Computer Security Expert Witnesses

Computers & Technology Expert Witness Listings

Find computer security experts and consultants by clicking on one of the following links. Computer security experts found on this page may consult regarding network security, network forensics, computer crime, data security, and computer forensics. These experts may provide reports concerning computer security intrusions, hacking, and computer security policies. They may also opine on issues regarding secure computing, the risk of inappropriate data, and the risk of application subversion, among other topics.

You may limit your search for Computer Security expert witnesses to a specific area by selecting a state from the drop down box.

Expert Witnesses

List Your Qualifications by Clicking Here

Featured Experts
Shawn H. Malone, CISSP, CTPRP, CTPRA (Security Diligence, LLC)
Award winning information security and cyber risk expert. Thirty-five years of experience including secure communications systems, network security, data protection, security program management, policy development, compliance oversight, cybersecurity... Learn More ›

Sam Malek, PhD (Cyberonix)
Sam Malek is a Software Engineering Professor in the Informatics Department within the School of Information and Computer Sciences at the University of California, Irvine. His research is in the field of software engineering, and to date his focus has... Learn More ›

Eric B. Cole
A computer and cybersecurity expert witness with over 30 years of hands-on experience, Dr. Cole is an expert witness in information technology with a focus on cybersecurity. Dr. Cole works on a wide range of cases, including IP litigation (IPR, PGR,... Learn More ›

Michael Barr (Barr Group)
Michael Barr is a former adjunct professor of computer engineering with more than twenty-five years of experience in the software industry, including over a decade spent developing software for embedded systems. Software he wrote has powered millions... Learn More ›

Jae Young Bang, PhD (Quandary Peak Research)
Dr. Jae Young Bang is director of software development and software technology consultant with over a decade of experience in software engineering. He has a diverse background ranging from academic research in software architecture to leading-edge software... Learn More ›
William Luk (Quandary Peak Research)
Location: California
Areas of Expertise: William Luk is a software expert and technical executive with more than 20 years of experience in computer and network security. William has developed or led product teams to develop enterprise class firewall,...
Joseph Greenfield, Ph.D. (Maryman & Associates Inc.)
Location: California
Areas of Expertise: I am the Vice President and Chief Forensic Examiner with Maryman & Associates, with over 15 years of investigative experience, including cyber breach investigations, employee misconduct, and email recovery...
ForensisGroup, Inc. (The Expert of Experts)
Location: Multiple Locations
Areas of Expertise: For over 30 years, ForensisGroup has provided the nation’s top law firms, businesses, insurance companies, government entities with highly qualified expert witnesses and consultants. Experts referred by...
C. Matthew Curtin (Interhack)
Location: Ohio
Areas of Expertise: C. Matthew Curtin, CISSP is the Founder and CEO of Interhack Corporation. Curtin is Interhack’s lead computer scientist and cybersecurity expert. Curtin has been engaged in criminal, civil, administrative,...
Richard M Marshall (Concept Gap Ltd)
Location: Scotland
Areas of Expertise: Software and data are ubiquitous, with every organization now dependent on ever more complex digital infrastructure. AI is being infused into every product and service, dramatically increasing that complexity...
Gordon MacKay (Quandary Peak Research)
Location: California and Texas
Areas of Expertise: I am a software and systems expert and technical executive with more than 30 years of experience in computer, telecommunications, network security, and SaaS/Cloud platforms. I have led development and...
Chris Cordoba (Medsurity Experts)
Location: Florida
Areas of Expertise: Digital Forensic Expert Witness: Technology, Telecommunications, Cell Phone Forensics, Digital evidence, Digital Forensics, Technology, EDR, ECM, EMR (Electronic Medical Records), Triangulation, EHR,Investigation,...
Ivan Zatkovich (eCompCONSULTANTS)
Location: Florida
Areas of Expertise: Internet, telecommunications & information technology specialists for intellectual property consulting and patent litigation including web commerce technologies, web marketing disputes, internet copyright,...
Tal Lavian, Ph.D. (TelecommNet - Telecommunications, Network Communications, Mobile Wireless, Internet Protocols)
Location: California
Areas of Expertise: Telecommunications, network communications, mobile wireless, and Internet protocols expert. Holds a Ph.D. from the University of California, Berkeley, specializing in networking and communications. He...
Steven G Burgess (Burgess Consulting and Forensics)
Location: California
Areas of Expertise: Burgess Forensics offers Digital / Computer and Mobile Forensics & Electronic Discovery and Expert Witness Testimony - since 1985. Burgess offers Macintosh Digital Forensics, Windows Digital Forensics,...
Mehdi Tarrit Mirakhorli
Location: Hawaii
Areas of Expertise: Mehdi Tarrit Mirakhorli is software engineering professor in the department of Information and Computer Sciences at University of Hawaii at Manoa. Prior to that Dr. Mirakhorli served as Kodak Endowed Chair,...
Jack Bicer (Septium)
Location: California
Areas of Expertise: Inventor of Multifactor Authentication (MFA), Mobile Push Login and QR Login. Expert Witness in Login, Authentication (2-Factor/3-Factor/Multifactor), Account Hacking, Account Takeovers, Fraudulent Transactions,...
Jason T Ghetian (Cyber Asset Recovery Experts Inc)
Location: California
Areas of Expertise: Over his 20-year career with the FBI, Jason excelled in investigating cyber-related crimes, including hacking, online stalking, SIM card swapping, business email compromises, phishing, tech support scams,...
Chuck Easttom
Location: Texas
Areas of Expertise: Dr. Easttom has 30 years of computer industry experience,a doctorate (D.Sc.) in cyber security (dissertation topic: "A Comparative Study Of Lattice Based Algorithms For Post Quantum Computing"), a doctorate...
Ugo Buy
Location: Illinois
Areas of Expertise: I have over 30 years specializing in software engineering and programming languages. For the past 10 years I have been involved in investigating mobile app development for native Android, native iOS and...
Anthony Wechselberger (Entropy Management Solutions)
Location: California
Areas of Expertise: BROADBAND & MULTIMEDIA CONSULTING & EXPERT WITNESS SERVICES Specializing in broadband, multimedia and associated technologies, infrastructures and commercial environments, Mr. Wechselberger brings thirty...
Steven Bergin (Cybertek Forensics, Inc.)
Location: Pennsylvania
Areas of Expertise: Steve Bergin is an experienced military veteran and IT Specialist in Digital Forensics, Network Administration and Management, with a demonstrated history of working in the U.S. defense industry, Federal...
Greg Crouse
Location: Texas
Areas of Expertise: Technical Expert Witness - Technology Intellectual Property and Systems Implementation Greg Crouse has spent nearly 30 years in the trenches implementing large technology systems all over the world....
Paul Sibenik (Cryptoforensic Investigators)
Location: Pennsylvania
Areas of Expertise: Paul Sibenik is a blockchain forensics and cryptocurrency tracing expert. He frequently conducts investigations in a range of niches, including cryptocurrency hacks, exploits, vulnerabilities, thefts,...
Bryan Neumeister (USAForensic, LLC)
Location: Michigan
Areas of Expertise: Court Certified (Federal, State, Military, US District, Civil & Aviation) Audio, Video, Computer, Cell Phone & Cell Tower experts. Full-time labs in Phoenix & Detroit available 7 days a week. Since...
Albert Hui (Security Ronin)
Location: England
Areas of Expertise: Albert Hui is a forensic expert witness with expertises covering: • digital forensics (investigation and examination of mobile devices, computers, and other data), • forensic accounting & fraud examination...
Leon A. Kappelman, PhD (Solutions-Organizations-Systems, Inc.)
Location: Texas
Areas of Expertise: Professor Leon A. Kappelman, Ph.D. is a research scientist, teacher, author, speaker, and adviser dedicated to helping organizations and individuals better manage their information, technology, human,...
Todd Stefan (Setec Investigations)
Location: California
Areas of Expertise: Setec Investigations offers unparalleled expertise in computer forensics and electronic discovery, providing highly personalized, case-specific forensic analysis and litigation support services to assist...
Alec Yasinsac
Location: Alabama
Areas of Expertise: As a long time cybersecurity research scientist and voting systems security specialist, my primary consulting area is elections security and integrity. My background includes formal, detailed systems review...
Brian A. Berg (Berg Software Design)
Location: California
Areas of Expertise: Brian Berg has extensive experience with consumer electronics, including data storage devices and interfaces, e.g., Flash Memory, Solid State Disks (SSDs), Disk, Tape, Optical Storage (CD, CD-ROM, DVD,...
George Edwards, PhD (Quandary Peak Research)
Location: California
Areas of Expertise: Dr. George Edwards is an expert in computer software, Internet applications, web technologies, wireless and mobile devices, digital video and multimedia, and GPS and mapping systems, and he has testified...
Consolidated Consultants
Location: Multiple Locations
Areas of Expertise: Consolidated Consultants (CCc) continues to deliver high quality expert witness and medical expert witness referrals nationwide since 1995. CCc is the only referral service where you can view the full,...
steve novak (Bay2Sierra)
Location: California
Areas of Expertise: Mr Novak has 30 years of experience working in the digital design and verification of ASIC/FPGA and other custom digital designs. : Mr Novak is a strong technical and business leader for entire Digital...
Computer Security FAQs

What is a computer security expert witness?

A computer security expert witness are usually called upon to testify in court cases involving issues such hacking, data security, and computer forensics. They may also be asked to provide expert opinion on computer security matters for news stories or other media reports.

What is the role of a computer security expert witness?

The role of a computer security expert witness is to provide expertise on matters related to securing computer systems and data against unauthorized access, theft, or damage.

How much can a person make as a computer security expert witness?

Computer security expert witnesses may be compensated between $200 and $425 per hour, or higher, depending on the type of case and the work the expert is asked to perform.

What are the qualifications of a computer security expert witness?

Logistics/freight forwarding expert witnesses should have experience in supply chain management, transportation logistics, and international trade.

What type of evidence is gathered in a legal proceeding by a computer security expert witness?

A computer security expert witness may gather digital evidence such as logs, metadata, and network traffic to support their testimony in a legal proceeding.

In what type of cases would there be testimony from a computer security expert witness?

Computer security expert witnesses may provide testimony in cases involving cybercrime, data breaches, hacking, network security, digital forensics, and other technology-related legal disputes.