Cybersecurity Expert Witnesses

Business, Financial & Marketing Expert Witness Listings

Expert witnesses who may consult and testify on cybersecurity (or cyber security) may be found on this page. Experts found here may consult on issues involving homeland security, trust frameworks, digital identity, identity theft, identity security, encryption devices, cyber crimes, key strokes, hardware security modules (HSM), cloud computing, digital forensics, intrusion detection, malware, phishing, and viruses. They may also opine on network infrastructure, information technology security, cryptographic-related standards payment network compliance requirements, Enterprise Risk Management, cryptography, and data breach, among other topics.

You may limit your search for Cybersecurity expert witnesses to a specific area by selecting a state from the drop down box.

Expert Witnesses

List Your Qualifications by Clicking Here

Featured Experts
Eric B. Cole
A computer and cybersecurity expert witness with over 30 years of hands-on experience, Dr. Cole is an expert witness in information technology with a focus on cybersecurity. Dr. Cole works on a wide range of cases, including IP litigation (IPR, PGR,... Learn More ›

Shawn H. Malone, CISSP, CTPRP, CTPRA (Security Diligence, LLC)
Award winning information security and cyber risk expert. Thirty-five years of experience including secure communications systems, network security, data protection, security program management, policy development, compliance oversight, cybersecurity... Learn More ›

John J. Carney, Esq. (Carney Forensics)
Do you need to recover digital evidence from a cell phone, computer, or online cloud account for an upcoming criminal or civil court case? Do you need to retain an expert witness who can explain findings clearly and factually so a judge, jury, or opposing... Learn More ›

John Horst, CISSP®-ISSAP® (Xanesti Technology Services, LLC)
John Horst, CISSP®-ISSAP®, is the Chief Technology Officer for Xanesti Technology Services, LLC. John has provided expert information technology consulting across several lines of business such as pharmaceutical development, medical billing, general... Learn More ›

Sam Malek, PhD (Cyberonix)
Sam Malek is a Software Engineering Professor in the Informatics Department within the School of Information and Computer Sciences at the University of California, Irvine. His research is in the field of software engineering, and to date his focus has... Learn More ›
Mark Songer, M.S.F.S. (Robson Forensic, Inc.)
Location: Multiple Locations
Areas of Expertise: Forensic Document Examiner Mark Songer is a former FBI Special Agent and FBI Forensic Examiner who specializes in forensic document examinations. He is frequently retained to investigate matters involving...
Michael Barr (Barr Group)
Location: Maryland
Areas of Expertise: Michael Barr is a former adjunct professor of computer engineering with more than twenty-five years of experience in the software industry, including over a decade spent developing software for embedded...
James T Doyle (Jimdoyleengineering llc)
Location: Arizona
Areas of Expertise: Mr Jim Doyle. PE has over 45 years in advanced electronics enginering with the leaders in the industry, Both integrated circuit and printed circuit boards. He has successfully designed and developed numerous...
ForensisGroup, Inc. (The Expert of Experts)
Location: Multiple Locations
Areas of Expertise: For over 30 years, ForensisGroup has provided the nation’s top law firms, businesses, insurance companies, government entities with highly qualified expert witnesses and consultants. Experts referred by...
Chuck Easttom
Location: Texas
Areas of Expertise: Dr. Easttom has 30 years of computer industry experience,a doctorate (D.Sc.) in cyber security (dissertation topic: "A Comparative Study Of Lattice Based Algorithms For Post Quantum Computing"), a doctorate...
Alec Yasinsac
Location: Alabama
Areas of Expertise: As a long time cybersecurity research scientist and voting systems security specialist, my primary consulting area is elections security and integrity. My background includes formal, detailed systems review...
Jack Bicer (Septium)
Location: California
Areas of Expertise: Inventor of Mobile Push Login and QR Login. Expert Witness in Login, Authentication (2-Factor/3-Factor/Multi-Factor), Account Hacking, Account Takeovers, Fraudulent Transactions, Cryptocurrency Theft,...
Paul Sibenik (Cryptoforensic Investigators)
Location: Pennsylvania
Areas of Expertise: Paul Sibenik is a blockchain forensics and cryptocurrency tracing expert. He frequently conducts investigations in a range of niches, including cryptocurrency hacks, exploits, vulnerabilities, thefts,...
Gordon MacKay (Quandary Peak Research)
Location: California and Texas
Areas of Expertise: I am a software and systems expert and technical executive with more than 25 years of experience in computer, telecommunications, network security, and SaaS/Cloud platforms. I have led development and...
Steven Bergin (Cybertek Forensics, Inc.)
Location: Pennsylvania
Areas of Expertise: Steve Bergin is an experienced military veteran and IT Specialist in Digital Forensics, Network Administration and Management, with a demonstrated history of working in the U.S. defense industry, Federal...
Jeff Martin (Evidence Solutions, Inc.)
Location: Multiple Locations
Areas of Expertise: Jeff Martin is a Digital Forensics Expert specializing in Cell Phone Forensics, Black Box/EDR Forensics, Cybersecurity, EMR/EHR Forensics, Audio/Video/Imagery Forensics and more. Jeff has conducted hundreds...
Greg Crouse
Location: Texas
Areas of Expertise: Technical Expert Witness - Technology Intellectual Property and Systems Implementation Greg Crouse has spent nearly 30 years in the trenches implementing large technology systems all over the world....
Richard M Marshall (Concept Gap Ltd)
Location: Scotland
Areas of Expertise: Software and data are ubiquitous, with every organization now dependent on ever more complex digital infrastructure. AI is being infused into every product and service, dramatically increasing that complexity...
Jae Young Bang (Quandary Peak Research)
Location: California
Areas of Expertise: Dr. Jae Young Bang is director of software development and software technology consultant with over a decade of experience in software engineering. He has a diverse background ranging from academic research...
Joseph Greenfield, Ph.D. (Maryman & Associates Inc.)
Location: California
Areas of Expertise: I am the Vice President and Chief Forensic Examiner with Maryman & Associates, with over 15 years of investigative experience, including cyber breach investigations, employee misconduct, and email recovery...
Stephen P. Castell (CASTELL Consulting)
Location: California
Areas of Expertise: Dr Stephen Castell CITP MEWI is an award-winning independent ICT expert witness, management consultant and project manager professional, with extensive experience in risk assessment, quality assurance,...
Scott Greene (Evidence Solutions, Inc.)
Location: Multiple Locations
Areas of Expertise: For over 35 years, Scott Greene has been helping business owners, CEOs, managers and IT Departments understand data. Scott Collects, Analyzes, and Explains Complex Electronic Evidence in Plain English. He...
Chris Cordoba (Medsurity Experts)
Location: Florida
Areas of Expertise: Digital Forensic Expert Witness: Technology, Telecommunications, Cell Phone Forensics, Digital evidence, Digital Forensics, Technology, EDR, ECM, EMR (Electronic Medical Records), Triangulation, EHR,Investigation,...
James Bass (Evidence Solutions, Inc.)
Location: Multiple Locations
Areas of Expertise: James Bass is an Advanced Digital Forensics Expert, boasting over 24 years of experience in the field. James specializes in Cell Phone/ Mobile Device Forensics, eDiscovery, Computer Forensics, Black Box...
steve novak (Bay2Sierra)
Location: California
Areas of Expertise: Mr Novak has 30 years of experience working in the digital design and verification of ASIC/FPGA and other custom digital designs. : Mr Novak is a strong technical and business leader for entire Digital...
Cybersecurity FAQs

What is a cybersecurity expert witness?

A cyber security expert witness who has specialized knowledge and experience in areas such as computer systems, network security, cryptography, and digital forensics, among other areas.

What is the role of a cybersecurity expert witness?

The role of a cybersecurity expert witness is to provide testimony and expertise on cybersecurity, data protection, and privacy issues.

How much can a person make as a cybersecurity expert witness?

Cybersecurity expert witnesses can be compensated from $200 to $450 per hour or higher, with some circumstances calling for more. The amount is agreed upon by the expert and the retaining attorney.

What are the qualifications of a cybersecurity expert witness?

Entertainment & media expert witnesses should have experience in media law, intellectual property, and production.

In a lawsuit, what type of evience is reviewed by a cybersecurity expert witness?

A cybersecurity expert witness would review digital evidence such as logs, network traffic, and system configurations to provide insight into the security posture of the organization and potential breaches.

In what type of cases would there be testimony from a cybersecurity expert witness?

Cybersecurity expert witnesses may provide testimony in cases involving data breaches, hacking, cybercrime, intellectual property theft, and other cyber-related offenses that require technical knowledge and expertise.