Cybersecurity Expert Witnesses

The SEAK Expert Witness Directory contains a comprehensive list of cybersecurity expert witnesses who testify, consult and provide litigation support on cybersecurity and related issues. Cybersecurity expert witnesses and consultants on this page may form expert opinions, draft expert witness reports, and provide expert witness testimony at deposition and trial. The issues and subjects these cybersecurity expert witnesses testify regarding may include: Digital Forensics, Hacking, Computer Forensics, Cybersecurity, Information Security, Intellectual Property, Blockchain, Cloud Security, Computer Security, Data Breach, Esi Protocol, Internet Security, Meta Data, Mobile Forensics, and Source Code Review.

Use the search box above to further refine your search for cybersecurity expert witnesses by keyword and state. Attorneys contact the experts directly – with no middleman.

Eric Cole, CISSP Secure Anchor Consulting

Cybersecurity, Computers - Computer Forensics, Computer Investigations, Computer Security, Cyber Breach, Intellectual Property, Loss Prevention, Network Security, Security Management, Security Negligence, Trade Secrets, security standards, data privacy, cloud security, patents, apportionment, infringement, damages, meta data
Cybersecurity thought leader. Consulting clients include Fortune 500 companies, Fortune 50 Companies, international organizations, and the federal government. Extensive real-world experience. Former Chief Technology Officer for McAfee, former Chief Scientist at Lockheed Martin, and former Program Manager at the Central Intelligence Agency. Author of several textbooks and books. Was inducted into the InfoSec European Hall of Fame in 2014. Extensive expert witness experience including high-stakes expert witness assignments involving nine and ten-figure verdicts. Works on a wide range of cases, including IP litigation (including IPR/Inter Partes Review & PGR/Post Grant Review), infringement, invalidity, trade secrets, damages apportionment, criminal and civil cases including gross negligence, SEC litigation, and cybersecurity breaches. Has handled numerous cases dealing with trade secret damages apportionment. Also has served on numerous cases (across multiple diverse industr...

John Horst, CISSP®-ISSAP® Xanesti Technology Services, LLC

San Diego, California
Computers, Cybersecurity - Computer, Digital Forensics, Discovery, Databases, Class Action, Hacking, Breach, Encryption Safe Harbor, Health Care Data, Digital Medical Records, HIPAA, PII
John Horst, CISSP®-ISSAP®, is the Managing Member for Technology and Innovation for Xanesti Technology Services, LLC. John has provided expert information technology consulting across several lines of business such as pharmaceutical development, medical billing, general liability insurance, clinical laboratory systems, mortgage financing, and automotive aftermarket products. John has provided cybersecurity engineering, software development, installation and training, and troubleshooting for 11 years in support of multiple U.S. Navy programs of record, including programs operating at both unclassified and secret levels. John maintains an active national security clearance at the SECRET level. John has taught information technology courses for the University of Phoenix (San Diego and Online campuses) and Coleman University (San Diego) where John pioneered the development of computer game software development instruction, now a core part of the Coleman curriculum. John has also ta...

Ryan McKamie, CISSP, CISM Certus Cybersecurity Solutions LLC

Redwood City, California
Cybersecurity, Intellectual Property - Cybersecurity, Information Security, Reasonable Measures, Trade Secret, Intellectual Property, Cybersecurity Standards, Cybersecurity Controls, Software Security, Application Security, Cloud Security, Data Breach, Computers, Forensics
Ryan McKamie is CEO of Certus Cybersecurity, a provider of cybersecurity consulting and expert testimony. Certus Cybersecurity specializes in: Intellectual Property (IP) and Trade Secret Misappropriation – Cybersecurity analysis, consulting and expert testimony in intellectual property litigation related to misappropriation of alleged trade secrets, including analysis and opinion of cybersecurity reasonable measures for alleged trade secrets. Cyber-Related Insurance and Contract Disputes – Analysis, consulting and expert testimony in cybersecurity-related insurance and contractual litigation, including analysis and opinion on whether specific security standards were maintained. Cybersecurity Consulting and Expert Testimony – Analysis, consulting and expert testimony in business litigation concerning data privacy and cybersecurity issues. Providing technical evaluation, forensics, and strategic advice to Fortune 100 corporations and Am Law 100 law firms before, during, and after ...

Randy A Winters MatrixHCI, LLC

California
Software Engineering, Computers - Speech Recognition, Face Recognition, BIPA, ESI Protocol, Cybersecurity, Cryptocurrency, Blockchain, Software Architecture, Social Media, Code Review, Artificial Intelligence, IPR, Patent Infringement, Trade Secret, Claim Construction Analysis, ESI Protocol, Source Code Review, Biometric Identifiers
“Mr. Winters was both helpful and enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, and dedicated in providing feedback and expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - Decades of experience in the industry and holds a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) and has been an expert in many facets of Software Engineering. - In-depth knowledge of and has worked on cases involving user privacy including cases related to the Illinois Biometric Protection Act (BIPA) in relation to speech recognition, face detection & recognition, biometric identifiers & Viola-Jones. - Expert in all cases involving Speech and Facial Recognition to include Biometric Identifiers, Voiceprints and the use and storage of user privacy data. - Works with issues involving Cybersecurity, Cryptocurrency and Blockchain. - Retained expert in Patent Infringement, IPR, Trade Secrets and S...

Jonathan E Hochman Hochman Consultants

Cheshire, Connecticut
Internet, Cybersecurity - E-commerce, Ecommerce, SEO, Search Engine Optimization, PPC, Pay Per Click, Web Development, Online Advertising, Internet Marketing, Google Analytics, Google AdWords, Digital Forensics, Internet Security, Mobile Marketing, Mobile Advertising, Patent, Trademark, Reputation Management, Defamation,
Jonathan Hochman serves as consulting and testifying expert for cases related to Internet marketing, e-commerce, website development, digital forensics, search engine optimization (SEO), pay-per-click (PPC) advertising, mobile advertising, and digital advertising. Since 2007 he has provided expert witness services to plaintiffs and defendants alike for disputes involving trademarks, patents, trade secrets, copyrights, contracts, defamation and online reputation, unfair competition, conspiracy and fraud. Hochman has testified at eight trials and twenty-three depositions. He has served as a consulting expert in more than fifty cases. His clients are located in the United States, the United Kingdom, Canada, Israel and Romania. A Yale University graduate with two degrees in computer science, Hochman has worked as a sales, marketing and technology consultant for 30 years. After managing several prior businesses, he founded Hochman Consultants in 2004. Then in 2008 Hochman became cha...

John W Liccione Self

Washington, District Of Columbia
Cybersecurity, Information Technology

Richard Kaufman Technology Consultancy

Marietta, Georgia
Telecommunications, Cybersecurity - Healthcare networks, Collocation, Microwave, 2-Way Radio, Wireless, MF Authentication, Behavioral Authentication, Contract Awarding, On-line training, Call Centers, Distance Learning, Surveillance, Fusion Centers, IVR - PBX, Key & Trading Turret systems, Data Centers, FedRAMP & NIST, Back-up Power,
For 35 years I have served as an Expert Witness, Technology Architect, Independent Consultant, Project Manager and Entrepreneur in Telecommunications, Cybersecurity, and Enterprise-wide Safe Access to Hosting and Storage facilities. I have conducted many projects for Government Agencies, Fortune 10 conglomerates and some medium to small businesses. Other entities also consider me an asset to analysts, operators, and investors, when considering if a business is technically viable, adequately prepared and protected from litigation harm. Lastly, I am also a continuous student of new and evolving technologies such as Visible Light, the Internet of Things (IoT) and the usage LEO satellite communications. EXPERT WITNESS COVERED AREAS ARE: Patent Infringement, Contract Deliverables, Maintenance Support, Harassing Phone Calls, Shareholder claims, Fraudulent charges, Wrongful Contract Awards, Data Breach Protection, Privileged Access Management, Proper solicitations of RFP & RFQ, Financ...

Randy A Winters MatrixHCI, LLC

Illinois
Software Engineering, Computers - Speech Recognition, Face Recognition, BIPA, ESI Protocol, Cybersecurity, Cryptocurrency, Blockchain, Software Architecture, Social Media, Code Review, Artificial Intelligence, IPR, Patent Infringement, Trade Secret, Claim Construction Analysis, ESI Protocol, Source Code Review, Biometric Identifiers
“Mr. Winters was both helpful and enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, and dedicated in providing feedback and expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - Decades of experience in the industry and holds a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) and has been an expert in many facets of Software Engineering. - In-depth knowledge of and has worked on cases involving user privacy including cases related to the Illinois Biometric Protection Act (BIPA) in relation to speech recognition, face detection & recognition, biometric identifiers & Viola-Jones. - Expert in all cases involving Speech and Facial Recognition to include Biometric Identifiers, Voiceprints and the use and storage of user privacy data. - Works with issues involving Cybersecurity, Cryptocurrency and Blockchain. - Retained expert in Patent Infringement, IPR, Trade Secrets and S...

Michael Barr

Germantown, Maryland
Software Engineering, Cybersecurity - embedded systems, operating systems, computer software, automotive electronics, medical devices, industrial automation, computer security, software malfunction, programming languages, reverse engineering, source code review, software quality
Michael Barr is a former adjunct professor of computer engineering with more than twenty-five years of experience in the software industry, including over a decade spent developing software for embedded systems. Software he wrote has powered millions of products. Mr. Barr is the author of three books and more than seventy articles and papers about embedded software design and architecture and is internationally recognized as an expert in the field. He is also a founder of three companies, including Barr Group. In his work as a software expert witness, Mr. Barr has testified more than twenty times before judges and juries in matters ranging from patent infringement and validity to product liability to theft of copyrighted software and trade secrets. He has been qualified in U.S. and Canadian courts as an expert in computer software, electrical engineering, and satellite TV security and piracy.

Seth A Cowand Veterans Lab Services

Linthicum, Maryland
Computers, Cybersecurity - Computer Forensics, Digital Forensics, Cyber Forensics, Mobile Forensics, Electronic Detection K9, Cyber Crime, Internet Crime, ISO 17025 Accreditation, Major Crime Investigations, Digital Evidence Preservation and Handling, Digital and Multimedia Forensics

Bruce Schneier

Cambridge, Massachusetts
Cybersecurity, Intellectual Property - Cryptography, internet security, denial-of-service attacks, ransomware, social engineering, internet-of-things security, privacy, surveillance, supply chain security, 5G security, blockchain, cryptocurrencies, artificial intelligence security, adversarial machine learning, election security, spyware
Bruce Schneier is an internationally renowned security technologist, called a “security guru” by the Economist. He is the New York Times best-selling author of 14 books­including Click Here to Kill Everybody­as well as hundreds of articles, essays, and academic papers. His influential newsletter Crypto-Gram and blog Schneier on Security are read by over 250,000 people. Schneier is a fellow at the Berkman-Klein Center for Internet and Society at Harvard University; a Lecturer in Public Policy at the Harvard Kennedy School; a board member of the Electronic Frontier Foundation, AccessNow, and the Tor Project; and an advisory board member of EPIC and VerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc.

Randy A Winters MatrixHCI, LLC

Massachusetts
Software Engineering, Computers - Speech Recognition, Face Recognition, BIPA, ESI Protocol, Cybersecurity, Cryptocurrency, Blockchain, Software Architecture, Social Media, Code Review, Artificial Intelligence, IPR, Patent Infringement, Trade Secret, Claim Construction Analysis, ESI Protocol, Source Code Review, Biometric Identifiers
“Mr. Winters was both helpful and enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, and dedicated in providing feedback and expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - Decades of experience in the industry and holds a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) and has been an expert in many facets of Software Engineering. - In-depth knowledge of and has worked on cases involving user privacy including cases related to the Illinois Biometric Protection Act (BIPA) in relation to speech recognition, face detection & recognition, biometric identifiers & Viola-Jones. - Expert in all cases involving Speech and Facial Recognition to include Biometric Identifiers, Voiceprints and the use and storage of user privacy data. - Works with issues involving Cybersecurity, Cryptocurrency and Blockchain. - Retained expert in Patent Infringement, IPR, Trade Secrets and S...

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Las Vegas, Nevada
Computers, Cybersecurity - Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I am an information security and digital forensics practitioner with significant experience in eDiscovery. My most frequent practical contributions in litigation consulting are as follows: • Distinguishing useful ESI from non probative data • Overcoming adverse party’s resistance to producing ESI • Producing ESI with confidence it will be admissible • Delivering concise written reports that clarify rather than confuse • Incorporating digital evidence into the legal strategy • Advising methods that will contain costs and save time for all parties • Served as litigation consultant or expert witness in Arizona, California, Florida, Illinois, Mississippi, Nevada, New Mexico. New York, Texas, and Utah I have six (6) advanced technical certifications: • G2700, GCFA, GPCI, GSEC, CGEIT, GRISC. • These certifications cover information security, information governance, the ISO security standard, compliance, and digital forensics. Additional qualificati...

Randy A Winters MatrixHCI, LLC

New York
Software Engineering, Computers - Speech Recognition, Face Recognition, BIPA, ESI Protocol, Cybersecurity, Cryptocurrency, Blockchain, Software Architecture, Social Media, Code Review, Artificial Intelligence, IPR, Patent Infringement, Trade Secret, Claim Construction Analysis, ESI Protocol, Source Code Review, Biometric Identifiers
“Mr. Winters was both helpful and enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, and dedicated in providing feedback and expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - Decades of experience in the industry and holds a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) and has been an expert in many facets of Software Engineering. - In-depth knowledge of and has worked on cases involving user privacy including cases related to the Illinois Biometric Protection Act (BIPA) in relation to speech recognition, face detection & recognition, biometric identifiers & Viola-Jones. - Expert in all cases involving Speech and Facial Recognition to include Biometric Identifiers, Voiceprints and the use and storage of user privacy data. - Works with issues involving Cybersecurity, Cryptocurrency and Blockchain. - Retained expert in Patent Infringement, IPR, Trade Secrets and S...

C. Matthew Curtin, CISSP Interhack Corporation

Columbus, Ohio
Computers, Cybersecurity - Data Breach, Security Incident, Information Security, Computer Science, Encryption
C. Matthew Curtin, CISSP is the Founder and CEO of Interhack Corporation. Curtin is Interhack’s lead computer scientist and cybersecurity expert. Curtin has been engaged in criminal, civil, administrative, and military processes by plaintiffs, defendants, and the courts directly. His opinion has been accepted by federal and state courts throughout the country in hearings, trials, and appeals. Curtin and his team help attorneys and executives understand the meaning and context of data and how they affect business, operations, or a legal case. Curtin’s vast knowledge and experience in the field of computer science and cybersecurity enables him to convey the optimal path forward and offer an opinion within a degree of scientific certainty. Curtin’s experience in the field enables him to train his team to operate in specialized task forces organized to respond to high-stakes situations such as data breaches. Curtin's work centers on the intersection of law and technology. The U.S. Cou...

Steven Bergin Cybertek Forensics, Inc.

King of Prussia, Pennsylvania
Cybersecurity, Technology - Digital Forensics, Cell Phones, Call Data Records, Digital Security, Hacking, Intellectual Property, Password Cracking, Mobile Forensics, E-Discovery, Cyber Security, Investigation, Computer Hacking
Experienced military veteran and IT Specialist in Digital Forensics, Network Administration and Management, with a demonstrated history of working in the U.S. defense industry, Federal law enforcement, military and the financial industry. Skilled in network management, Digital Forensics, Blacklight forensic software, AccessData AD lab forensics software, Internet Evidence Finder (IEF), Griffeye modular digital investigation platform, Cellibrite UFED 4PC mobile device forensics, evidence collection and chain of custody procedures, write-blocking forensic imaging hardware tools. Strong professional currently enrolled in a M.S in Digital Forensics program at Champlain College. Holds a B.S. in Communications from Liberty University and a A.S. focused on Information Systems Technology from Community College of the United States Air Force. Certificates & Training & Navy Awards o AccessData Certified Examiner (ACE), 2016 o CompTIA Security + certification, 2009 o Cyber Systems Operation...

Shawn H. Malone, CISSP, CTPRP, CTPRA Security Diligence, LLC

Reading, Pennsylvania
Cybersecurity, Information Technology - Third Party Vendor Management, Third Party Security Assessments, Vendor Security Assessments, Cybersecurity Risk Management, Cybersecurity Programs, Cybersecurity Governance, Cybersecurity Regulatory Compliance, Information Security Programs, Information Security Policies, Data Security Compliance
Award winning information security and cyber risk expert. Thirty-five years of experience including secure communications systems, network security, data protection, security program management, policy development, compliance oversight, cybersecurity assessments and third party risk management. Delivery of cybersecurity solutions and third party risk management programs in the financial services/insurance, consulting/advisory and defense industries. Degrees in electrical engineering technology and network security. Co-developed industry leading Third Party Risk Management professional certification. Certified Information Systems Security Professional (CISSP), Certified Third Party Risk Professional (CTPRP) and Certified Third-Party Risk Assessor (CTPRA). Experienced public speaker and trainer.

Randy A Winters MatrixHCI, LLC

Saint George, Utah
Software Engineering, Computers - Speech Recognition, Face Recognition, BIPA, ESI Protocol, Cybersecurity, Cryptocurrency, Blockchain, Software Architecture, Social Media, Code Review, Artificial Intelligence, IPR, Patent Infringement, Trade Secret, Claim Construction Analysis, ESI Protocol, Source Code Review, Biometric Identifiers
“Mr. Winters was both helpful and enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, and dedicated in providing feedback and expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - Decades of experience in the industry and holds a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) and has been an expert in many facets of Software Engineering. - In-depth knowledge of and has worked on cases involving user privacy including cases related to the Illinois Biometric Protection Act (BIPA) in relation to speech recognition, face detection & recognition, biometric identifiers & Viola-Jones. - Expert in all cases involving Speech and Facial Recognition to include Biometric Identifiers, Voiceprints and the use and storage of user privacy data. - Works with issues involving Cybersecurity, Cryptocurrency and Blockchain. - Retained expert in Patent Infringement, IPR, Trade Secrets and S...

Eric Cole, CISSP Secure Anchor Consulting

Ashburn, Virginia
Cybersecurity, Computers - Computer Forensics, Computer Investigations, Computer Security, Cyber Breach, Intellectual Property, Loss Prevention, Network Security, Security Management, Security Negligence, Trade Secrets, security standards, data privacy, cloud security, patents, apportionment, infringement, damages, meta data
Cybersecurity thought leader. Consulting clients include Fortune 500 companies, Fortune 50 Companies, international organizations, and the federal government. Extensive real-world experience. Former Chief Technology Officer for McAfee, former Chief Scientist at Lockheed Martin, and former Program Manager at the Central Intelligence Agency. Author of several textbooks and books. Was inducted into the InfoSec European Hall of Fame in 2014. Extensive expert witness experience including high-stakes expert witness assignments involving nine and ten-figure verdicts. Works on a wide range of cases, including IP litigation (including IPR/Inter Partes Review & PGR/Post Grant Review), infringement, invalidity, trade secrets, damages apportionment, criminal and civil cases including gross negligence, SEC litigation, and cybersecurity breaches. Has handled numerous cases dealing with trade secret damages apportionment. Also has served on numerous cases (across multiple diverse industr...
You can also find Cybersecurity Expert Witnesses in:
Maryland, Pennsylvania, Virginia, Ohio, Connecticut, California, Georgia, District Of Columbia, Massachusetts, and Nevada