Cybersecurity Expert Witnesses

The SEAK Expert Witness Directory contains a comprehensive list of cybersecurity expert witnesses who testify, consult and provide litigation support on cybersecurity and related issues. Cybersecurity expert witnesses and consultants on this page may form expert opinions, draft expert witness reports, and provide expert witness testimony at deposition and trial. The issues and subjects these cybersecurity expert witnesses testify regarding may include: Cybersecurity, Digital Forensics, Computer Forensics, Email, Meta Data, Ransomware, E Discovery, Intellectual Property, Compliance, Cyber Security, Data Recovery, Electronic Evidence, Hacking, Information Security, and Internet.

Use the search box above to further refine your search for cybersecurity expert witnesses by keyword and state. Attorneys contact the experts directly – with no middleman.

Eric Cole

Secure Anchor Consulting

Cybersecurity, Computers - Computer Forensics, Computer Investigations, Computer Security, Cyber Breach, Intellectual Property, Loss Prevention, Network Security, Security Management, Security Negligence, Trade Secrets, Security Standards, Data Privacy, Cloud Security, Patents, Apportionment, Infringement, Damages, Meta Data
Dr. Eric Cole is a computer and cybersecurity expert who has built a solid reputation in the information technology industry over the last three decades. His educational experience includes a master’s degree in computer science from the New York Institute of Technology, and a doctorate in Professional Studies from Pace University. Dr. Cole’s expert involvement in the cybersecurity industry is demonstrated by being appointed as the commissioner on cybersecurity for the 44th president, holding a position as a senior fellow at SANS, and being elected to the Purdue University Executive Advisory Board. His extensive real-world experience includes being the former Chief Technology Officer for McAfee, former Chief Scientist at Lockheed Martin, and former Program Manager at the Central Intelligence Agency. Currently, he is the CEO and Founder of Secure Anchor Consulting. His consulting clients include Fortune 500 companies, Fortune 50 companies, international organizations, and the feder...

Scott Greene

Digital Evidence Expert

Evidence Solutions, Inc.

Tucson, Arizona
Technology, Telecommunications - Call Detail Records, Text Message retrieval, app data, GPS, Triangulation, Digital Forensics, ELDs, Black Box Data, Electronic Medical Records, electronic evidence, Cybersecurity, Document Authentication, data retrieval, meta data, Audio/video/imagery analysis, computers, eDiscovery,data fabrication
For over 42 years, Scott Greene has been helping judges, attorneys, and organizations understand data. He collects, analyzes, and explains complex electronic and digital evidence in legal matters. His extensive and diverse experience allows him to be an expert in many facets of digital technology, including Cell Phone Forensics, Black Boxes / Event Data Recorders (EDRs), Triangulation, Electronic Logging Devices (ELDs), Computers, Electronic Medical Records (EMR) Forensics eDiscovery, Mobile Device Passcode Breaking, and much more. Scott founded Evidence Solutions, Inc., a premier forensics and expert witness firm, and Great Scott Enterprises, Inc., which provided superior computer consulting services. Today, Scott is an Affiliated Professional Member of the American Bar Association and heads the Digital Forensics Division of Evidence Solutions, Inc., working as an Expert Witness and Digital Forensics professional. He has served as an Expert Witness and Special Master in both Feder...

Jeff M Martin

Digital Forensics Expert

Evidence Solutions, Inc.

Tucson, Arizona
Technology, Telecommunications - Cell Phone Forensics, Call Detail Records, EMR/EHR Forensics, Cell Tower Triangulation, GPS Triangulation, Computer Forensics, Cybersecurity, Data Communications, Data Retrieval & Analysis, Digital Media, Email, GPS Systems, iCloud Data, Information Technology, Internet, Software, Malware Analyst
Jeff Martin is a Digital Forensics Expert specializing in Cell Phone Forensics, Black Box/EDR Forensics, Cybersecurity, EMR/EHR Forensics, Audio/Video/Imagery Forensics and more. Jeff has conducted hundreds of digital forensics investigations on cases involving the acquisition, preservation, and analysis of data in legal disputes in both state and federal courts. Jeff is a certified digital forensics examiner with over 15 years of experience. He initially made a mark as a small business IT consultant, lauded for his knack for simplifying technical information to non-technical audiences. Following a successful decade as the Director of Information Technology & Security in the Financial Industry, he earned the Certified Credit Union Executive (CCUE) certification after attending the Credit Union National Association’s (CUNA) Management School. Jeff then applied his passion for technology to solving crimes as a Digital Forensics Analyst for the Michigan State Police. Today, Jeff is...

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Arizona
Computers, Cybersecurity - Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I work with attorneys to interpret digital evidence, and tell a powerful story. My technical expertise saves time and money: pre-discovery communications, forensically-sound data preservation, and reports that pack a punch. Expert analysis for electronic medical records, business espionage, employee misconduct, vehicle computer systems, video surveillance, cybercrime, divorce, probate and more (ask about your case -- initial consultation is free). I have more than two decades in the field. Court appearances in multiple states. A live person always answers the phone. My most frequent practical contributions in litigation consulting are as follows: • Distinguishing useful ESI from non probative data • Overcoming adverse party’s resistance to producing ESI • Producing ESI with confidence it will be admissible • Delivering concise written reports that clarify rather than confuse • Incorporating digital evidence into the legal strategy • Advising methods that ...

Joseph Greenfield, PhD

Maryman & Associates

Los Angeles, California
Computers, Information Technology - Digital Forensics, Computer Forensics, Electronic Evidence, Electronic Discovery, eDiscovery, Email Analysis, Mobile, Computers, Cybersecurity, Cyber Breach Investigations, Cyber Investigations, Incident Response, DFIR
Dr. Joseph Greenfield is the Vice President and Chief Forensic Examiner at Maryman & Associates and an award-winning educator. He is a renowned computer forensics expert with over 15 years of investigative experience, including cyber breach investigations, employee misconduct, and email recovery and analysis. He has worked over 1000 cases and analyzed over 2000 pieces of digital evidence. His is known for deep forensic analysis while being able to explain technical details to non-technical decision-makers. He has provided expert witness testimony in state, federal, and international legal matters. Dr. Greenfield is also an Associate Professor of Information Technology Practice at the Viterbi School of Engineering at the University of Southern California, where he authored the undergraduate programs in both cybersecurity and digital forensics. In 2014, the Ponemon Institute ranked USC as 6th in the nation for “Best Schools for Cybersecurity” and the highest ranked on the West Coas...

John Horst, CISSP®-ISSAP®

Xanesti Technology Services, LLC

San Diego, California
Computers, Cybersecurity - Cybersecurity; Forensics, HIPAA; Privacy Act, NIST, Discovery, Breach, AI
John Horst, CISSP®-ISSAP®, is the owner and Chief Technology Officer for Xanesti Technology Services, LLC. John has provided expert information technology consulting across several lines of business such as pharmaceutical development, medical billing, general liability insurance, clinical laboratory systems, mortgage financing, and automotive aftermarket products. John has provided cybersecurity engineering, software development, installation and training, and troubleshooting for 11 years in support of multiple U.S. Navy programs of record, including programs operating at both unclassified and secret levels. John maintains an active national security clearance at the TOP SECRET level. John has taught information technology courses for the University of Phoenix (San Diego and Online campuses) and Coleman University (San Diego) where John pioneered the development of computer game software development instruction, now a core part of the Coleman curriculum. John has also taught ph...

Jonathan Karchmer, GCFA, GCFE, GCIH

iDiscovery Solutions

Costa Mesa, California
Computers, Cybersecurity - Digital Forensics, Data Preservation, Data Analysis
Jonathan is the Manager of Forensics Consulting at iDS and is responsible for the oversight of operational efficiency and project delivery within Forensics – focusing on research, development, and automation of analysis tasks. He has 20 years of experience in managing projects dealing with computer forensic examinations, data breaches and network incidents, ESI collection, processing, and hosting, as well as document review and production. Jonathan has advised counsel in engagements regarding intellectual property and trade secret theft, contractual disputes, electronic document production, FTC second requests, due diligence investigations, embezzlement, harassment, illegal surveillance, network attack/incident handling, and network security auditing. He has also offered sworn testimony in state and federal courts. EDUCATION BS in Management Information Systems, University of Arizona Certifications: GCFA (GIAC Certified Forensic Analyst), GCFE (GIAC Certified Forensic Examiner...

Alex Kulikov, M.S., PMP, CFCS

Construction Claims and Fin Crimes Expert Witness

Expert Construction Advisors LLC

Dublin, California
Construction, Fraud - Financial crimes, Forensic analysis, Forensic examination, Construction defects, Delay damages, Standard of care, Unfair trade practices, Conflict resolution, Damages calculation, Luxury residential, Money laundering, Cybersecurity, Construction management, Schedule analysis, Compliance, Risk
Alex Kulikov, M.S. (Master of Science), PMP (Project Management Professional), CFCS (Certified Financial Crimes Specialist) is a construction, financial crimes and claims consulting professional with over 25 years of corporate and private consulting and contractor experience in the residential and hospitality construction industry. Mr. Kulikov's expertise as a Financial Crimes Specialist includes Money Laundering, Fraud Detection and Prevention, Corruption and Bribery, Tax Evasion and Enforcement, Asset Recovery, Financial Crimes Investigations, Financial Documents Analysis, Cybersecurity, International Agreements and Standards, Ethical Responsibilities and Compliance Programs. Mr. Kulikov has certifications in Construction Management, Construction Finance, Construction Scheduling, Finance and Insurance, Forensic Accounting and Fraud Examination, Negotiation Skills, PMP Project Management, Project Risk Management, and Financial Crimes Specialist certification. Mr. Kulikov has t...

Brad A LaPorte

Top Cybersecurity & Information Technology Expert

High Tide Advisors

California
Cybersecurity, Information Technology - Fraud, Defamation, Analyst, Ransomware, Endpoint, network, cyber, insurance, penetration, testing, malware, computer, breach, managed, risk, vulnerability, crime, threat, attack, hack, forensic, digital, incident response, compliance, identity, cloud, software, patent, trade secret, Wire, AI, Intel
Brad A. LaPorte is a cybersecurity and Information Technology consultant and currently serving as a founder of High Tide Advisors. He has over 20+ years of experience as a consultant in the cybersecurity industry spanning various industry segments. Pior Cases: Pior cases have involved high profile companies and persons such as Bungie the Video Gaming Division of Sony, SentinelOne, BlackBerry, Red Canary, and the Miami-Dade Mayor Candidate and Influencer Alexander Otaola. Topics have included intellectual property theft, wire fraud, real estate fraud, lack of adherence to cybersecurity best practices and regulations, conflicts of interest, malicious tampering and reverse engineering of software and hardware, interference with business relationships, defamation, and matters involving impersonation with malicious intent. Career History and Expertise: Prior to forming High Tide Advisors, he served as a top Gartner Research Analyst, including but not limited to the following spec...

James Vaughn

iDiscovery Solutions (iDS)

Costa Mesa, California
Computers, Information Technology - digital forensics, electronic discovery, digital evidence, electronic evidence, computer forensics, cell phone, mobile device, data collection, social media, cloud computing, IT forensics, information governance, cyber security, fake evidence, testimony, forensic investigation, cybersecurity.
Mr. James D. Vaughn, a Managing Director of iDiscovery Solutions (iDS), is a certified, court-recognized expert who has given live testimony in well over 80 cases involving topics such as evidence preservation, documentation of events, and digital forensic methodologies and procedures. Mr. Vaughn has received and maintained several digital forensic certifications over the last 18 years. Mr. Vaughn has trained hundreds of law enforcement officers, attorneys, and other examiners on computer forensics and high technology related issues involving best practices and methodologies. He has 16 years’ law enforcement experience, has codeveloped digital forensic courses for the California Department of Justice, and has been involved in high stakes cases throughout his career. Mr. Vaughn has extensive experience working on litigation and consulting matters in digital forensics, e-Discovery, and other high technology issues. His experience covers Windows, MACs, and mobile device platforms. He s...

Randy A Winters

Software Engineering, AI, Privacy, Forensics, IPR

MatrixHCI, LLC

California
Software Engineering, Computers - Cybersecurity, Software Architecture, Artificial Intelligence, Cryptocurrency / Blockchain, Speech & Face Recognition, ESI Protocol, Social Media Forensics, Biometric Identifiers, Code Review, Patent Infringement ,Trade Secret, IPR, PTAB, Claim Analysis, Forensic Data Extraction, BIPA
“Mr. Winters was both helpful & enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, & dedicated in providing feedback & expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - 30+ years experience in the industry with a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) - Expert in all facets of Software Engineering - AI Expert in knowledge base systems, chatGPT & other Large Language Models - Experienced AI prompt engineering - Holds AI patents in the US & abroad - Expert retained for numerous cases involving user privacy to include cases involving the Illinois Biometric Information Protection Act (BIPA) - Expert knowledge in speech / facial recognition, detection & other biometric identifiers - Experience challenging Viola-Jones facial detection argument - Expert in all privacy cases involving Speech / Facial Recognition, Biometric Identifiers, Voiceprints & the use & stora...

Jonathan Gibney

Expert Witness in Cybersecurity, IT & Technology

Southridge Technology

Brookfield, Connecticut
Cybersecurity, Computers - business technology, ransomware, firewall, network, end-user, business continuity, hacking, security, computer, disaster recovery, managed services, cybersecurity, server, virus, IT, email, education
Jonathan Gibney Southridge Technology Co-owner and CEO  With more than 25 years of experience in technology and 8 more in finance, Jonathan Gibney is the co-owner and CEO of Southridge Technology, a leading IT firm and multi-year winner of the Marcum Tech Top 40 Award. He holds a certificate in Cybersecurity from MIT and, as an expert in HIPAA security, Cloud Computing and the use of technology in small and mid-sized businesses, Jonathan has been published in several regional and state dental association professional journals and is a regular conference presenter.

Jonathan E Hochman

Hochman Consultants

Cheshire, Connecticut
Internet, Cybersecurity - E-commerce, Ecommerce, SEO, Search Engine Optimization, PPC, Pay Per Click Advertising, Internet Marketing, Web Development, Mobile Apps, Google Analytics, Google Ads, Digital Forensics, Internet Security, Privacy, Wiretapping, Patent, Trademark, Reputation Management, Online Defamation
Jonathan Hochman serves as consulting and testifying expert for cases related to Internet marketing, e-commerce, website development, digital forensics, search engine optimization (SEO), pay-per-click (PPC) advertising, privacy, securities fraud in the technology industry, and disputes related to technology startups. Since 2007 he has provided expert witness services to plaintiffs and defendants alike for disputes involving trademarks, patents, trade secrets, copyrights, contracts, defamation and online reputation, unfair competition, conspiracy and fraud. Hochman has testified at eighteen trials and fifty-six depositions. He has served as a consulting expert in many more cases. His clients have been located in the United States, the United Kingdom, Canada, Australia, Israel, Ukraine, and Romania. A Yale University graduate with two degrees in computer science, Hochman has worked as a sales, marketing and technology consultant for 34 years. After managing several prior business...

Julian Ackert

iDiscovery Solutions

Washington, DC, District Of Columbia
Computers, Cybersecurity - Computer Forensics, Structured Data, eDiscovery, Technology Assisted Review, Trade Secrets

Mark D Gianturco, PhD

iDS

Washington, District Of Columbia
Software Engineering, Cybersecurity - Software Development Life Cycle, SDLC, Software Plagiarism, Code, Inspection, Trade Secrets, Patents, Trademarks, Technical issues, CTO, CIO, CSO, source code comparison, software inspection.

Dan Regard

iDiscovery Solutions

Washington, District Of Columbia
Technology, Cybersecurity - Technology, digital forensics, compliance, cybersecurity, ediscovery, disclosure, information governance, privacy, structured data, analytics, testimony, data identification, information system, data subject access requests, enterprise applications, email archives, software, hardware, investigation
Mr. Regard is an electronic discovery and computer science consultant with 30 years of experience in consulting to legal and corporate entities. A programmer and an attorney by training, Mr. Regard has conducted system investigations, created data collections, and managed discovery on over a thousand matters. He is responsible for the development and implementation of case and matter strategies that leverage technology in litigation and investigations. Mr. Regard has both national and international experience advising on such issues as electronic discovery, computer forensics, structured data, and information management. He is a frequent speaker, teacher, and publisher on issues of electronic discovery. Prior to founding iDiscovery Solutions, Inc. in 2008, Mr. Regard was the national director of e-Discovery for LECG. He was also the national director of Electronic Evidence & Consulting for FTI Consulting and was an electronic discovery and data analytics team leader in Analytical D...

Brad A LaPorte

Top Cybersecurity & Information Technology Expert

High Tide Advisors

Juno Beach, Florida
Cybersecurity, Information Technology - Fraud, Defamation, Analyst, Ransomware, Endpoint, network, cyber, insurance, penetration, testing, malware, computer, breach, managed, risk, vulnerability, crime, threat, attack, hack, forensic, digital, incident response, compliance, identity, cloud, software, patent, trade secret, Wire, AI, Intel
Brad A. LaPorte is a cybersecurity and Information Technology consultant and currently serving as a founder of High Tide Advisors. He has over 20+ years of experience as a consultant in the cybersecurity industry spanning various industry segments. Pior Cases: Pior cases have involved high profile companies and persons such as Bungie the Video Gaming Division of Sony, SentinelOne, BlackBerry, Red Canary, and the Miami-Dade Mayor Candidate and Influencer Alexander Otaola. Topics have included intellectual property theft, wire fraud, real estate fraud, lack of adherence to cybersecurity best practices and regulations, conflicts of interest, malicious tampering and reverse engineering of software and hardware, interference with business relationships, defamation, and matters involving impersonation with malicious intent. Career History and Expertise: Prior to forming High Tide Advisors, he served as a top Gartner Research Analyst, including but not limited to the following spec...

Gregory Bailey

Springfield, Illinois
Cybersecurity, Information Technology - Cyber, Cyber Security, Information Security, Infosec, IT, Incident Response, Hack, Red Team, Penetration Testing, Pentest, Ransomware, Threat Actor, Hacker
Principal Instructor at the SANS Institute with the following certifications: Offensive Security Certified Professional (OSCP), GIAC Penetration Tester (GPEN), GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), GIAC Certified Forensic Analyst (GCFA), among others.

Randy A Winters

Software Engineering, AI, Privacy, Forensics, IPR

MatrixHCI, LLC

Illinois
Software Engineering, Computers - Cybersecurity, Software Architecture, Artificial Intelligence, Cryptocurrency / Blockchain, Speech & Face Recognition, ESI Protocol, Social Media Forensics, Biometric Identifiers, Code Review, Patent Infringement ,Trade Secret, IPR, PTAB, Claim Analysis, Forensic Data Extraction, BIPA
“Mr. Winters was both helpful & enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, & dedicated in providing feedback & expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - 30+ years experience in the industry with a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) - Expert in all facets of Software Engineering - AI Expert in knowledge base systems, chatGPT & other Large Language Models - Experienced AI prompt engineering - Holds AI patents in the US & abroad - Expert retained for numerous cases involving user privacy to include cases involving the Illinois Biometric Information Protection Act (BIPA) - Expert knowledge in speech / facial recognition, detection & other biometric identifiers - Experience challenging Viola-Jones facial detection argument - Expert in all privacy cases involving Speech / Facial Recognition, Biometric Identifiers, Voiceprints & the use & stora...

Bruce Schneier

Cambridge, Massachusetts
Cybersecurity, Information Technology - Cryptography, internet security, denial-of-service attacks, ransomware, internet-of-things security, privacy, surveillance, supply chain security, 5G security, blockchain, cryptocurrencies, artificial intelligence, LLMs, adversarial machine learning, election security, spyware, stalkerware
Bruce Schneier is an internationally renowned security technologist, called a “security guru” by the Economist. He is the New York Times best-selling author of 14 books -- ­including "A Hacker's Mind" -- ­as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and blog "Schneier on Security" are read by over 250,000 people. Schneier is a Lecturer in Public Policy at the Harvard Kennedy School, a fellow at the Berkman-Klein Center for Internet and Society at Harvard University, a board member of the Electronic Frontier Foundation and AccessNow, and an advisory board member of EPIC and VerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc.

Randy A Winters

Software Engineering, AI, Privacy, Forensics, IPR

MatrixHCI, LLC

Massachusetts
Software Engineering, Computers - Cybersecurity, Software Architecture, Artificial Intelligence, Cryptocurrency / Blockchain, Speech & Face Recognition, ESI Protocol, Social Media Forensics, Biometric Identifiers, Code Review, Patent Infringement ,Trade Secret, IPR, PTAB, Claim Analysis, Forensic Data Extraction, BIPA
“Mr. Winters was both helpful & enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, & dedicated in providing feedback & expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - 30+ years experience in the industry with a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) - Expert in all facets of Software Engineering - AI Expert in knowledge base systems, chatGPT & other Large Language Models - Experienced AI prompt engineering - Holds AI patents in the US & abroad - Expert retained for numerous cases involving user privacy to include cases involving the Illinois Biometric Information Protection Act (BIPA) - Expert knowledge in speech / facial recognition, detection & other biometric identifiers - Experience challenging Viola-Jones facial detection argument - Expert in all privacy cases involving Speech / Facial Recognition, Biometric Identifiers, Voiceprints & the use & stora...

Stacy R Eldridge, CFCE, GCFE, GSEC, GCCC, LPD

Silicon Prairie Cyber Services

Lincoln, Nebraska
Computers, Cybersecurity - Computer Forensics,Digital Forensics,Mobile Forensics,Cell Phone,iPhone,Android,Email,Meta Data,Data Recovery,Deleted Files,Video Analysis,Image Analysis,RAM,Data Loss Prevention, Insider Threat,Cybersecurity,Cybercrime,FBI,Forensic Analysis,Computer Investigation,Criminal Defense,Civil Litigaiton
Stacy Eldridge is a former Senior Forensic Examiner with the FBI, and began her security career 20 years ago in the FBI. Today, she is a leading force behind Silicon Prairie Cyber Services, bringing two decades of digital forensics and cybersecurity expertise to the company. Stacy's services include digital forensics, litigation support, expert witness testimony, cybersecurity consulting and teaching . As a respected educator, she is an Adjunct Professor teaching digital forensics and cybersecurity classes for OSU and Bellevue University while also coaching for IACIS. Stacy's passion goes beyond just finding evidence - it's about understanding it and helping others comprehend its significance. With a keen eye for the truth, Stacy's unwavering dedication to her craft makes her a trusted authority in digital forensics and cybersecurity. Whether it's a complete digital forensics examination, a second opinion, or a report review, Stacy offers a no-nonsense approach to giving you the fa...

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Las Vegas, Nevada
Computers, Cybersecurity - Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I work with attorneys to interpret digital evidence, and tell a powerful story. My technical expertise saves time and money: pre-discovery communications, forensically-sound data preservation, and reports that pack a punch. Expert analysis for electronic medical records, business espionage, employee misconduct, vehicle computer systems, video surveillance, cybercrime, divorce, probate and more (ask about your case -- initial consultation is free). I have more than two decades in the field. Court appearances in multiple states. A live person always answers the phone. My most frequent practical contributions in litigation consulting are as follows: • Distinguishing useful ESI from non probative data • Overcoming adverse party’s resistance to producing ESI • Producing ESI with confidence it will be admissible • Delivering concise written reports that clarify rather than confuse • Incorporating digital evidence into the legal strategy • Advising methods that ...

Brad A LaPorte

Top Cybersecurity & Information Technology Expert

High Tide Advisors

New York
Cybersecurity, Information Technology - Fraud, Defamation, Analyst, Ransomware, Endpoint, network, cyber, insurance, penetration, testing, malware, computer, breach, managed, risk, vulnerability, crime, threat, attack, hack, forensic, digital, incident response, compliance, identity, cloud, software, patent, trade secret, Wire, AI, Intel
Brad A. LaPorte is a cybersecurity and Information Technology consultant and currently serving as a founder of High Tide Advisors. He has over 20+ years of experience as a consultant in the cybersecurity industry spanning various industry segments. Pior Cases: Pior cases have involved high profile companies and persons such as Bungie the Video Gaming Division of Sony, SentinelOne, BlackBerry, Red Canary, and the Miami-Dade Mayor Candidate and Influencer Alexander Otaola. Topics have included intellectual property theft, wire fraud, real estate fraud, lack of adherence to cybersecurity best practices and regulations, conflicts of interest, malicious tampering and reverse engineering of software and hardware, interference with business relationships, defamation, and matters involving impersonation with malicious intent. Career History and Expertise: Prior to forming High Tide Advisors, he served as a top Gartner Research Analyst, including but not limited to the following spec...

Patrick M. OLeary, MBA, BSEE, CISSP, CEH

ExpertWitness.com

Hauppauge, New York
Internet, Information Technology - Computers/IT, Cybersecurity, Internet Forensics, Data Forensics, Internet Expert Witness, Software, MBA, Intellectual Property, Prior Art, Patents, Internet Hosting, Email, World Wide Web (WWW), Internet Litigation, Computer Science, Internet Liability/Damages, Litigation. Support, CISSP, CEH, CHFI
I am an entrepreneur who has been the founder of several different startup companies across a variety of information technology industries yielding me diverse Business, Technical & Internet expertise. I have worked as an Internet Litigation Consultant working for law firms as an Internet Expert Witness. Early business entry, which was a way to pass the time, soon paved my career path. I became the CEO and sole proprietor of MatchMaker.com in 1995. My site generated an adequate amount of revenue, thus being self-funded and be free of any venture capital. By 1999, my company expanded to employ over 30 people and generate more than $7 million every year. When we sold to Lycos in July 2000 for 45 million dollars, the 30 employees expanded to more than 120 people, signifying exponential growth in such a short period. With lots of success and a growth rate of 8% (or greater) per month, MatchMaker.com was designated as the "2nd stickiest website on the internet" by Jupiter Media and was ...

Randy A Winters

Software Engineering, AI, Privacy, Forensics, IPR

MatrixHCI, LLC

New York
Software Engineering, Computers - Cybersecurity, Software Architecture, Artificial Intelligence, Cryptocurrency / Blockchain, Speech & Face Recognition, ESI Protocol, Social Media Forensics, Biometric Identifiers, Code Review, Patent Infringement ,Trade Secret, IPR, PTAB, Claim Analysis, Forensic Data Extraction, BIPA
“Mr. Winters was both helpful & enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, & dedicated in providing feedback & expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - 30+ years experience in the industry with a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) - Expert in all facets of Software Engineering - AI Expert in knowledge base systems, chatGPT & other Large Language Models - Experienced AI prompt engineering - Holds AI patents in the US & abroad - Expert retained for numerous cases involving user privacy to include cases involving the Illinois Biometric Information Protection Act (BIPA) - Expert knowledge in speech / facial recognition, detection & other biometric identifiers - Experience challenging Viola-Jones facial detection argument - Expert in all privacy cases involving Speech / Facial Recognition, Biometric Identifiers, Voiceprints & the use & stora...

C. Matthew Curtin, CISSP

Interhack Corporation

Columbus, Ohio
Computers, Cybersecurity - Data Breach, Security Incident, Information Security, Computer Science, Encryption
C. Matthew Curtin, CISSP is the Founder and CEO of Interhack Corporation. Curtin is Interhack’s lead computer scientist and cybersecurity expert. Curtin has been engaged in criminal, civil, administrative, and military processes by plaintiffs, defendants, and the courts directly. His opinion has been accepted by federal and state courts throughout the country in hearings, trials, and appeals. Curtin and his team help attorneys and executives understand the meaning and context of data and how they affect business, operations, or a legal case. Curtin’s vast knowledge and experience in the field of computer science and cybersecurity enables him to convey the optimal path forward and offer an opinion within a degree of scientific certainty. Curtin’s experience in the field enables him to train his team to operate in specialized task forces organized to respond to high-stakes situations such as data breaches. Curtin's work centers on the intersection of law and technology. The U.S. Cou...

Michael Yasumoto, CFCE, CAWFE, ICMDE, GCFE, GCFA

Deadbolt Forensics

Beaverton, Oregon
Computers, Cybersecurity - Trade Secret Theft, Intellectual Property, Computer Forensics, cell phone forensics, Email Forensics, Vehicle Electronics, Digital Forensics, Smartphones, mobile forensics, Meta Data, Data Recovery, Forensic Science, Internet, Technology, Information Technology
Michael Yasumoto has worked on hundreds of cases and has over 1,000 hours of specialized forensic training. He has taught computer and mobile phone forensic classes to both US and foreign law enforcement as well as the military. His civil practice is primarily focused on two case types. 1. Employees accused of copying or retaining confidential data when they exit the company. In some cases, a company device is returned by the employee after it has been erased. Michael's expertise covers preserving and examining the associated data to determine what happened. He has worked for both the plaintiff and defense on these cases. 2. Traffic accidents where a driver could have been interacting with their cell phone at the time of the collision. Michael's expertise covers downloading and examining the phone's data as well as associated Call Detail Records (CDRs) from the wireless carrier. If applicable, he can download the data from the infotainment system in the car and provide a r...

Steven Bergin

Cybertek Forensics, Inc.

King of Prussia, Pennsylvania
Cybersecurity, Technology - Digital Forensics, Cell Phones, Call Data Records, Digital Security, Hacking, Intellectual Property, Password Cracking, Mobile Forensics, E-Discovery, Cyber Security, Investigation, Computer Hacking
Experienced military veteran and IT Specialist in Digital Forensics, Network Administration and Management, with a demonstrated history of working in the U.S. defense industry, Federal law enforcement, military and the financial industry. Skilled in network management, Digital Forensics, Blacklight forensic software, AccessData AD lab forensics software, Internet Evidence Finder (IEF), Griffeye modular digital investigation platform, Cellibrite UFED 4PC mobile device forensics, evidence collection and chain of custody procedures, write-blocking forensic imaging hardware tools. Strong professional currently enrolled in a M.S in Digital Forensics program at Champlain College. Holds a B.S. in Communications from Liberty University and a A.S. focused on Information Systems Technology from Community College of the United States Air Force. Certificates & Training & Navy Awards o AccessData Certified Examiner (ACE), 2016 o CompTIA Security + certification, 2009 o Cyber Systems Operation...

Shawn H. Malone, CISSP, CTPRP, CTPRA

Security Diligence, LLC

Reading, Pennsylvania
Cybersecurity, Information Technology - Third Party Vendor Management, Third Party Security Assessments, Vendor Security Assessments, Cybersecurity Risk Management, Cybersecurity Programs, Cybersecurity Governance, Cybersecurity Regulatory Compliance, Information Security Programs, Information Security Policies, Data Security Compliance
Award winning information security and cyber risk expert. Thirty-five years of experience including secure communications systems, network security, data protection, security program management, policy development, compliance oversight, cybersecurity assessments and third party risk management. Delivery of cybersecurity solutions and third party risk management programs in the financial services/insurance, consulting/advisory and defense industries. Degrees in electrical engineering technology and network security. Co-developed industry leading Third Party Risk Management professional certification. Certified Information Systems Security Professional (CISSP), Certified Third Party Risk Professional (CTPRP) and Certified Third-Party Risk Assessor (CTPRA). Experienced public speaker and trainer.

Paul Sibenik

Pittsburgh, Pennsylvania
Cryptocurrency, Securities & Investments - blockchain, bitcoin, blockchain forensics, hacks, theft, fraud, pig butchering, embezzlement, ransomware, ethereum, crypto, SIM Swaps, embezzlement, compliance, cybersecurity, cryptocurrency tracking, cryptocurrency tracing, staking, NFTs, ponzi schemes, smart contracts
Paul Sibenik is a blockchain forensics and cryptocurrency tracing expert. He frequently conducts investigations in a range of niches, including cryptocurrency hacks, exploits, vulnerabilities, thefts, fraud, SIM Hijacking, fraud, ransomware, embezzlement, and pig butchering scams. Tracking cryptocurrency such as Bitcoin and Ethereum often plays a critical role in his investigations. Additionally, Paul has been appointed as an expert in many civil disputes, including bankruptcy divorce matters, having worked on more than 100 cases involving cryptocurrency in divorce alone. He has also frequently been asked to open on matters related to Anti-money laundering (AML), compliance, cybersecurity, NFTs, and staking.

Brad A LaPorte

Top Cybersecurity & Information Technology Expert

High Tide Advisors

Texas
Cybersecurity, Information Technology - Fraud, Defamation, Analyst, Ransomware, Endpoint, network, cyber, insurance, penetration, testing, malware, computer, breach, managed, risk, vulnerability, crime, threat, attack, hack, forensic, digital, incident response, compliance, identity, cloud, software, patent, trade secret, Wire, AI, Intel
Brad A. LaPorte is a cybersecurity and Information Technology consultant and currently serving as a founder of High Tide Advisors. He has over 20+ years of experience as a consultant in the cybersecurity industry spanning various industry segments. Pior Cases: Pior cases have involved high profile companies and persons such as Bungie the Video Gaming Division of Sony, SentinelOne, BlackBerry, Red Canary, and the Miami-Dade Mayor Candidate and Influencer Alexander Otaola. Topics have included intellectual property theft, wire fraud, real estate fraud, lack of adherence to cybersecurity best practices and regulations, conflicts of interest, malicious tampering and reverse engineering of software and hardware, interference with business relationships, defamation, and matters involving impersonation with malicious intent. Career History and Expertise: Prior to forming High Tide Advisors, he served as a top Gartner Research Analyst, including but not limited to the following spec...

Randy A Winters

Software Engineering, AI, Privacy, Forensics, IPR

MatrixHCI, LLC

Saint George, Utah
Software Engineering, Computers - Cybersecurity, Software Architecture, Artificial Intelligence, Cryptocurrency / Blockchain, Speech & Face Recognition, ESI Protocol, Social Media Forensics, Biometric Identifiers, Code Review, Patent Infringement ,Trade Secret, IPR, PTAB, Claim Analysis, Forensic Data Extraction, BIPA
“Mr. Winters was both helpful & enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, & dedicated in providing feedback & expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - 30+ years experience in the industry with a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) - Expert in all facets of Software Engineering - AI Expert in knowledge base systems, chatGPT & other Large Language Models - Experienced AI prompt engineering - Holds AI patents in the US & abroad - Expert retained for numerous cases involving user privacy to include cases involving the Illinois Biometric Information Protection Act (BIPA) - Expert knowledge in speech / facial recognition, detection & other biometric identifiers - Experience challenging Viola-Jones facial detection argument - Expert in all privacy cases involving Speech / Facial Recognition, Biometric Identifiers, Voiceprints & the use & stora...

Eric Cole

Secure Anchor Consulting

Ashburn, Virginia
Cybersecurity, Computers - Computer Forensics, Computer Investigations, Computer Security, Cyber Breach, Intellectual Property, Loss Prevention, Network Security, Security Management, Security Negligence, Trade Secrets, Security Standards, Data Privacy, Cloud Security, Patents, Apportionment, Infringement, Damages, Meta Data
Dr. Eric Cole is a computer and cybersecurity expert who has built a solid reputation in the information technology industry over the last three decades. His educational experience includes a master’s degree in computer science from the New York Institute of Technology, and a doctorate in Professional Studies from Pace University. Dr. Cole’s expert involvement in the cybersecurity industry is demonstrated by being appointed as the commissioner on cybersecurity for the 44th president, holding a position as a senior fellow at SANS, and being elected to the Purdue University Executive Advisory Board. His extensive real-world experience includes being the former Chief Technology Officer for McAfee, former Chief Scientist at Lockheed Martin, and former Program Manager at the Central Intelligence Agency. Currently, he is the CEO and Founder of Secure Anchor Consulting. His consulting clients include Fortune 500 companies, Fortune 50 companies, international organizations, and the feder...
You can also find Cybersecurity Expert Witnesses in:
District Of Columbia, Illinois, Pennsylvania, Virginia, Ohio, Nebraska, Connecticut, California, Florida, Massachusetts, Nevada, and Oregon