Hacking Expert Witnesses

Hacking expert witnesses and consultants listed here may be able to form expert opinions, draft expert witness reports, provide expert witness testimony at deposition and/or trial as or serve as consulting (non-testifying) experts on hacking. The hacking expert witness listings on this page are typically from fields/areas of expertise such as: Computers, Cryptocurrency, Cybersecurity, and Technology.

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Arizona
Computers, Cybersecurity - Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I work with attorneys to interpret digital evidence, and tell a powerful story. My technical expertise saves time and money: pre-discovery communications, forensically-sound data preservation, and reports that pack a punch. Expert analysis for electronic medical records, business espionage, employee misconduct, vehicle computer systems, video surveillance, cybercrime, divorce, probate and more (ask about your case -- initial consultation is free). I have more than two decades in the field. Court appearances in multiple states. A live person always answers the phone. My most frequent practical contributions in litigation consulting are as follows: • Distinguishing useful ESI from non probative data • Overcoming adverse party’s resistance to producing ESI • Producing ESI with confidence it will be admissible • Delivering concise written reports that clarify rather than confuse • Incorporating digital evidence into the legal strategy • Advising methods that ...

Jonathan Gibney

Expert Witness in Cybersecurity, IT & Technology

Southridge Technology

Brookfield, Connecticut
Cybersecurity, Computers - business technology, ransomware, firewall, network, end-user, business continuity, hacking, security, computer, disaster recovery, managed services, cybersecurity, server, virus, IT, email, education
Jonathan Gibney Southridge Technology Co-owner and CEO  With more than 25 years of experience in technology and 8 more in finance, Jonathan Gibney is the co-owner and CEO of Southridge Technology, a leading IT firm and multi-year winner of the Marcum Tech Top 40 Award. He holds a certificate in Cybersecurity from MIT and, as an expert in HIPAA security, Cloud Computing and the use of technology in small and mid-sized businesses, Jonathan has been published in several regional and state dental association professional journals and is a regular conference presenter.

Jason T Ghetian, CISSP, GISP, GCFE, GCIH, GISF, DeXT, CART

Cryptocurrency - Former FBI Special Agent (Cyber)

Cyber Asset Recovery Experts Inc

Wilmington, Delaware
Cryptocurrency, Cybersecurity - Asset Searches, Fraud Investigations, Pig Butchering, High-Tech Fraud, Digital Forensics, Cyber Investigations, Cryptocurrency Valuation, Hacking
Over his 20-year career with the FBI, Jason excelled in investigating cyber-related crimes, including hacking, online stalking, SIM card swapping, business email compromises, phishing, tech support scams, romance scams, and cryptocurrency investment frauds. His expertise covered cryptocurrency tracing, digital device forensics, email forensics, Voice Over Internet Protocol (VOIP) analysis, social media investigations, domain attribution, money laundering, and international collaboration with foreign governments. Jason founded the FBI’s Orange County Cyber Task Force, uniting cyber investigators from federal, state, and local law enforcement agencies. His investigative techniques have been disseminated across all 52 FBI Field Offices and other federal agencies. From 2021 until his retirement in December 2023, Jason led U.S. government investigations into the Pig Butchering Scam, the largest cryptocurrency scam globally, earning him a nomination for the Attorney General’s award from ...

Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC

Las Vegas, Nevada
Computers, Cybersecurity - Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I work with attorneys to interpret digital evidence, and tell a powerful story. My technical expertise saves time and money: pre-discovery communications, forensically-sound data preservation, and reports that pack a punch. Expert analysis for electronic medical records, business espionage, employee misconduct, vehicle computer systems, video surveillance, cybercrime, divorce, probate and more (ask about your case -- initial consultation is free). I have more than two decades in the field. Court appearances in multiple states. A live person always answers the phone. My most frequent practical contributions in litigation consulting are as follows: • Distinguishing useful ESI from non probative data • Overcoming adverse party’s resistance to producing ESI • Producing ESI with confidence it will be admissible • Delivering concise written reports that clarify rather than confuse • Incorporating digital evidence into the legal strategy • Advising methods that ...

Steven Bergin

Cybertek Forensics, Inc.

King of Prussia, Pennsylvania
Cybersecurity, Technology - Digital Forensics, Cell Phones, Call Data Records, Digital Security, Hacking, Intellectual Property, Password Cracking, Mobile Forensics, E-Discovery, Cyber Security, Investigation, Computer Hacking
Experienced military veteran and IT Specialist in Digital Forensics, Network Administration and Management, with a demonstrated history of working in the U.S. defense industry, Federal law enforcement, military and the financial industry. Skilled in network management, Digital Forensics, Blacklight forensic software, AccessData AD lab forensics software, Internet Evidence Finder (IEF), Griffeye modular digital investigation platform, Cellibrite UFED 4PC mobile device forensics, evidence collection and chain of custody procedures, write-blocking forensic imaging hardware tools. Strong professional currently enrolled in a M.S in Digital Forensics program at Champlain College. Holds a B.S. in Communications from Liberty University and a A.S. focused on Information Systems Technology from Community College of the United States Air Force. Certificates & Training & Navy Awards o AccessData Certified Examiner (ACE), 2016 o CompTIA Security + certification, 2009 o Cyber Systems Operation...