This expert has nearly 35 years of experience in the prevention of cyber crime and identity theft. Among the top consumer security and identity theft experts, he has worked with financial firms, governments, intellegence organizations, and Fortune 500 companies on identity theft education and prevention. He has acted as advisor to numerous security firms, including Check Point, Websense, Ntru...
This expert has nearly 30 years of experience in data architecture, pre and post-incident attack reconciliation and AML auditing data. He is a senior AML security architect, cube designer, CISSP STIG auditor, Microsoft certified trainer, SQL SSAS Expert, CAMS+FCI Certified Anti-Money Laundering instructor and specializes in data security reconciliation and analysis. He is also an advisory board...
This highly-qualified expert has extensive experience in cyber law, risk management, and insurance, as well as data breach response and e-commerce. He earned his BA from Gonzaga University, his JD from Washington University School of Law, and his LLM in cyber and telecommunications law from the University of Nebraska. Today, this expert is a practicing attorney who specializes in cyber law and...
This highly qualified expert has over 20 years of experience in cyber law and security and is a practicing attorney. He earned his BS and MS in information systems from the University of Alabama and Grantham University. This expert then went on to earn his JD from Birmingham Law School and complete two PhD programs: one in management from Walden University and the other in business administration...
Published on - November 5, 2020
Stock trading and investing app, Robinhood, recently admitted that nearly 2,000 brokerage accounts were compromised in a data breach—two weeks after...Read more
Published on - September 10, 2020
Now, more than ever, people are reliant on the internet to communicate with each other and retain some level of normalcy in an uncertain time. From...Read more
Published on - February 15, 2016
Published on - March 7, 2017
This case involves a patent that was issued to the plaintiff in the early 2000’s for controlling and mediating access to the internet from private...Read more
Published on - August 29, 2017
This case involves a data security breach at an electric grid in Arkansas, which was eventually traced to an aspiring hacker who undermined the grid...Read more
Published on - January 23, 2018
This case involves a graduate student at a prominent school who had access to his school’s computers through a student computer account. The student...Read more
Published on - June 26, 2018
This case involves a wealthy female banking professional from Connecticut who was charged with filing false tax returns and identity theft. It was...Read more