This highly qualified expert has over 20 years of experience in cyber law and security and is a practicing attorney. He earned his BS and MS in information systems from the University of Alabama and Grantham University. This expert then went on to earn his JD from Birmingham Law School and complete two PhD programs: one in management from Walden University and the other in business administration from Northcentral University. He is a member of the privacy and computer ...
This highly-qualified expert has extensive experience in cyber law, risk management, and insurance, as well as data breach response and e-commerce. He earned his BA from Gonzaga University, his JD from Washington University School of Law, and his LLM in cyber and telecommunications law from the University of Nebraska. Today, this expert is a practicing attorney who specializes in cyber law and insurance. Formerly, he served as the director of the Make-A-Wish Montana and ...
This expert has nearly 30 years of experience in data architecture, pre and post-incident attack reconciliation and AML auditing data. He is a senior AML security architect, cube designer, CISSP STIG auditor, Microsoft certified trainer, SQL SSAS Expert, CAMS+FCI Certified Anti-Money Laundering instructor and specializes in data security reconciliation and analysis. He is also an advisory board member for the Cybersecurity for Business program at a university in South ...
This expert has nearly 35 years of experience in the prevention of cyber crime and identity theft. Among the top consumer security and identity theft experts, he has worked with financial firms, governments, intellegence organizations, and Fortune 500 companies on identity theft education and prevention. He has acted as advisor to numerous security firms, including Check Point, Websense, Ntru Cryptosystems, Securify, and SiteLock, as well as several identity protection ...
Hackers were able to access customer account information, including controlling trades and account funds. Given the sensitive information at stake and the delay in addressing the severity of the hack, the company could soon face lawsuits from impacted users and…
Now, more than ever, people are reliant on the internet to communicate with each other and retain some level of normalcy in an uncertain time. From remote work to virtual doctor’s visits, there’s seemingly no facet of our lives that…
Court: United States District Court for the Southern District of Florida Jurisdiction: Federal Case Name: Nat’l Union Fire Ins. Co. v. Tyco Integrated Sec., LLC Citation: 2015 U.S. Dist. LEXIS 193807 Following a security system breach and burglary, the plaintiff…
This case involves a defendant clothing company that was sued by an online retailer. The retailer sold their goods several online marketplaces and hired an individual to search online marketplaces for counterfeit merchandise. At one point, this individual accidentally reported…
This case involves a wealthy female banking professional from Connecticut who was charged with filing false tax returns and identity theft. It was alleged that the woman in question bypassed the authentication procedures in the electronic tax return filing process to direct refunds…
This case involves a graduate student at a prominent school who had access to his school’s computers through a student computer account. The student created a computer spyware program called an “Internet worm” that could exploit the security defects on computer networks. The…
This case involves a construction company that utilized an online banking program for its weekly payroll. At the time that the company became a customer, the bank used an information security system that required customers to answer “challenge questions” for all transfers over…
This case involves a data security breach at an electric grid in Arkansas, which was eventually traced to an aspiring hacker who undermined the grid system’s encrypted firewall protections and was able to access a restricted control level of the…
This case involves a patent that was issued to the plaintiff in the early 2000’s for controlling and mediating access to the internet from private computer networks. The patent described a number of different features that enabled network administrators to…
Case: United States Gypsum Co. v. Lafarge North Am. Inc., 670 F. Supp. 2d 768 (N.D. Ill. 2009) Background:Â Plaintiff United States Gypsum Company (“USG”) claimed that Defendants Lafarge North America, Inc. (“Lafarge”), and several Lafarge employees, infringed USG’s patents and…
Case: Â Â Nucor Corp. v. Bell, 2008 U.S. Dist. LEXIS 86328 (D.S.C. Jan. 11, 2008) Background Plaintiff Nucor, a steel mill, filed suit against defendant Bell, a former employee, and his new company, alleging that defendants misappropriated trade secrets and planned…