Hacking Expert Witnesses

Hacking expert witnesses and consultants listed here may be able to form expert opinions, draft expert witness reports, provide expert witness testimony at deposition and/or trial as or serve as consulting (non-testifying) experts on hacking. The hacking expert witness listings on this page are typically from fields/areas of expertise such as: Computers, Cryptocurrency, Cybersecurity, and Technology.

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Arizona
Computers, Cybersecurity - Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I work with attorneys to interpret digital evidence, and tell a powerful story. My technical expertise saves time and money: pre-discovery communications, forensically-sound data preservation, and reports that pack a punch. Expert analysis for electronic medical records, business espionage, employee misconduct, vehicle computer systems, video surveillance, cybercrime, divorce, probate and more (ask about your case -- initial consultation is free). I have more than two decades in the field. Court appearances in multiple states. A live person always answers the phone. My most frequent practical contributions in litigation consulting are as follows: • Distinguishing useful ESI from non probative data • Overcoming adverse party’s resistance to producing ESI • Producing ESI with confidence it will be admissible • Delivering concise written reports that clarify rather than confuse • Incorporating digital evidence into the legal strategy • Advising methods that ...

Jason T Ghetian, CISSP, GISP, GCFE, GCIH, GISF, DeXT, CART

Cryptocurrency - Former FBI Special Agent (Cyber)

Cyber Asset Recovery Experts Inc

Aliso Viejo, California
Cryptocurrency, Cybersecurity - Asset Searches, Fraud Investigations, Pig Butchering, High-Tech Fraud, Digital Forensics, Cyber Investigations, Cryptocurrency Valuation, Hacking, Cybercrime, Call Centers, Cell Phones
Over his 20-year career with the FBI, Jason excelled in investigating cyber-related crimes, including hacking, online stalking, SIM card swapping, business email compromises, phishing, tech support scams, romance scams, and cryptocurrency investment frauds. His expertise covered cryptocurrency tracing, digital device forensics, email forensics, Voice Over Internet Protocol (VOIP) analysis, social media investigations, domain attribution, money laundering, and international collaboration with foreign governments. Jason founded the FBI’s Orange County Cyber Task Force, uniting cyber investigators from federal, state, and local law enforcement agencies. His investigative techniques have been disseminated across all 52 FBI Field Offices and other federal agencies. From 2021 until his retirement in December 2023, Jason led U.S. government investigations into the Pig Butchering Scam, the largest cryptocurrency scam globally, earning him a nomination for the Attorney General’s award from ...

Jonathan Gibney

Expert Witness in Cybersecurity, IT & Technology

Southridge Technology

Brookfield, Connecticut
Cybersecurity, Computers - business technology, ransomware, firewall, network, end-user, business continuity, hacking, security, computer, disaster recovery, managed services, cybersecurity, server, virus, IT, email, education
Jonathan Gibney Expert Witness – Cybersecurity, IT & Technology Southridge Technology, Brookfield, Connecticut Profile: Jonathan Gibney is a seasoned cybersecurity and IT strategist with over 25 years of hands-on experience in technology, complemented by 8 years in finance. As co-owner and CEO of Southridge Technology—a leading managed services provider—he has been instrumental in designing and implementing robust IT infrastructures, cybersecurity defenses, and disaster recovery solutions for organizations across multiple industries. His blend of technical acumen and financial insight makes him uniquely qualified to provide expert testimony on complex digital security issues. Areas of Expertise: Cybersecurity & Risk Management: Evaluating vulnerabilities, implementing security frameworks (including HIPAA, NIST, and CIS), and developing strategies to mitigate cyber threats. Network & Infrastructure Security: Designing secure network architectures, firewalls, and data loss preventi...

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Las Vegas, Nevada
Computers, Cybersecurity - Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I work with attorneys to interpret digital evidence, and tell a powerful story. My technical expertise saves time and money: pre-discovery communications, forensically-sound data preservation, and reports that pack a punch. Expert analysis for electronic medical records, business espionage, employee misconduct, vehicle computer systems, video surveillance, cybercrime, divorce, probate and more (ask about your case -- initial consultation is free). I have more than two decades in the field. Court appearances in multiple states. A live person always answers the phone. My most frequent practical contributions in litigation consulting are as follows: • Distinguishing useful ESI from non probative data • Overcoming adverse party’s resistance to producing ESI • Producing ESI with confidence it will be admissible • Delivering concise written reports that clarify rather than confuse • Incorporating digital evidence into the legal strategy • Advising methods that ...

Steven Bergin

Cybertek Forensics, Inc.

King of Prussia, Pennsylvania
Cybersecurity, Technology - Digital Forensics, Cell Phones, Call Data Records, Digital Security, Hacking, Intellectual Property, Password Cracking, Mobile Forensics, E-Discovery, Cyber Security, Investigation, Computer Hacking
Experienced military veteran and IT Specialist in Digital Forensics, Network Administration and Management, with a demonstrated history of working in the U.S. defense industry, Federal law enforcement, military and the financial industry. Skilled in network management, Digital Forensics, Blacklight forensic software, AccessData AD lab forensics software, Internet Evidence Finder (IEF), Griffeye modular digital investigation platform, Cellibrite UFED 4PC mobile device forensics, evidence collection and chain of custody procedures, write-blocking forensic imaging hardware tools. Strong professional currently enrolled in a M.S in Digital Forensics program at Champlain College. Holds a B.S. in Communications from Liberty University and a A.S. focused on Information Systems Technology from Community College of the United States Air Force. Certificates & Training & Navy Awards o AccessData Certified Examiner (ACE), 2016 o CompTIA Security + certification, 2009 o Cyber Systems Operation...