COVID-19 has led to an influx of remote working arrangements, including expanded video conferencing usage. As such, cyber security is increasingly top of mind as everyday operations rely on internet-based solutions now more than ever. This has also revealed weaknesses in cyber security which puts personal data and online privacy at risk. As you prepare to litigate cyber security-related cases in the coronavirus age, it’s critical to consult with a cyber security expert witness who can opine on the technical aspects of the digital technology landscape.Â
A cyber security expert witness can discuss:
Security vulnerabilities within popular video conferencing platforms
Technical software security specifications
Implications of misleading terms of service
Industry standards of data encryption
You can also contact our team to initiate a custom search for the perfect expert.
This expert is highly experienced in the area of IT and offshore outsourcing, with expertise in all aspects of outsourcing such as strategy, provider capabilities, provider selection, outsourcing contracts, BPO, and cybersecurity. He earned his BA in liberal arts from Northwestern State University of Louisiana and began his career with Electronic Data Systems, serving as a sales executive, industry vice president, and a strategic business unit sales and marketing ...
This highly qualified expert has over 20 years of experience in computer security, digital forensics, and digital currency, such as Bitcoin and Ethereum. He earned his BS in computer science and his MS in data communications networks and distributed systems from the University College London. In addition, this expert holds 3 patents and has published 7 books involving digital currency and bitcoin. He has held several roles throughout his career including being an IT ...
This highly credentialed cryptocurrency and blockchain expert graduated from the American Military University and has experience working in both the public and private sectors. He earned his BA from the American Military University and is a certified Blockchain and Law Professional, Bitcoin Professional, and Chainalysis Reactor Professional. He previously served as an operations coordinator for various companies and as the director of defense and the bureau of ...
This well-credentialed expert has 25 years of experience as a technologist with experience in government and finance with specific cybersecurity domain expertise as a CTO, CISO, and systems architect. He is skilled in cybersecurity, compliance, computer and data forensics, data and log analysis, evidence extraction, electronic discovery, network security, hacker breach detection, and evidence gathering. Formerly, he has served as a senior architect for TrueCar, a senior ...
This highly qualified expert has over 20 years of experience in cyber law and security and is a practicing attorney. He earned his BS and MS in information systems from the University of Alabama and Grantham University. This expert then went on to earn his JD from Birmingham Law School and complete two PhD programs: one in management from Walden University and the other in business administration from Northcentral University. He is a member of the privacy and computer ...
This expert has nearly 30 years of experience in data architecture, pre and post-incident attack reconciliation and AML auditing data. He is a senior AML security architect, cube designer, CISSP STIG auditor, Microsoft certified trainer, SQL SSAS Expert, CAMS+FCI Certified Anti-Money Laundering instructor and specializes in data security reconciliation and analysis. He is also an advisory board member for the Cybersecurity for Business program at a university in South ...
This highly qualified financial services technology expert has over 35 years of professional experience. His expertise includes systems development, integration, infrastructure, information security and operations in the trading, investment, banking, and asset management businesses. He earned his BS in computer science from the City University of New York and is a graduate of the ABA Stonier Graduate School of Banking at Georgetown University. He holds certifications as ...
This highly-qualified expert has extensive experience as a computer engineer in the areas of cybersecurity, network forensics, and encryption. He earned both his BS in information technology and MS in management of secure information systems from George Mason University. He holds several certifications, including information systems security professional, EC-Council ethical hacker, Microsoft enterprise support technician, and SonicWall network security essentials ...
This qualified expert has extensive experience in cyber security and incident response. He earned his BS in management of information systems from Albertus Magnus College and is currently pursuing a Master's in digital investigations from Champlain College. This expert is a certified information systems security professional. He began his career at Yale University, serving as an information security analyst and a senior information security officer. He then went on to ...
This qualified expert has extensive experience in his field, holding 15 computer technology-related certifications. He earned his BS in computer systems networking & telecommunications from Florida State College and is currently in pursuit of his MS in digital forensics at the University of Central Florida. He is active in his field as a member of the High Technology Crime Investigation Association. He has formerly served as a desktop support engineer for Sea Star Line, ...
This expert has over 15 years of experience in cybersecurity. He received his BA in applied mathematics from UC Berkeley and his MS in applied and computational mathematics from Johns Hopkins University. He also earned his MBA in entrepreneurship from the University of Maryland. He is a certified information systems security professional. For many years, this expert worked for the NSA in varying roles. He began as a software and electrical engineer in the engineering ...
This certified cyber security expert has over 25 years' experience in the global digital technology industry having spent the early years of her career as a software developer before working as a management consultant. She earned her post graduate diploma in e-commerce, economics, and technology at the University of London and a graduate diploma in law at University of Westminster. She has been a registered Information security auditor with International Register of ...
Hackers were able to access customer account information, including controlling trades and account funds. Given the sensitive information at stake and the delay in addressing the severity of the hack, the company could soon face lawsuits from impacted users and…
The UCLA Health System class action was filed against the University of California, Los Angeles, after a data breach put the private information of 4.5 million patients in jeopardy. The lawsuit, filed in the Los Angeles County Superior Court, states the UCLA…
A major breach in the digital security of many automobiles has allowed hackers to access critical systems and controls, posing a significant danger to the public. In response, a car hacking class action lawsuit has been filed on behalf of consumers…
Court: United States District Court for the Southern District of Florida Jurisdiction: Federal Case Name: Nat’l Union Fire Ins. Co. v. Tyco Integrated Sec., LLC Citation: 2015 U.S. Dist. LEXIS 193807 Following a security system breach and burglary, the plaintiff…
This case involves a smartphone company’s announcement that its new device came equipped with hard disc encryption enabled by default. It was further announced that phone users would not keep the key to decrypt these devices. It was alleged that…
This case involves a company that runs a cryptocurrency exchange. A large number of the site’s users fell victim to a phishing scheme and alleged that the site administrators failed to implement proper security protocols that would have prevented such…
This case involves a defendant clothing company that was sued by an online retailer. The retailer sold their goods several online marketplaces and hired an individual to search online marketplaces for counterfeit merchandise. At one point, this individual accidentally reported…
This case involves a group of couples and individuals that were recorded in their hotel rooms in Colorado without their consent. After a woman discovered a hidden camera in the desk of her room, the hotel launched an internal investigation to determine the origin of…
This class action case involves customers of a telecommunications company that had their payment card data and other personally identifiable information stolen by computer hackers. It was alleged that the company failed to upgrade their payment systems to use EMV…
This case involves a large computer software company accused of violating the Foreign Corrupt Practices Act (FCPA). It was alleged that the company in question restructured its cybersecurity systems to prevent the detection of questionable payments. A group of employees came…
This case involves a firm that developed a bid on an upgrade project for a commercial real estate property. They had conducted extensive research on the property, including several site visits, to learn about the circumstances of the property before…
This case involves an ongoing dispute between an employee and her direct supervisor. The employee had been her supervisor’s subordinate for 6 years and the two had developed a contentious working relationship. The supervisor secretly requested that an entry-level IT worker begin…