COVID-19 has led to an influx of remote working arrangements, including expanded video conferencing usage. As such, cyber security is increasingly top of mind as everyday operations rely on internet-based solutions now more than ever. This has also revealed weaknesses in cyber security which puts personal data and online privacy at risk. As you prepare to litigate cyber security-related cases in the coronavirus age, it’s critical to consult with a cyber security expert witness who can opine on the technical aspects of the digital technology landscape.Â
A cyber security expert witness can discuss:
Security vulnerabilities within popular video conferencing platforms
Technical software security specifications
Implications of misleading terms of service
Industry standards of data encryption
You can also contact our team to initiate a custom search for the perfect expert.
This expert is highly experienced in the area of IT and offshore outsourcing, with expertise in all aspects of outsourcing such as strategy, provider capabilities, provider selection, outsourcing contracts, BPO, and cybersecurity. He earned his BA in liberal arts from Northwestern State University of Louisiana and began his career with Electronic Data Systems, serving as a sales executive, industry vice president, and a strategic business unit sales and marketing ...
This highly qualified expert has over 20 years of experience in computer security, digital forensics, and digital currency, such as Bitcoin and Ethereum. He earned his BS in computer science and his MS in data communications networks and distributed systems from the University College London. In addition, this expert holds 3 patents and has published 7 books involving digital currency and bitcoin. He has held several roles throughout his career including being an IT ...
This highly credentialed cryptocurrency and blockchain expert graduated from the American Military University and has experience working in both the public and private sectors. He earned his BA from the American Military University and is a certified Blockchain and Law Professional, Bitcoin Professional, and Chainalysis Reactor Professional. He previously served as an operations coordinator for various companies and as the director of defense and the bureau of ...
This well-credentialed expert has 25 years of experience as a technologist with experience in government and finance with specific cybersecurity domain expertise as a CTO, CISO, and systems architect. He is skilled in cybersecurity, compliance, computer and data forensics, data and log analysis, evidence extraction, electronic discovery, network security, hacker breach detection, and evidence gathering. Formerly, he has served as a senior architect for TrueCar, a senior ...
This highly qualified expert has over 20 years of experience in cyber law and security and is a practicing attorney. He earned his BS and MS in information systems from the University of Alabama and Grantham University. This expert then went on to earn his JD from Birmingham Law School and complete two PhD programs: one in management from Walden University and the other in business administration from Northcentral University. He is a member of the privacy and computer ...
This expert has nearly 30 years of experience in data architecture, pre and post-incident attack reconciliation and AML auditing data. He is a senior AML security architect, cube designer, CISSP STIG auditor, Microsoft certified trainer, SQL SSAS Expert, CAMS+FCI Certified Anti-Money Laundering instructor and specializes in data security reconciliation and analysis. He is also an advisory board member for the Cybersecurity for Business program at a university in South ...
This highly qualified financial services technology expert has over 35 years of professional experience. His expertise includes systems development, integration, infrastructure, information security and operations in the trading, investment, banking, and asset management businesses. He earned his BS in computer science from the City University of New York and is a graduate of the ABA Stonier Graduate School of Banking at Georgetown University. He holds certifications as ...
This highly-qualified expert has extensive experience as a computer engineer in the areas of cybersecurity, network forensics, and encryption. He earned both his BS in information technology and MS in management of secure information systems from George Mason University. He holds several certifications, including information systems security professional, EC-Council ethical hacker, Microsoft enterprise support technician, and SonicWall network security essentials ...
This qualified expert has extensive experience in cyber security and incident response. He earned his BS in management of information systems from Albertus Magnus College and is currently pursuing a Master's in digital investigations from Champlain College. This expert is a certified information systems security professional. He began his career at Yale University, serving as an information security analyst and a senior information security officer. He then went on to ...
This qualified expert has extensive experience in his field, holding 15 computer technology-related certifications. He earned his BS in computer systems networking & telecommunications from Florida State College and is currently in pursuit of his MS in digital forensics at the University of Central Florida. He is active in his field as a member of the High Technology Crime Investigation Association. He has formerly served as a desktop support engineer for Sea Star Line, ...
This expert has over 15 years of experience in cybersecurity. He received his BA in applied mathematics from UC Berkeley and his MS in applied and computational mathematics from Johns Hopkins University. He also earned his MBA in entrepreneurship from the University of Maryland. He is a certified information systems security professional. For many years, this expert worked for the NSA in varying roles. He began as a software and electrical engineer in the engineering ...
This certified cyber security expert has over 25 years' experience in the global digital technology industry having spent the early years of her career as a software developer before working as a management consultant. She earned her post graduate diploma in e-commerce, economics, and technology at the University of London and a graduate diploma in law at University of Westminster. She has been a registered Information security auditor with International Register of ...
This case involves a wealthy female banking professional from Connecticut who was charged with filing false tax returns and identity theft. It was alleged that the woman in question bypassed the authentication procedures in the electronic tax return filing process to direct refunds…
This case involves a woman whose roommate accessed and shared her sensitive medical records without her consent. Leading up to the event, the woman and her roommate had gotten into a dispute. Because of this dispute, the roommate vengefully logged…
This case involves a construction company that utilized an online banking program for its weekly payroll. At the time that the company became a customer, the bank used an information security system that required customers to answer “challenge questions” for all transfers over…
This case involves a patent that was issued to the plaintiff in the early 2000’s for controlling and mediating access to the internet from private computer networks. The patent described a number of different features that enabled network administrators to…
Case: United States Gypsum Co. v. Lafarge North Am. Inc., 670 F. Supp. 2d 768 (N.D. Ill. 2009) Background:Â Plaintiff United States Gypsum Company (“USG”) claimed that Defendants Lafarge North America, Inc. (“Lafarge”), and several Lafarge employees, infringed USG’s patents and…
A computer engineering and computer electronics expert witness advises on a case involving the alleged tampering of electronic medical records (EMR) arising out of a medical malpractice claim. The issue involves whether or not a referral was made to a…