Cybersecurity Expert Witness Listings in Pennsylvania

Welcome to our Cybersecurity expert directory. Browse the profiles below to find the right expert witness in Cybersecurity for your case. Our SEAK Expert Witness Database is always free to search.

SEAK, Inc. is The Expert Witness Training Company. We have trained thousands of expert witnesses, through our seminars, on-site corporate training, assisting retaining counsel to prepare their witnesses, and one-on-one training for individual experts. For additional information please visit testifyingtraining.com

Unable to find the right expert? For personalized assistance in locating an expert witness, please click here.

Dr. Eric Cole, CISSP Secure Anchor Consulting

Cybersecurity, Computers - Computer Forensics, Computer Investigations, Computer Security, Cyber Breach, Information Technology, Intellectual Property, Loss Prevention, Network Security, Security, Security Management, Security Negligence, Technology,
A computer and cybersecurity expert witness with over 30 years of hands-on experience, Dr. Cole is an expert witness in information technology with a focus on cybersecurity. Dr. Cole works on a wide range of cases, including IP litigation (IPR, PGR, infringement, invalidity, damages), criminal and civil cases including gross negligence, SEC litigation, and cybersecurity breaches. He has taught at the SANS Institute, Georgetown University, NY Institute of Technology, and has been a guest lecturer at Purdue, MIT, Harvard, and Berkeley. He has his certification in CISSP and created the GIAC certification programs and exams. He served as a member of the Commission on Cybersecurity for the 44th President and is a member of several advisory boards such as the Purdue University Executive Advisory Board. While working for the Central Intelligence Agency (CIA), Dr. Cole received six exceptional performance awards, and has received the Cyber Wingman award from the U.S. Air Force. Dr. Cole...
Click for Full Listing and Contact Info

Sauvik Das, PhD

Pittsburgh, Pennsylvania
Cybersecurity, Human Factors - Privacy, Privacy by Design, Consumer Safety, User Experience Research, iOS, Android, Artificial Intelligence, Machine Learning, Ethics, Social Network Analysis, Social Media, Data Science, Cryptocurrency, Blockchain, Distributed Ledger, Human-Computer Interaction
I am a professor of Interactive Computing at Georgia Tech's College of Computing (a top 10 department in computer science). Prior to that, I got my Ph.D. in Human-Computer Interaction at Carnegie Mellon University (from the #1 ranked computer science department in the country). I have previously worked as a researcher and technologist at Facebook, Google and Microsoft, as well as at a small technology start-up company. I direct the GT SPUD (Security, Privacy, Usability and Design) Lab. Our work, at the intersection of HCI, data science and cybersecurity, is oriented around answering two questions: (i) How can we design systems that encourage better cybersecurity and privacy behaviors? (ii) How can we design systems that shift power away from surveillance institutions and back into the hands of end-users? I've given talks on my research both USENIX Enigma and RSA — both premier venues for cybersecurity professionals — in addition to many top universities: e.g., Stanford, Princeton...
Click for Full Listing and Contact Info

Shawn H. Malone, CISSP, CIPP/US, CTPRP, CTPRA Security Diligence, LLC

Reading, Pennsylvania
Cybersecurity, Information Technology - Third Party Vendor Management, Third Party Security Assessments, Vendor Security Assessments, Cybersecurity Risk Management, Cybersecurity Programs, Cybersecurity Governance, Cybersecurity Regulatory Compliance, Information Security Programs, Information Security Policies, Data Security Compliance
Award winning information security and cyber risk expert. Thirty-five years of experience including secure communications systems, network security, data protection, security program management, policy development, compliance oversight, cybersecurity assessments and third party risk management. Delivery of cybersecurity solutions and third party risk management programs in the financial services/insurance, consulting/advisory and defense industries. Degrees in electrical engineering technology and network security. Co-developed industry leading Third Party Risk Management professional certification. Certified Information Systems Security Professional (CISSP), Certified Information Privacy Professional/United States (CIPP/US), Certified Third Party Risk Professional (CTPRP) and Certified Third-Party Risk Assessor (CTPRA). Experienced public speaker and trainer.
Click for Full Listing and Contact Info
You can also find Cybersecurity Expert Witnesses in:
California, Maryland, Florida, Virginia, Ohio, Pennsylvania, Connecticut, Nevada, Washington, and Colorado