Cybersecurity Expert Witness

Listings

This page contains cybersecurity expert witnesses who testify, consult and provide litigation support on cybersecurity and related issues. Cybersecurity expert witnesses and consultants on this page may form expert opinions, draft expert witness reports, provide expert witness testimony at deposition and/or trial as or serve as consulting (non-testifying) experts. The issues and subjects these cybersecurity expert witnesses testify regarding may include: Digital Forensics, Cybersecurity, Artificial Intelligence, Blockchain, Computer Forensics, Computer Security, Data Breach, Information Security, Privacy, Android, Cryptocurrency, Ecommerce, Encryption, Hacking, and Hipaa.

Use the search box above to further refine your search for cybersecurity expert witnesses by keyword and state. Attorneys contact the experts directly – with no middleman.

Unable to find the right cybersecurity expert? Contact us for personalized assistance locating an expert witness.

Dr. Eric Cole, CISSP Secure Anchor Consulting

Cybersecurity, Computers - Computer Forensics, Computer Investigations, Computer Security, Cyber Breach, Information Technology, Intellectual Property, Loss Prevention, Network Security, Security, Security Management, Security Negligence, Technology,
A computer and cybersecurity expert witness with over 30 years of hands-on experience, Dr. Cole is an expert witness in information technology with a focus on cybersecurity. Dr. Cole works on a wide range of cases, including IP litigation (IPR, PGR, infringement, invalidity, damages), criminal and civil cases including gross negligence, SEC litigation, and cybersecurity breaches. He has taught at the SANS Institute, Georgetown University, NY Institute of Technology, and has been a guest lecturer at Purdue, MIT, Harvard, and Berkeley. He has his certification in CISSP and created the GIAC certification programs and exams. He served as a member of the Commission on Cybersecurity for the 44th President and is a member of several advisory boards such as the Purdue University Executive Advisory Board. While working for the Central Intelligence Agency (CIA), Dr. Cole received six exceptional performance awards, and has received the Cyber Wingman award from the U.S. Air Force. Dr. Cole...

Steven Alexander Trace Digital Forensics, LLC

Bakersfield, California
Computers, Cybersecurity - Computer Forensics, Digital Forensics, Mobile Forensics, Cell Phone, iPhone, Android, Smartphone, Windows Forensics, Mac Forensics, Computer Hacking, IP Address, Geolocation, information technology
Mr. Alexander has examined computers and mobile devices in response to civil and criminal proceedings, computer misuse investigations, and security incidents. He has worked on cases involving wire fraud, embezzlement, business disputes, personal injury, street crime, harassment, restraining orders, and child pornography. He excels at analyzing expert witness reports and other technical materials. A lifelong technologist, he has over twenty years of experience in information technology including roles as a software developer, network engineer, IT director, and IT security director. He has multiple publications and has presented at several conferences and workshops. Certifications: • EnCase Certified Examiner (EnCE) • Magnet Certified Forensic Examiner: AXIOM (MCFE) • Certified Information Systems Security Professional (CISSP) • GIAC Security Leadership (GSLC) • CompTIA Security+ Services: • Computer Forensic Examinations (Windows & Mac) • Mobile Device Examinations (iOS & Android)...

John Horst, CISSP®-ISSAP® Xanesti Technology Services, LLC

San Diego, California
Computers, Cybersecurity - Computer, Digital Forensics, Discovery, Databases, Class Action, Hacking, Breach, Encryption Safe Harbor, Health Care Data, Digital Medical Records, HIPAA, PII
John Horst, CISSP®-ISSAP®, is the Managing Member for Technology and Innovation for Xanesti Technology Services, LLC. John has provided expert information technology consulting across several lines of business such as pharmaceutical development, medical billing, general liability insurance, clinical laboratory systems, mortgage financing, and automotive aftermarket products. John has provided cybersecurity engineering, software development, installation and training, and troubleshooting for 11 years in support of multiple U.S. Navy programs of record, including programs operating at both unclassified and secret levels. John maintains an active national security clearance at the SECRET level. John has taught information technology courses for the University of Phoenix (San Diego and Online campuses) and Coleman University (San Diego) where John pioneered the development of computer game software development instruction, now a core part of the Coleman curriculum. John has also ta...

Ryan McKamie, CISSP, CISM Certus Cybersecurity Solutions LLC

Redwood City, California
Cybersecurity, Intellectual Property - Cybersecurity, Information Security, Reasonable Measures, Trade Secret, Intellectual Property, Cybersecurity Standards, Cybersecurity Controls, Software Security, Application Security, Cloud Security, Data Breach, Computers, Forensics
Ryan McKamie is CEO of Certus Cybersecurity, a provider of cybersecurity consulting and expert testimony. Certus Cybersecurity specializes in: Intellectual Property (IP) and Trade Secret Misappropriation – Cybersecurity analysis, consulting and expert testimony in intellectual property litigation related to misappropriation of alleged trade secrets, including analysis and opinion of cybersecurity reasonable measures for alleged trade secrets. Cyber-Related Insurance and Contract Disputes – Analysis, consulting and expert testimony in cybersecurity-related insurance and contractual litigation, including analysis and opinion on whether specific security standards were maintained. Cybersecurity Consulting and Expert Testimony – Analysis, consulting and expert testimony in business litigation concerning data privacy and cybersecurity issues. Providing technical evaluation, forensics, and strategic advice to Fortune 100 corporations and Am Law 100 law firms before, during, and after ...

Timothy Smit

Erie, Colorado
Cybersecurity, Information Technology - Privacy, HIPAA, GDPR, CCPA, Information Risk Management, Data Protection, PCI, Data Breach, Vendor Risk Management, Cyber Insurance, Privacy Regulatory, Data Retention and Destruction
Fellow of Information Privacy (FIP) Certified Data Privacy Solutions Engineer (CDPSE) Certified Information Privacy Manager (CIPM) Certified Information Privacy Professional/Europe (CIPP/E) Certified Information Privacy Professional/United States (CIPP/US) Cyber Insurance & Risk Manager (CyRM) Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Certified in Risk and Information Systems Control (CRISC) Healthcare Information Security and Privacy Professional (HCISPP) Certified Healthcare Privacy and Security Professional (CHPS) Certified HIPAA Professional (CHP) State of Colorado Resident Producer License, Casualty, Property, Current 07/2022

Jonathan E Hochman Hochman Consultants

Cheshire, Connecticut
Internet, Cybersecurity - E-commerce, Ecommerce, SEO, Search Engine Optimization, PPC, Pay Per Click, Web Development, Online Advertising, Internet Marketing, Google Analytics, Google AdWords, Digital Forensics, Internet Security, Mobile Marketing, Mobile Advertising, Patent, Trademark, Reputation Management, Defamation,
Jonathan Hochman serves as consulting and testifying expert for cases related to Internet marketing, e-commerce, website development, digital forensics, search engine optimization (SEO), pay-per-click (PPC) advertising, mobile advertising, and digital advertising. Since 2007 he has provided expert witness services to plaintiffs and defendants alike for disputes involving trademarks, patents, trade secrets, copyrights, contracts, defamation and online reputation, unfair competition, conspiracy and fraud. Hochman has testified at eight trials and twenty-three depositions. He has served as a consulting expert in more than fifty cases. His clients are located in the United States, the United Kingdom, Canada, Israel and Romania. A Yale University graduate with two degrees in computer science, Hochman has worked as a sales, marketing and technology consultant for 30 years. After managing several prior businesses, he founded Hochman Consultants in 2004. Then in 2008 Hochman became cha...

Barlow Keener, JD, CIPP Keener Law Group

District Of Columbia
Telecommunications, Internet - mobile, wireless, privacy, cybersecurity, data center, spectrum, cable, network, FCC, FTC, Wi-Fi, satellite
Mr. Keener has over 20 years of telecommunications, spectrum, Internet, and privacy law experience. He has earned an exam certification as CIPP/US privacy law certification, or “Certified Information Privacy Professional”, from the IAPP (International Association of Privacy Professionals). He is Co-Chair of the FCBA (Federal Communications Bar Association) Wireless Committee and a Member, Forum on Communications Law, American Bar Association. Barlow has provided counsel and in-depth regulatory and financial analysis for clients involved with investments in innovative FCC related spectrum issues, satellite spectrum matters, terrestrial radio technologies, small cell technologies, long-haul fiber networks, and data centers. He has actively handled state regulatory proceedings as an attorney and provided expert witness services and support for state regulators in telecommunications administrative matters involving FCC classifications of central offices, service quality failures, and 91...

Christopher Bradley Storm Force Cyber

Tampa, Florida
Cybersecurity, Technology - Data breaches, Insider Threats, Supply Chain Attacks, Government IT Compliance, Cybercrime, COMSEC, eDiscovery, Vulnerability Assessment
A business and technically focused cybersecurity professional with 20 years of experiencing addressing various technical and information management solutions. Strong background with multiple information technology disciplines that focus on Government and Military compliance, standards and procedures.

Michael Barr

Germantown, Maryland
Software Engineering, Cybersecurity - embedded systems, operating systems, computer software, automotive electronics, medical devices, industrial automation, computer security, software malfunction, programming languages, reverse engineering, source code review, software quality
Michael Barr is a former adjunct professor of computer engineering with more than twenty-five years of experience in the software industry, including over a decade spent developing software for embedded systems. Software he wrote has powered millions of products. Mr. Barr is the author of three books and more than seventy articles and papers about embedded software design and architecture and is internationally recognized as an expert in the field. He is also a founder of three companies, including Barr Group. In his work as a software expert witness, Mr. Barr has testified more than twenty times before judges and juries in matters ranging from patent infringement and validity to product liability to theft of copyrighted software and trade secrets. He has been qualified in U.S. and Canadian courts as an expert in computer software, electrical engineering, and satellite TV security and piracy.

Seth A Cowand Veterans Lab Services

Linthicum, Maryland
Computers, Cybersecurity - Computer Forensics, Digital Forensics, Cyber Forensics, Mobile Forensics, Electronic Detection K9, Cyber Crime, Internet Crime, ISO 17025 Accreditation, Major Crime Investigations, Digital Evidence Preservation and Handling, Digital and Multimedia Forensics, and Certification and Accreditation.

Barlow Keener, JD, CIPP Keener Law Group

Boston, Massachusetts
Telecommunications, Internet - mobile, wireless, privacy, cybersecurity, data center, spectrum, cable, network, FCC, FTC, Wi-Fi, satellite
Mr. Keener has over 20 years of telecommunications, spectrum, Internet, and privacy law experience. He has earned an exam certification as CIPP/US privacy law certification, or “Certified Information Privacy Professional”, from the IAPP (International Association of Privacy Professionals). He is Co-Chair of the FCBA (Federal Communications Bar Association) Wireless Committee and a Member, Forum on Communications Law, American Bar Association. Barlow has provided counsel and in-depth regulatory and financial analysis for clients involved with investments in innovative FCC related spectrum issues, satellite spectrum matters, terrestrial radio technologies, small cell technologies, long-haul fiber networks, and data centers. He has actively handled state regulatory proceedings as an attorney and provided expert witness services and support for state regulators in telecommunications administrative matters involving FCC classifications of central offices, service quality failures, and 91...

Randy A Winters MatrixHCI, LLC

Massachusetts
Software Engineering, Computers - Speech Recognition, Facial Recognition, BIPA, ESI Protocol, Cybersecurity, Cryptocurrency, Blockchain, Software Architecture, Social Media, Software Code Review, Artificial Intelligence, IPR, Patent Infringement, Trade Secret
- Mr. Winters has been an expert in Speech Recognition Development, Cybersecurity, Blockchain, IPR, Trade Secrets since the early 1990’s until present and meets the qualifications for POSITA in most desired time periods with experience extending to present. - He served as CTO, CEO & President in various companies and has built multiple Award-Winning National Products and has patents in the US and abroad. - He also has blockchain development experience and designed the first cryptocurrency arbitrage system. 
 - Mr. Winters has experience with CMU's Sphinx, facial recognition, Siri, Goggle & Samsung's speech recognition privacy issues/design. - Mr. Winters has 30 years of computer development experience developing private sector products for companies like Microsoft, Apple, Hewlett-Packad, Fujutsu, Epson, Boeing, Honeywell, Air Force Research Labs (AFRL). - He has a Master of Software Engineering Graduate Degree from Carnegie-Mellon University (CMU) (later in his career in 2002). - ...

William A. Mason Wamason.com

Las Vegas, Nevada
Computers, Cybersecurity - Operating Systems, Device Drivers, File Systems, Computer Storage, Distributed Systems, Cryptography, Encryption, Blockchain, Computer Security, Distributed Consensus, Educational Technology, Human Computer Interaction, Computer Networks, Machine Learning, Artificial Intelligence
My expertise is in computer systems and computer technologies including consensus protocols as used by databases, distributed file systems, key-value stores, cryptocurrency, etc. Much of my work has been in data storage: databases, file systems, operating systems, device drivers, etc. I have extensive experience teaching complex technical topics, which allows me to explain concepts in approachable terms. I have authored peer-reviewed literature, technical books, and informational articles within my specialized field, and have been awarded 11 patents pertaining to my work. My litigation support experience is in patent litigation, most recently KOM v. Network Appliance (2018).

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Las Vegas, Nevada
Computers, Cybersecurity - Computers and Mobile Devices, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Ecommerce, Vehicle Electronics, Electronic Banking, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I am an information security and digital forensics practitioner. I have more than two decades of experience in the field. I have significant experience with banking attacks, cloud data, ESI, electronic health records, email security, meta data, mobile devices, ransomeware, smartphones, wire fraud, and unauthorized access. I have earned six (6) advanced technical certifications, G2700, GCFA, GPCI, GSEC, CGEIT, GRISC. These certifications cover information security, information governance, the ISO security standard, compliance, and digital forensics. I am the co-inventor of technical advancements in email and information security (United States Patents granted). My methodology is science-based, with results that are reproducible. I pride myself on recovering useful digital evidence, in admissible form, and delivering concise written reports that clarify rather than confuse. I have been an advisor on data privacy and security laws to Nevada State Legislators, and to the Nevada Attor...

William A. Mason Wamason.com

New York
Computers, Cybersecurity - Operating Systems, Device Drivers, File Systems, Computer Storage, Distributed Systems, Cryptography, Encryption, Blockchain, Computer Security, Distributed Consensus, Educational Technology, Human Computer Interaction, Computer Networks, Machine Learning, Artificial Intelligence
My expertise is in computer systems and computer technologies including consensus protocols as used by databases, distributed file systems, key-value stores, cryptocurrency, etc. Much of my work has been in data storage: databases, file systems, operating systems, device drivers, etc. I have extensive experience teaching complex technical topics, which allows me to explain concepts in approachable terms. I have authored peer-reviewed literature, technical books, and informational articles within my specialized field, and have been awarded 11 patents pertaining to my work. My litigation support experience is in patent litigation, most recently KOM v. Network Appliance (2018).

C. Matthew Curtin, CISSP Interhack Corporation

Columbus, Ohio
Computers, Cybersecurity - Data Breach, Security Incident, Information Security, Computer Science, Encryption
C. Matthew Curtin, CISSP is the Founder and CEO of Interhack Corporation. Curtin is Interhack’s lead computer scientist and cybersecurity expert. Curtin has been engaged in criminal, civil, administrative, and military processes by plaintiffs, defendants, and the courts directly. His opinion has been accepted by federal and state courts throughout the country in hearings, trials, and appeals. Curtin and his team help attorneys and executives understand the meaning and context of data and how they affect business, operations, or a legal case. Curtin’s vast knowledge and experience in the field of computer science and cybersecurity enables him to convey the optimal path forward and offer an opinion within a degree of scientific certainty. Curtin’s experience in the field enables him to train his team to operate in specialized task forces organized to respond to high-stakes situations such as data breaches. Curtin's work centers on the intersection of law and technology. The U.S. Cou...

Sauvik Das, PhD

Pittsburgh, Pennsylvania
Cybersecurity, Human Factors - Privacy, Privacy by Design, Consumer Safety, User Experience Research, iOS, Android, Artificial Intelligence, Machine Learning, Ethics, Social Network Analysis, Social Media, Data Science, Cryptocurrency, Blockchain, Distributed Ledger, Human-Computer Interaction
I am a professor of Interactive Computing at Georgia Tech's College of Computing (a top 10 department in computer science). Prior to that, I got my Ph.D. in Human-Computer Interaction at Carnegie Mellon University (from the #1 ranked computer science department in the country). I have previously worked as a researcher and technologist at Facebook, Google and Microsoft, as well as at a small technology start-up company. I direct the GT SPUD (Security, Privacy, Usability and Design) Lab. Our work, at the intersection of HCI, data science and cybersecurity, is oriented around answering two questions: (i) How can we design systems that encourage better cybersecurity and privacy behaviors? (ii) How can we design systems that shift power away from surveillance institutions and back into the hands of end-users? I've given talks on my research both USENIX Enigma and RSA — both premier venues for cybersecurity professionals — in addition to many top universities: e.g., Stanford, Princeton...

Shawn H. Malone, CISSP, CIPP/US, CTPRP, CTPRA Security Diligence, LLC

Reading, Pennsylvania
Cybersecurity, Information Technology - Third Party Vendor Management, Third Party Security Assessments, Vendor Security Assessments, Cybersecurity Risk Management, Cybersecurity Programs, Cybersecurity Governance, Cybersecurity Regulatory Compliance, Information Security Programs, Information Security Policies, Data Security Compliance
Award winning information security and cyber risk expert. Thirty-five years of experience including secure communications systems, network security, data protection, security program management, policy development, compliance oversight, cybersecurity assessments and third party risk management. Delivery of cybersecurity solutions and third party risk management programs in the financial services/insurance, consulting/advisory and defense industries. Degrees in electrical engineering technology and network security. Co-developed industry leading Third Party Risk Management professional certification. Certified Information Systems Security Professional (CISSP), Certified Information Privacy Professional/United States (CIPP/US), Certified Third Party Risk Professional (CTPRP) and Certified Third-Party Risk Assessor (CTPRA). Experienced public speaker and trainer.

Randy A Winters MatrixHCI, LLC

Saint George, Utah
Software Engineering, Computers - Speech Recognition, Facial Recognition, BIPA, ESI Protocol, Cybersecurity, Cryptocurrency, Blockchain, Software Architecture, Social Media, Software Code Review, Artificial Intelligence, IPR, Patent Infringement, Trade Secret
- Mr. Winters has been an expert in Speech Recognition Development, Cybersecurity, Blockchain, IPR, Trade Secrets since the early 1990’s until present and meets the qualifications for POSITA in most desired time periods with experience extending to present. - He served as CTO, CEO & President in various companies and has built multiple Award-Winning National Products and has patents in the US and abroad. - He also has blockchain development experience and designed the first cryptocurrency arbitrage system. 
 - Mr. Winters has experience with CMU's Sphinx, facial recognition, Siri, Goggle & Samsung's speech recognition privacy issues/design. - Mr. Winters has 30 years of computer development experience developing private sector products for companies like Microsoft, Apple, Hewlett-Packad, Fujutsu, Epson, Boeing, Honeywell, Air Force Research Labs (AFRL). - He has a Master of Software Engineering Graduate Degree from Carnegie-Mellon University (CMU) (later in his career in 2002). - ...

Dr. Eric Cole, CISSP Secure Anchor Consulting

Ashburn, Virginia
Cybersecurity, Computers - Computer Forensics, Computer Investigations, Computer Security, Cyber Breach, Information Technology, Intellectual Property, Loss Prevention, Network Security, Security, Security Management, Security Negligence, Technology,
A computer and cybersecurity expert witness with over 30 years of hands-on experience, Dr. Cole is an expert witness in information technology with a focus on cybersecurity. Dr. Cole works on a wide range of cases, including IP litigation (IPR, PGR, infringement, invalidity, damages), criminal and civil cases including gross negligence, SEC litigation, and cybersecurity breaches. He has taught at the SANS Institute, Georgetown University, NY Institute of Technology, and has been a guest lecturer at Purdue, MIT, Harvard, and Berkeley. He has his certification in CISSP and created the GIAC certification programs and exams. He served as a member of the Commission on Cybersecurity for the 44th President and is a member of several advisory boards such as the Purdue University Executive Advisory Board. While working for the Central Intelligence Agency (CIA), Dr. Cole received six exceptional performance awards, and has received the Cyber Wingman award from the U.S. Air Force. Dr. Cole...

William A. Mason Wamason.com

Washington
Computers, Cybersecurity - Operating Systems, Device Drivers, File Systems, Computer Storage, Distributed Systems, Cryptography, Encryption, Blockchain, Computer Security, Distributed Consensus, Educational Technology, Human Computer Interaction, Computer Networks, Machine Learning, Artificial Intelligence
My expertise is in computer systems and computer technologies including consensus protocols as used by databases, distributed file systems, key-value stores, cryptocurrency, etc. Much of my work has been in data storage: databases, file systems, operating systems, device drivers, etc. I have extensive experience teaching complex technical topics, which allows me to explain concepts in approachable terms. I have authored peer-reviewed literature, technical books, and informational articles within my specialized field, and have been awarded 11 patents pertaining to my work. My litigation support experience is in patent litigation, most recently KOM v. Network Appliance (2018).

Steve Simpson, CCE, CISSP, CPTC, CSFA, PMP S2 Forensics

Gig Harbor, Washington
Computers, Cybersecurity - Digital Forensics, Mobile Forensics, Computer Forensics, Network Forensics, Email Forensics, Call Data Record analysis, Cell Tower Data analysis, Social Media Forensic analysis, Computer Crime Investigations, Cyber Investigations, Payment Card Industry Compliance, Digital Analyst
Steve Simpson, CCE, CISSP, CPTC, CSFA, PMP has over 35 years of experience in digital forensics, computer engineering, and data networking. His expertise includes criminal defense Litigation Support and Expert Witness testimony in cases involving cyberstalking, sexual harassment, No Contact Order violation, Domestic Violence, possession and distribution of child pornography, rape, kidnapping, unlawful imprisonment, and Net Nanny charges including attempted rape of a child and communication with a child for immoral purposes. Steve has extensive experience and training with computer and mobile device data extraction for cases involving social media apps including Facebook, Instagram, Snapchat, email, voice mail, text messaging, call data record analysis, and cell tower data analysis. Steve holds multiple computer forensics and management certifications including Certified Computer Examiner (CCE), Certified Information System Security Professional (CISSP), Certified Penetration Test...
You can also find Cybersecurity Expert Witnesses in:
California, Maryland, Florida, Virginia, Ohio, Pennsylvania, Connecticut, Nevada, Washington, and Colorado