Computer Security Expert Witnesses

Computers & Technology Expert Witness Listings

Find computer security experts and consultants by clicking on one of the following links. Computer security experts found on this page may consult regarding network security, network forensics, computer crime, data security, and computer forensics. These experts may provide reports concerning computer security intrusions, hacking, and computer security policies. They may also opine on issues regarding secure computing, the risk of inappropriate data, and the risk of application subversion, among other topics.

You may limit your search for Computer Security expert witnesses to a specific area by selecting a state from the drop down box.

Expert Witnesses

List Your Qualifications by Clicking Here

Featured Experts
Shawn H. Malone, CISSP, CTPRP, CTPRA (Security Diligence, LLC)
Award winning information security and cyber risk expert. Thirty-five years of experience including secure communications systems, network security, data protection, security program management, policy development, compliance oversight, cybersecurity... Learn More ›

Sam Malek, PhD (Cyberonix)
Sam Malek is a Software Engineering Professor in the Informatics Department within the School of Information and Computer Sciences at the University of California, Irvine. His research is in the field of software engineering, and to date his focus has... Learn More ›

Eric B. Cole
A computer and cybersecurity expert witness with over 30 years of hands-on experience, Dr. Cole is an expert witness in information technology with a focus on cybersecurity. Dr. Cole works on a wide range of cases, including IP litigation (IPR, PGR,... Learn More ›

Jae Young Bang (Quandary Peak Research)
Dr. Jae Young Bang is director of software development and software technology consultant with over a decade of experience in software engineering. He has a diverse background ranging from academic research in software architecture to leading-edge software... Learn More ›
Steven G Burgess (Burgess Consulting and Forensics)
Location: California
Areas of Expertise: Burgess Forensics offers Digital / Computer and Mobile Forensics & Electronic Discovery and Expert Witness Testimony - since 1985. Burgess offers Macintosh Digital Forensics, Windows Digital Forensics,...
C. Matthew Curtin (Interhack)
Location: Ohio
Areas of Expertise: C. Matthew Curtin, CISSP is the Founder and CEO of Interhack Corporation. Curtin is Interhack’s lead computer scientist and cybersecurity expert. Curtin has been engaged in criminal, civil, administrative,...
Tal Lavian, Ph.D. (TelecommNet - Telecommunications, Network Communications, Mobile Wireless, Internet Protocols)
Location: California
Areas of Expertise: Dr. Lavian is an expert in telecommunications, network communications, mobile wireless, and Internet protocols. He holds a Ph.D. from the University of California, Berkeley, specializing in networking...
Consolidated Consultants
Location: Multiple Locations
Areas of Expertise: Consolidated Consultants (CCc) continues to deliver high quality expert witness and medical expert witness referrals nationwide since 1995. CCc is the only referral service where you can view the full,...
Greg Crouse
Location: Texas
Areas of Expertise: Technical Expert Witness - Technology Intellectual Property and Systems Implementation Greg Crouse has spent nearly 30 years in the trenches implementing large technology systems all over the world....
Richard M Marshall (Concept Gap Ltd)
Location: Scotland
Areas of Expertise: Software and data are ubiquitous, with every organization now dependent on ever more complex digital infrastructure. AI is being infused into every product and service, dramatically increasing that complexity...
Leon A. Kappelman, PhD (Solutions-Organizations-Systems, Inc.)
Location: Texas
Areas of Expertise: Professor Leon A. Kappelman, Ph.D. is a research scientist, teacher, author, speaker, and adviser dedicated to helping organizations and individuals better manage their information, technology, human,...
Jack Bicer (Septium)
Location: California
Areas of Expertise: Inventor of Mobile Push Login and QR Login. Expert Witness in Login, Authentication (2-Factor/3-Factor/Multi-Factor), Account Hacking, Account Takeovers, Fraudulent Transactions, Cryptocurrency Theft,...
Alec Yasinsac
Location: Alabama
Areas of Expertise: As a long time cybersecurity research scientist and voting systems security specialist, my primary consulting area is elections security and integrity. My background includes formal, detailed systems review...
Brian A. Berg (Berg Software Design)
Location: California
Areas of Expertise: Brian Berg has extensive experience with consumer electronics, including data storage devices and interfaces, e.g., Flash Memory, Solid State Disks (SSDs), Disk, Tape, Optical Storage (CD, CD-ROM, DVD,...
Michael Barr (Barr Group)
Location: Maryland
Areas of Expertise: Michael Barr is a former adjunct professor of computer engineering with more than twenty-five years of experience in the software industry, including over a decade spent developing software for embedded...
Paul Sibenik (Cryptoforensic Investigators)
Location: Pennsylvania
Areas of Expertise: Paul Sibenik is a blockchain forensics and cryptocurrency tracing expert. He frequently conducts investigations in a range of niches, including cryptocurrency hacks, exploits, vulnerabilities, thefts,...
Chris Cordoba (Medsurity Experts)
Location: Florida
Areas of Expertise: Digital Forensic Expert Witness: Technology, Telecommunications, Cell Phone Forensics, Digital evidence, Digital Forensics, Technology, EDR, ECM, EMR (Electronic Medical Records), Triangulation, EHR,Investigation,...
Anthony Wechselberger (Entropy Management Solutions)
Location: California
Areas of Expertise: BROADBAND & MULTIMEDIA CONSULTING & EXPERT WITNESS SERVICES Specializing in broadband, multimedia and associated technologies, infrastructures and commercial environments, Mr. Wechselberger brings thirty...
Ivan Zatkovich (eCompCONSULTANTS)
Location: Florida
Areas of Expertise: Internet, telecommunications & information technology specialists for intellectual property consulting and patent litigation including web commerce technologies, web marketing disputes, internet copyright,...
William Luk (Quandary Peak Research)
Location: California
Areas of Expertise: William Luk is a software expert and technical executive with more than 20 years of experience in computer and network security. William has developed or led product teams to develop enterprise class firewall,...
Scott Greene (Evidence Solutions, Inc.)
Location: Multiple Locations
Areas of Expertise: For over 35 years, Scott Greene has been helping business owners, CEOs, managers and IT Departments understand data. Scott Collects, Analyzes, and Explains Complex Electronic Evidence in Plain English. He...
Joseph Greenfield (Maryman & Associates Inc.)
Location: California
Areas of Expertise: I am the Vice President and Chief Forensic Examiner with Maryman & Associates, with over 15 years of investigative experience, including cyber breach investigations, employee misconduct, and email recovery...
Gordon MacKay (Quandary Peak Research)
Location: California and Texas
Areas of Expertise: I am a software and systems expert and technical executive with more than 25 years of experience in computer, telecommunications, network security, and SaaS/Cloud platforms. I have led development and...
ForensisGroup, Inc. (The Expert of Experts)
Location: Multiple Locations
Areas of Expertise: For over 30 years, ForensisGroup has provided the nation’s top law firms, businesses, insurance companies, government entities with highly qualified expert witnesses and consultants. Experts referred by...
steve novak (Bay2Sierra)
Location: California
Areas of Expertise: Mr Novak has 30 years of experience working in the digital design and verification of ASIC/FPGA and other custom digital designs. : Mr Novak is a strong technical and business leader for entire Digital...
George Edwards (Quandary Peak Research)
Location: California
Areas of Expertise: Dr. Edwards is an expert in computer software, Internet applications, web technologies, wireless and mobile devices, digital video and multimedia, and GPS and mapping systems, and he has testified both...
Todd Stefan (Setec Investigations)
Location: California
Areas of Expertise: Setec Investigations offers unparalleled expertise in computer forensics and electronic discovery, providing highly personalized, case-specific forensic analysis and litigation support services to assist...
Bryan Neumeister (USAForensic, LLC)
Location: Michigan
Areas of Expertise: Court Certified (Federal, State, Military, US District, Civil & Aviation) Audio, Video, Computer, Cell Phone & Cell Tower experts. Full-time labs in Phoenix & Detroit available 7 days a week. Since...
Steven Bergin (Cybertek Forensics, Inc.)
Location: Pennsylvania
Areas of Expertise: Steve Bergin is an experienced military veteran and IT Specialist in Digital Forensics, Network Administration and Management, with a demonstrated history of working in the U.S. defense industry, Federal...
Chuck Easttom
Location: Texas
Areas of Expertise: Dr. Easttom has 30 years of computer industry experience,a doctorate (D.Sc.) in cyber security (dissertation topic: "A Comparative Study Of Lattice Based Algorithms For Post Quantum Computing"), a doctorate...
Computer Security FAQs

What is a computer security expert witness?

A computer security expert witness are usually called upon to testify in court cases involving issues such hacking, data security, and computer forensics. They may also be asked to provide expert opinion on computer security matters for news stories or other media reports.

What is the role of a computer security expert witness?

The role of a computer security expert witness is to provide expertise on matters related to securing computer systems and data against unauthorized access, theft, or damage.

How much can a person make as a computer security expert witness?

Computer security expert witnesses may be compensated between $200 and $425 per hour, or higher, depending on the type of case and the work the expert is asked to perform.

What are the qualifications of a computer security expert witness?

Logistics/freight forwarding expert witnesses should have experience in supply chain management, transportation logistics, and international trade.

What type of evidence is gathered in a legal proceeding by a computer security expert witness?

A computer security expert witness may gather digital evidence such as logs, metadata, and network traffic to support their testimony in a legal proceeding.

In what type of cases would there be testimony from a computer security expert witness?

Computer security expert witnesses may provide testimony in cases involving cybercrime, data breaches, hacking, network security, digital forensics, and other technology-related legal disputes.