LaPorte High Tide Advisors

Rhode Island
Cybersecurity, Information Technology - Gartner, Analyst, Ransomware, Endpoint, network, cyber, insurance, hygiene, penetration, testing, malware, computer, breach, managed, risk, vulnerability, crime, threat, attack, hack, forensic, digital, incident, response, compliance, audit, identity, cloud, software, patent, trade secret, MFA
Brad A. LaPorte is a cybersecurity and IT consultant and currently serving as a founder of High Tide Advisors. He has over 18+ years of experience as a consultant in the cybersecurity industry spanning various industry segments. Prior to joining High Tide Advisors, he served as a top Gartner Research Analyst, including but not limited to the following specialties: (i) security information and event management (“SIEM”), (ii) security orchestration, automation, and response (“SOAR”), (iii) Threat and Exposure Management, (iv) Vulnerability Management, (v) Pen Testing, (vi) Cloud Security, (v) managed security service provider (“MSSP”), (vi) managed detection and response (“MDR”), (vii) endpoint protection platforms/endpoint detection and response (“EPP/EDR”), (viii) Extended Detection & Response (“XDR”), (ix) Threat Intelligence, (x) Digital Risk Protection, (xi) Social Media Protection, and (xii) Attack Surface Management. Mr. LaPorte was the lead author of the Gartner Market Guide ...

Randy A Winters MatrixHCI, LLC

Saint George, Utah
Software Engineering, Computers - Speech &, Face Recognition, AI, BIPA, ESI Protocol, Cybersecurity, Cryptocurrency / Blockchain, Software Architecture, Social Media Forensics, Code Review, Artificial Intelligence, IPR, Patent Infringement, Trade Secret, PTAB, Claim Analysis, ESI Protocol, Source Code Review, Biometric Identifiers
“Mr. Winters was both helpful and enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, and dedicated in providing feedback and expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - Decades of experience in the industry and holds a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) and has been an expert in many facets of Software Engineering. - In-depth knowledge of and has worked on cases involving user privacy including cases related to the Illinois Biometric Protection Act (BIPA) in relation to speech recognition, face detection & recognition, biometric identifiers & Viola-Jones. - Expert in all cases involving Speech / Facial Recognition including Biometric Identifiers, Voiceprints and the use & storage of user privacy data. - Cybersecurity, Cryptocurrency and Blockchain. - Social Media tracing and and Forensics. - Retained expert in Patent Infringement, IPR, PTAB, Trad...

Eric Cole, Ph.D. Secure Anchor Consulting

Ashburn, Virginia
Cybersecurity, Computers - Computer Forensics, Computer Investigations, Computer Security, Cyber Breach, Intellectual Property, Loss Prevention, Network Security, Security Management, Security Negligence, Trade Secrets, Security Standards, Data Privacy, Cloud Security, Patents, Apportionment, Infringement, Damages, Meta Data
Dr. Eric Cole, Ph.D. is a computer and cybersecurity expert who has built a solid reputation in the information technology industry over the last three decades. His educational experience includes a master’s degree in computer science from the New York Institute of Technology, and a doctorate in network security from Pace University. Dr. Cole’s expert involvement in the cybersecurity industry is demonstrated by being appointed as the commissioner on cybersecurity for the 44th president, holding a position as a senior fellow at SANS, and being elected to the Purdue University Executive Advisory Board. His extensive real-world experience includes being the former Chief Technology Officer for McAfee, former Chief Scientist at Lockheed Martin, and former Program Manager at the Central Intelligence Agency. Currently, he is the CEO and Founder of Secure Anchor Consulting. His consulting clients include Fortune 500 companies, Fortune 50 companies, international organizations, and the fe...
You can also find Cybersecurity Expert Witnesses in:
District Of Columbia, Maryland, Pennsylvania, California, Virginia, Ohio, Nebraska, Connecticut, Florida, Massachusetts, Nevada, and Oregon