Cybersecurity Expert Witnesses

The SEAK Expert Witness Directory contains a comprehensive list of cybersecurity expert witnesses who testify, consult and provide litigation support on cybersecurity and related issues. Cybersecurity expert witnesses and consultants on this page may form expert opinions, draft expert witness reports, and provide expert witness testimony at deposition and trial. The issues and subjects these cybersecurity expert witnesses testify regarding may include: Cybersecurity, Digital Forensics, Computer Forensics, Email, Hacking, Intellectual Property, Internet, Meta Data, Patents, Ransomware, Software, Computer, Data Recovery, E Discovery, and Mobile Forensics.

Use the search box above to further refine your search for cybersecurity expert witnesses by keyword and state. Attorneys contact the experts directly – with no middleman.

Eric Cole Secure Anchor Consulting

Cybersecurity, Computers - Computer Forensics, Computer Investigations, Computer Security, Cyber Breach, Intellectual Property, Loss Prevention, Network Security, Security Management, Security Negligence, Trade Secrets, Security Standards, Data Privacy, Cloud Security, Patents, Apportionment, Infringement, Damages, Meta Data
Dr. Eric Cole is a computer and cybersecurity expert who has built a solid reputation in the information technology industry over the last three decades. His educational experience includes a master’s degree in computer science from the New York Institute of Technology, and a doctorate in Professional Studies from Pace University. Dr. Cole’s expert involvement in the cybersecurity industry is demonstrated by being appointed as the commissioner on cybersecurity for the 44th president, holding a position as a senior fellow at SANS, and being elected to the Purdue University Executive Advisory Board. His extensive real-world experience includes being the former Chief Technology Officer for McAfee, former Chief Scientist at Lockheed Martin, and former Program Manager at the Central Intelligence Agency. Currently, he is the CEO and Founder of Secure Anchor Consulting. His consulting clients include Fortune 500 companies, Fortune 50 companies, international organizations, and the feder...

Jeff M Martin Evidence Solutions, Inc.

Tucson, Arizona
Technology, Telecommunications - Cell Phone Forensics, Call Detail Records, EMR/EHR Forensics, Cell Tower Triangulation, GPS Triangulation, Computer Forensics, Cybersecurity, Data Communications, Data Retrieval & Analysis, Digital Media, Email, GPS Systems, iCloud Data, Information Technology, Internet, Software, Malware Analyst
Jeff Martin is a Digital Forensics Expert specializing in Cell Phone Forensics, Black Box/EDR Forensics, Cybersecurity, EMR/EHR Forensics, Audio/Video/Imagery Forensics and more. Jeff has conducted hundreds of digital forensics investigations on cases involving the acquisition, preservation, and analysis of data in legal disputes in both state and federal courts. Jeff is a certified digital forensics examiner with over 15 years of experience. He initially made a mark as a small business IT consultant, lauded for his knack for simplifying technical information to non-technical audiences. Following a successful decade as the Director of Information Technology & Security in the Financial Industry, he earned the Certified Credit Union Executive (CCUE) certification after attending the Credit Union National Association’s (CUNA) Management School. Jeff then applied his passion for technology to solving crimes as a Digital Forensics Analyst for the Michigan State Police. Today, Jeff is...

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Arizona
Computers, Cybersecurity - Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I am an information security and digital forensics practitioner with significant experience in eDiscovery. My most frequent practical contributions in litigation consulting are as follows: • Distinguishing useful ESI from non probative data • Overcoming adverse party’s resistance to producing ESI • Producing ESI with confidence it will be admissible • Delivering concise written reports that clarify rather than confuse • Incorporating digital evidence into the legal strategy • Advising methods that will contain costs and save time for all parties • Served as litigation consultant or expert witness in Arizona, California, Florida, Illinois, Mississippi, Nevada, New Mexico. New York, Texas, and Utah I have six (6) advanced technical certifications: • G2700, GCFA, GPCI, GSEC, CGEIT, GRISC. • These certifications cover information security, information governance, the ISO security standard, compliance, and digital forensics. Additional qualificati...

Jack Bicer Septium

Irvine, California
Cybersecurity, Intellectual Property - Authentication, 2FA, 3FA, Login, Security, Internet, Patents, Litigation, Software, Programming, Fraud, iPhone, Android, Cybersecurity, Account Takeover, Passwords, Mobile, Payments, Smartphones, 2-Factor
Inventor of Mobile Push Login and QR Login. Expert Witness in Login, Authentication (2-Factor/3-Factor/Multi-Factor), Account Hacking, Account Takeovers, Fraudulent Transactions, Cryptocurrency Theft, Forensic Analysis, and Cybersecurity. Software Patent Litigation, Claim Mapping. Assisting attorneys in litigation. I am the inventor of: • Mobile Push Login/Authentication (US Patent 9756042) 2FA/3FA/MFA. The new authentication standard for secure logins – used by Chase, Capital One, Apple, Amazon, Google, Facebook, Microsoft, Okta, OneLogin, Cisco/Duo, CA, LastPass, Oracle, Symantec, and others. Used by millions of users. • QR Login/Authentication (US Patent 8677116) 2FA/3FA/MFA.Used by Citibank, Amazon, Apple, Facebook, Google, Microsoft, PayPal, Twitter, Visa, and others. • Mobile Browser 1-Click Login/Authentication ( (US Patent 9015813) 2FA/3FA/MFA. • Automatic Software Updates and Uninstall that run on every computer and every smartphone today, used by trillions of people....

Joseph Greenfield, PhD Maryman & Associates

Los Angeles, California
Computers, Information Technology - Digital Forensics, Computer Forensics, Electronic Evidence, Electronic Discovery, eDiscovery, Email Analysis, Mobile, Computers, Cybersecurity, Cyber Breach Investigations, Cyber Investigations, Incident Response, DFIR
Dr. Joseph Greenfield is the Vice President and Chief Forensic Examiner at Maryman & Associates and an award-winning educator. He is a renowned computer forensics expert with over 15 years of investigative experience, including cyber breach investigations, employee misconduct, and email recovery and analysis. He has worked over 1000 cases and analyzed over 2000 pieces of digital evidence. His is known for deep forensic analysis while being able to explain technical details to non-technical decision-makers. He has provided expert witness testimony in state, federal, and international legal matters. Dr. Greenfield is also an Associate Professor of Information Technology Practice at the Viterbi School of Engineering at the University of Southern California, where he authored the undergraduate programs in both cybersecurity and digital forensics. In 2014, the Ponemon Institute ranked USC as 6th in the nation for “Best Schools for Cybersecurity” and the highest ranked on the West Coas...

John Horst, CISSP®-ISSAP® Xanesti Technology Services, LLC

San Diego, California
Computers, Cybersecurity - Computer, Digital Forensics, Discovery, Databases, Class Action, Hacking, Breach, Encryption Safe Harbor, Health Care Data, Digital Medical Records, HIPAA, PII
John Horst, CISSP®-ISSAP®, is the Managing Member for Technology and Innovation for Xanesti Technology Services, LLC. John has provided expert information technology consulting across several lines of business such as pharmaceutical development, medical billing, general liability insurance, clinical laboratory systems, mortgage financing, and automotive aftermarket products. John has provided cybersecurity engineering, software development, installation and training, and troubleshooting for 11 years in support of multiple U.S. Navy programs of record, including programs operating at both unclassified and secret levels. John maintains an active national security clearance at the SECRET level. John has taught information technology courses for the University of Phoenix (San Diego and Online campuses) and Coleman University (San Diego) where John pioneered the development of computer game software development instruction, now a core part of the Coleman curriculum. John has also ta...

Jonathan Karchmer, GCFA, GCFE, GCIH iDiscovery Solutions

Costa Mesa, California
Computers, Cybersecurity - Digital Forensics, Data Preservation, Data Analysis
Jonathan is the Manager of Forensics Consulting at iDS and is responsible for the oversight of operational efficiency and project delivery within Forensics – focusing on research, development, and automation of analysis tasks. He has 20 years of experience in managing projects dealing with computer forensic examinations, data breaches and network incidents, ESI collection, processing, and hosting, as well as document review and production. Jonathan has advised counsel in engagements regarding intellectual property and trade secret theft, contractual disputes, electronic document production, FTC second requests, due diligence investigations, embezzlement, harassment, illegal surveillance, network attack/incident handling, and network security auditing. He has also offered sworn testimony in state and federal courts. EDUCATION BS in Management Information Systems, University of Arizona Certifications: GCFA (GIAC Certified Forensic Analyst), GCFE (GIAC Certified Forensic Examiner...

James Vaughn iDiscovery Solutions (iDS)

Costa Mesa, California
Computers, Information Technology - digital forensics, electronic discovery, digital evidence, electronic evidence, computer forensics, cell phone, mobile device, data collection, social media, cloud computing, IT forensics, information governance, cyber security, fake evidence, testimony, forensic investigation, cybersecurity.
Mr. James D. Vaughn, a Managing Director of iDiscovery Solutions (iDS), is a certified, court-recognized expert who has given live testimony in well over 80 cases involving topics such as evidence preservation, documentation of events, and digital forensic methodologies and procedures. Mr. Vaughn has received and maintained several digital forensic certifications over the last 18 years. Mr. Vaughn has trained hundreds of law enforcement officers, attorneys, and other examiners on computer forensics and high technology related issues involving best practices and methodologies. He has 16 years’ law enforcement experience, has codeveloped digital forensic courses for the California Department of Justice, and has been involved in high stakes cases throughout his career. Mr. Vaughn has extensive experience working on litigation and consulting matters in digital forensics, e-Discovery, and other high technology issues. His experience covers Windows, MACs, and mobile device platforms. He s...

Randy A Winters MatrixHCI, LLC

California
Software Engineering, Computers - Cybersecurity, Software Architecture, Artificial Intelligence, Cryptocurrency / Blockchain, Speech & Face Recognition, ESI Protocol, Social Media Forensics, Biometric Identifiers, Code Review, Patent Infringement ,Trade Secret, IPR, PTAB, Claim Analysis, Forensic Data Extraction, BIPA
“Mr. Winters was both helpful and enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, and dedicated in providing feedback and expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - Decades of experience in the industry and holds a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) and has been an expert in many facets of Software Engineering. - In-depth knowledge of and has worked on cases involving user privacy including cases related to the Illinois Biometric Protection Act (BIPA) in relation to speech recognition, face detection & recognition, biometric identifiers & Viola-Jones. - Expert in all cases involving Speech / Facial Recognition including Biometric Identifiers, Voiceprints and the use & storage of user privacy data. - Cybersecurity, Cryptocurrency and Blockchain. - NEW! Forensic Data Extraction / Analysis of smart phones / devices, computers, cloud data, drones...

Jonathan Gibney Southridge Technology

Brookfield, Connecticut
Cybersecurity, Computers - business technology, ransomware, firewall, network, end-user, business continuity, hacking, security, computer, disaster recovery, managed services, cybersecurity, server, virus, IT, email, education
Jonathan Gibney Southridge Technology Co-owner and CEO  With more than 25 years of experience in technology and 8 more in finance, Jonathan Gibney is the co-owner and CEO of Southridge Technology, a leading IT firm and multi-year winner of the Marcum Tech Top 40 Award. He holds a certificate in Cybersecurity from MIT and, as an expert in HIPAA security, Cloud Computing and the use of technology in small and mid-sized businesses, Jonathan has been published in several regional and state dental association professional journals and is a regular conference presenter.

Jonathan E Hochman Hochman Consultants

Cheshire, Connecticut
Internet, Cybersecurity - E-commerce, Ecommerce, SEO, Search Engine Optimization, PPC, Pay Per Click, Web Development, Online Advertising, Internet Marketing, Google Analytics, Google AdWords, Digital Forensics, Internet Security, Mobile Marketing, Mobile Advertising, Patent, Trademark, Reputation Management, Defamation,
Jonathan Hochman serves as consulting and testifying expert for cases related to Internet marketing, e-commerce, website development, digital forensics, search engine optimization (SEO), pay-per-click (PPC) advertising, mobile advertising, and digital advertising. Since 2007 he has provided expert witness services to plaintiffs and defendants alike for disputes involving trademarks, patents, trade secrets, copyrights, contracts, defamation and online reputation, unfair competition, conspiracy and fraud. Hochman has testified at eight trials and twenty-three depositions. He has served as a consulting expert in more than fifty cases. His clients are located in the United States, the United Kingdom, Canada, Israel and Romania. A Yale University graduate with two degrees in computer science, Hochman has worked as a sales, marketing and technology consultant for 30 years. After managing several prior businesses, he founded Hochman Consultants in 2004. Then in 2008 Hochman became cha...

Julian Ackert iDiscovery Solutions

Washington, DC, District Of Columbia
Computers, Cybersecurity - Computer Forensics, Structured Data, eDiscovery, Technology Assisted Review, Trade Secrets

Mark D Gianturco, PhD iDS

Washington, District Of Columbia
Software Engineering, Cybersecurity - Software Development Life Cycle, SDLC, Software Plagiarism, Code, Inspection, Trade Secrets, Patents, Trademarks, Technical issues, CTO, CIO, CSO, source code comparison, software inspection.

Dan Regard iDiscovery Solutions

Washington, District Of Columbia
Technology, Cybersecurity - Technology, digital forensics, compliance, cybersecurity, ediscovery, disclosure, information governance, privacy, structured data, analytics, testimony, data identification, information system, data subject access requests, enterprise applications, email archives, software, hardware, investigation
Mr. Regard is an electronic discovery and computer science consultant with 30 years of experience in consulting to legal and corporate entities. A programmer and an attorney by training, Mr. Regard has conducted system investigations, created data collections, and managed discovery on over a thousand matters. He is responsible for the development and implementation of case and matter strategies that leverage technology in litigation and investigations. Mr. Regard has both national and international experience advising on such issues as electronic discovery, computer forensics, structured data, and information management. He is a frequent speaker, teacher, and publisher on issues of electronic discovery. Prior to founding iDiscovery Solutions, Inc. in 2008, Mr. Regard was the national director of e-Discovery for LECG. He was also the national director of Electronic Evidence & Consulting for FTI Consulting and was an electronic discovery and data analytics team leader in Analytical D...

Brad A LaPorte High Tide Advisors

Juno Beach, Florida
Cybersecurity, Information Technology - Gartner, Defamation, Analyst, Ransomware, Endpoint, network, cyber, insurance, hygiene, penetration, testing, malware, computer, breach, managed, risk, vulnerability, crime, threat, attack, hack, forensic, digital, incident response, compliance, audit, identity, cloud, software, patent, trade secret
Brad A. LaPorte is a cybersecurity and IT consultant and currently serving as a founder of High Tide Advisors. He has over 18+ years of experience as a consultant in the cybersecurity industry spanning various industry segments. Prior to joining High Tide Advisors, he served as a top Gartner Research Analyst, including but not limited to the following specialties: security information and event management (“SIEM”), security orchestration, automation, and response (“SOAR”), Threat and Exposure Management, Vulnerability Management, Pen Testing, Cloud Security, managed security service provider (“MSSP”), managed detection and response (“MDR”), endpoint protection platforms/endpoint detection and response (“EPP/EDR”), Extended Detection & Response (“XDR”), Threat Intelligence, Digital Risk Protection, Social Media Protection, and Attack Surface Management. Mr. LaPorte was the lead author of the Gartner Market Guide for Threat Intelligence, Market Guide for Endpoint Detection and Respon...

Randy A Winters MatrixHCI, LLC

Illinois
Software Engineering, Computers - Cybersecurity, Software Architecture, Artificial Intelligence, Cryptocurrency / Blockchain, Speech & Face Recognition, ESI Protocol, Social Media Forensics, Biometric Identifiers, Code Review, Patent Infringement ,Trade Secret, IPR, PTAB, Claim Analysis, Forensic Data Extraction, BIPA
“Mr. Winters was both helpful and enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, and dedicated in providing feedback and expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - Decades of experience in the industry and holds a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) and has been an expert in many facets of Software Engineering. - In-depth knowledge of and has worked on cases involving user privacy including cases related to the Illinois Biometric Protection Act (BIPA) in relation to speech recognition, face detection & recognition, biometric identifiers & Viola-Jones. - Expert in all cases involving Speech / Facial Recognition including Biometric Identifiers, Voiceprints and the use & storage of user privacy data. - Cybersecurity, Cryptocurrency and Blockchain. - NEW! Forensic Data Extraction / Analysis of smart phones / devices, computers, cloud data, drones...

Michael Barr

Germantown, Maryland
Software Engineering, Cybersecurity - embedded systems, operating systems, computer software, automotive electronics, medical devices, industrial automation, computer security, software malfunction, programming languages, reverse engineering, source code review, software quality
Michael Barr is a former adjunct professor of computer engineering with more than twenty-five years of experience in the software industry, including over a decade spent developing software for embedded systems. Software he wrote has powered millions of products. Mr. Barr is the author of three books and more than seventy articles and papers about embedded software design and architecture and is internationally recognized as an expert in the field. He is also a founder of three companies, including Barr Group. In his work as a software expert witness, Mr. Barr has testified more than twenty times before judges and juries in matters ranging from patent infringement and validity to product liability to theft of copyrighted software and trade secrets. He has been qualified in U.S. and Canadian courts as an expert in computer software, electrical engineering, and satellite TV security and piracy.

Bruce Schneier

Cambridge, Massachusetts
Cybersecurity, Information Technology - Cryptography, internet security, denial-of-service attacks, ransomware, social engineering, internet-of-things security, privacy, surveillance, supply chain security, 5G security, blockchain, cryptocurrencies, artificial intelligence security, adversarial machine learning, election security, spyware
Bruce Schneier is an internationally renowned security technologist, called a “security guru” by the Economist. He is the New York Times best-selling author of 14 books -- ­including "A Hacker's Mind" -- ­as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and blog "Schneier on Security" are read by over 250,000 people. Schneier is a fellow at the Berkman-Klein Center for Internet and Society at Harvard University, a Lecturer in Public Policy at the Harvard Kennedy School, a board member of the Electronic Frontier Foundation and AccessNow, and an advisory board member of EPIC and VerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc.

Randy A Winters MatrixHCI, LLC

Massachusetts
Software Engineering, Computers - Cybersecurity, Software Architecture, Artificial Intelligence, Cryptocurrency / Blockchain, Speech & Face Recognition, ESI Protocol, Social Media Forensics, Biometric Identifiers, Code Review, Patent Infringement ,Trade Secret, IPR, PTAB, Claim Analysis, Forensic Data Extraction, BIPA
“Mr. Winters was both helpful and enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, and dedicated in providing feedback and expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - Decades of experience in the industry and holds a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) and has been an expert in many facets of Software Engineering. - In-depth knowledge of and has worked on cases involving user privacy including cases related to the Illinois Biometric Protection Act (BIPA) in relation to speech recognition, face detection & recognition, biometric identifiers & Viola-Jones. - Expert in all cases involving Speech / Facial Recognition including Biometric Identifiers, Voiceprints and the use & storage of user privacy data. - Cybersecurity, Cryptocurrency and Blockchain. - NEW! Forensic Data Extraction / Analysis of smart phones / devices, computers, cloud data, drones...

Stacy R Eldridge, CFCE, GCFE, GSEC, GCCC, LPD Silicon Prairie Cyber Services

Lincoln, Nebraska
Computers, Cybersecurity - Computer Forensics,Digital Forensics,Mobile Forensics,Cell Phone,iPhone,Android,Email,Meta Data,Data Recovery,Deleted Files,Video Analysis,Image Analysis,RAM,Data Loss Prevention, Insider Threat,Cybersecurity,Cybercrime,FBI,Forensic Analysis,Computer Investigation,Criminal Defense,Civil Litigaiton
Stacy Eldridge is a former Senior Forensic Examiner with the FBI, and began her security career 20 years ago in the FBI. Today, she is a leading force behind Silicon Prairie Cyber Services, bringing two decades of digital forensics and cybersecurity expertise to the company. Stacy's services include digital forensics, litigation support, expert witness testimony, cybersecurity consulting and teaching . As a respected educator, she is an Adjunct Professor teaching digital forensics and cybersecurity classes for OSU and Bellevue University while also coaching for IACIS. Stacy's passion goes beyond just finding evidence - it's about understanding it and helping others comprehend its significance. With a keen eye for the truth, Stacy's unwavering dedication to her craft makes her a trusted authority in digital forensics and cybersecurity. Whether it's a complete digital forensics examination, a second opinion, or a report review, Stacy offers a no-nonsense approach to giving you the fa...

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Las Vegas, Nevada
Computers, Cybersecurity - Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I am an information security and digital forensics practitioner with significant experience in eDiscovery. My most frequent practical contributions in litigation consulting are as follows: • Distinguishing useful ESI from non probative data • Overcoming adverse party’s resistance to producing ESI • Producing ESI with confidence it will be admissible • Delivering concise written reports that clarify rather than confuse • Incorporating digital evidence into the legal strategy • Advising methods that will contain costs and save time for all parties • Served as litigation consultant or expert witness in Arizona, California, Florida, Illinois, Mississippi, Nevada, New Mexico. New York, Texas, and Utah I have six (6) advanced technical certifications: • G2700, GCFA, GPCI, GSEC, CGEIT, GRISC. • These certifications cover information security, information governance, the ISO security standard, compliance, and digital forensics. Additional qualificati...

Patrick M. OLeary, MBA, BSEE, CISSP, CEH ExpertWitness.com

Hauppauge, New York
Internet, Information Technology - Computers/IT, Cybersecurity, Internet Forensics, Data Forensics, Internet Expert Witness, Software, MBA, Intellectual Property, Prior Art, Patents, Internet Hosting, Email, World Wide Web (WWW), Internet Litigation, Computer Science, Internet Liability/Damages, Litigation. Support, CISSP, CEH, CHFI
I am an entrepreneur who has been the founder of several different startup companies across a variety of information technology industries yielding me diverse Business, Technical & Internet expertise. I have worked as an Internet Litigation Consultant working for law firms as an Internet Expert Witness. Early business entry, which was a way to pass the time, soon paved my career path. I became the CEO and sole proprietor of MatchMaker.com in 1995. My site generated an adequate amount of revenue, thus being self-funded and be free of any venture capital. By 1999, my company expanded to employ over 30 people and generate more than $7 million every year. When we sold to Lycos in July 2000 for 45 million dollars, the 30 employees expanded to more than 120 people, signifying exponential growth in such a short period. With lots of success and a growth rate of 8% (or greater) per month, MatchMaker.com was designated as the "2nd stickiest website on the internet" by Jupiter Media and was ...

Randy A Winters MatrixHCI, LLC

New York
Software Engineering, Computers - Cybersecurity, Software Architecture, Artificial Intelligence, Cryptocurrency / Blockchain, Speech & Face Recognition, ESI Protocol, Social Media Forensics, Biometric Identifiers, Code Review, Patent Infringement ,Trade Secret, IPR, PTAB, Claim Analysis, Forensic Data Extraction, BIPA
“Mr. Winters was both helpful and enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, and dedicated in providing feedback and expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - Decades of experience in the industry and holds a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) and has been an expert in many facets of Software Engineering. - In-depth knowledge of and has worked on cases involving user privacy including cases related to the Illinois Biometric Protection Act (BIPA) in relation to speech recognition, face detection & recognition, biometric identifiers & Viola-Jones. - Expert in all cases involving Speech / Facial Recognition including Biometric Identifiers, Voiceprints and the use & storage of user privacy data. - Cybersecurity, Cryptocurrency and Blockchain. - NEW! Forensic Data Extraction / Analysis of smart phones / devices, computers, cloud data, drones...

C. Matthew Curtin, CISSP Interhack Corporation

Columbus, Ohio
Computers, Cybersecurity - Data Breach, Security Incident, Information Security, Computer Science, Encryption
C. Matthew Curtin, CISSP is the Founder and CEO of Interhack Corporation. Curtin is Interhack’s lead computer scientist and cybersecurity expert. Curtin has been engaged in criminal, civil, administrative, and military processes by plaintiffs, defendants, and the courts directly. His opinion has been accepted by federal and state courts throughout the country in hearings, trials, and appeals. Curtin and his team help attorneys and executives understand the meaning and context of data and how they affect business, operations, or a legal case. Curtin’s vast knowledge and experience in the field of computer science and cybersecurity enables him to convey the optimal path forward and offer an opinion within a degree of scientific certainty. Curtin’s experience in the field enables him to train his team to operate in specialized task forces organized to respond to high-stakes situations such as data breaches. Curtin's work centers on the intersection of law and technology. The U.S. Cou...

Michael Yasumoto, CFCE, CAWFE, ICMDE, GCFE, GCFA Deadbolt Forensics

Beaverton, Oregon
Computers, Cybersecurity - Trade Secret Theft, Intellectual Property, Computer Forensics, cell phone forensics, Email Forensics, Vehicle Electronics, Digital Forensics, Smartphones, mobile forensics, Meta Data, Data Recovery, Forensic Science, Internet, Technology, Information Technology
Michael Yasumoto has worked on hundreds of cases and has over 1,000 hours of specialized forensic training. He has taught computer and mobile phone forensic classes to both US and foreign law enforcement as well as the military. His civil practice is primarily focused on two case types. 1. Employees accused of copying or retaining confidential data when they exit the company. In some cases, a company device is returned by the employee after it has been erased. Michael's expertise covers preserving and examining the associated data to determine what happened. He has worked for both the plaintiff and defense on these cases. 2. Traffic accidents where a driver could have been interacting with their cell phone at the time of the collision. Michael's expertise covers downloading and examining the phone's data as well as associated Call Detail Records (CDRs) from the wireless carrier. If applicable, he can download the data from the infotainment system in the car and provide a r...

Steven Bergin Cybertek Forensics, Inc.

King of Prussia, Pennsylvania
Cybersecurity, Technology - Digital Forensics, Cell Phones, Call Data Records, Digital Security, Hacking, Intellectual Property, Password Cracking, Mobile Forensics, E-Discovery, Cyber Security, Investigation, Computer Hacking
Experienced military veteran and IT Specialist in Digital Forensics, Network Administration and Management, with a demonstrated history of working in the U.S. defense industry, Federal law enforcement, military and the financial industry. Skilled in network management, Digital Forensics, Blacklight forensic software, AccessData AD lab forensics software, Internet Evidence Finder (IEF), Griffeye modular digital investigation platform, Cellibrite UFED 4PC mobile device forensics, evidence collection and chain of custody procedures, write-blocking forensic imaging hardware tools. Strong professional currently enrolled in a M.S in Digital Forensics program at Champlain College. Holds a B.S. in Communications from Liberty University and a A.S. focused on Information Systems Technology from Community College of the United States Air Force. Certificates & Training & Navy Awards o AccessData Certified Examiner (ACE), 2016 o CompTIA Security + certification, 2009 o Cyber Systems Operation...

Shawn H. Malone, CISSP, CTPRP, CTPRA Security Diligence, LLC

Reading, Pennsylvania
Cybersecurity, Information Technology - Third Party Vendor Management, Third Party Security Assessments, Vendor Security Assessments, Cybersecurity Risk Management, Cybersecurity Programs, Cybersecurity Governance, Cybersecurity Regulatory Compliance, Information Security Programs, Information Security Policies, Data Security Compliance
Award winning information security and cyber risk expert. Thirty-five years of experience including secure communications systems, network security, data protection, security program management, policy development, compliance oversight, cybersecurity assessments and third party risk management. Delivery of cybersecurity solutions and third party risk management programs in the financial services/insurance, consulting/advisory and defense industries. Degrees in electrical engineering technology and network security. Co-developed industry leading Third Party Risk Management professional certification. Certified Information Systems Security Professional (CISSP), Certified Third Party Risk Professional (CTPRP) and Certified Third-Party Risk Assessor (CTPRA). Experienced public speaker and trainer.

Paul Sibenik

Pittsburgh, Pennsylvania
Cryptocurrency, Securities & Investments - blockchain, bitcoin, blockchain forensics, hacks, theft, fraud, pig butchering, embezzlement, ransomware, ethereum, crypto, SIM Swaps, embezzlement, compliance, cybersecurity, cryptocurrency tracking, cryptocurrency tracing, staking, NFTs, ponzi schemes, smart contracts
Paul Sibenik is a blockchain forensics and cryptocurrency tracing expert. He frequently conducts investigations in a range of niches, including cryptocurrency hacks, exploits, vulnerabilities, thefts, fraud, SIM Hijacking, fraud, ransomware, embezzlement, and pig butchering scams. Tracking cryptocurrency such as Bitcoin and Ethereum often plays a critical role in his investigations. Additionally, Paul has been appointed as an expert in many civil disputes, including bankruptcy divorce matters, having worked on more than 100 cases involving cryptocurrency in divorce alone. He has also frequently been asked to open on matters related to Anti-money laundering (AML), compliance, cybersecurity, NFTs, and staking.

Brad A LaPorte High Tide Advisors

Rhode Island
Cybersecurity, Information Technology - Gartner, Defamation, Analyst, Ransomware, Endpoint, network, cyber, insurance, hygiene, penetration, testing, malware, computer, breach, managed, risk, vulnerability, crime, threat, attack, hack, forensic, digital, incident response, compliance, audit, identity, cloud, software, patent, trade secret
Brad A. LaPorte is a cybersecurity and IT consultant and currently serving as a founder of High Tide Advisors. He has over 18+ years of experience as a consultant in the cybersecurity industry spanning various industry segments. Prior to joining High Tide Advisors, he served as a top Gartner Research Analyst, including but not limited to the following specialties: security information and event management (“SIEM”), security orchestration, automation, and response (“SOAR”), Threat and Exposure Management, Vulnerability Management, Pen Testing, Cloud Security, managed security service provider (“MSSP”), managed detection and response (“MDR”), endpoint protection platforms/endpoint detection and response (“EPP/EDR”), Extended Detection & Response (“XDR”), Threat Intelligence, Digital Risk Protection, Social Media Protection, and Attack Surface Management. Mr. LaPorte was the lead author of the Gartner Market Guide for Threat Intelligence, Market Guide for Endpoint Detection and Respon...

Randy A Winters MatrixHCI, LLC

Saint George, Utah
Software Engineering, Computers - Cybersecurity, Software Architecture, Artificial Intelligence, Cryptocurrency / Blockchain, Speech & Face Recognition, ESI Protocol, Social Media Forensics, Biometric Identifiers, Code Review, Patent Infringement ,Trade Secret, IPR, PTAB, Claim Analysis, Forensic Data Extraction, BIPA
“Mr. Winters was both helpful and enjoyable to work with in a class action about biometric information. He was prepared, thoughtful, and dedicated in providing feedback and expertise.” Randall K. Pulliam Sam Jackson Carney Bates & Pulliam, PLLC - Decades of experience in the industry and holds a recent (2002) Master’s Degree in Software Engineering from Carnegie Mellon University (CMU) and has been an expert in many facets of Software Engineering. - In-depth knowledge of and has worked on cases involving user privacy including cases related to the Illinois Biometric Protection Act (BIPA) in relation to speech recognition, face detection & recognition, biometric identifiers & Viola-Jones. - Expert in all cases involving Speech / Facial Recognition including Biometric Identifiers, Voiceprints and the use & storage of user privacy data. - Cybersecurity, Cryptocurrency and Blockchain. - NEW! Forensic Data Extraction / Analysis of smart phones / devices, computers, cloud data, drones...

Eric Cole Secure Anchor Consulting

Ashburn, Virginia
Cybersecurity, Computers - Computer Forensics, Computer Investigations, Computer Security, Cyber Breach, Intellectual Property, Loss Prevention, Network Security, Security Management, Security Negligence, Trade Secrets, Security Standards, Data Privacy, Cloud Security, Patents, Apportionment, Infringement, Damages, Meta Data
Dr. Eric Cole is a computer and cybersecurity expert who has built a solid reputation in the information technology industry over the last three decades. His educational experience includes a master’s degree in computer science from the New York Institute of Technology, and a doctorate in Professional Studies from Pace University. Dr. Cole’s expert involvement in the cybersecurity industry is demonstrated by being appointed as the commissioner on cybersecurity for the 44th president, holding a position as a senior fellow at SANS, and being elected to the Purdue University Executive Advisory Board. His extensive real-world experience includes being the former Chief Technology Officer for McAfee, former Chief Scientist at Lockheed Martin, and former Program Manager at the Central Intelligence Agency. Currently, he is the CEO and Founder of Secure Anchor Consulting. His consulting clients include Fortune 500 companies, Fortune 50 companies, international organizations, and the feder...
You can also find Cybersecurity Expert Witnesses in:
District Of Columbia, Maryland, Pennsylvania, California, Virginia, Ohio, Nebraska, Connecticut, Florida, Massachusetts, Nevada, and Oregon