Information Security Expert Witnesses
Information security expert witnesses and consultants listed here may be able to form expert opinions, draft expert witness reports, provide expert witness testimony at deposition and/or trial as or serve as consulting (non-testifying) experts on information security. The information security expert witness listings on this page are typically from fields/areas of expertise such as: Computers, Cybersecurity, and Information Technology.
Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC
Arizona
Computers, Cybersecurity
-
Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I work with attorneys to interpret digital evidence, and tell a powerful story. My technical expertise saves time and money: pre-discovery communications, forensically-sound data preservation, and reports that pack a punch. Expert analysis for electronic medical records, business espionage, employee misconduct, vehicle computer systems, video surveillance, cybercrime, divorce, probate and more (ask about your case -- initial consultation is free). I have more than two decades in the field. Court appearances in multiple states. A live person always answers the phone.
My most frequent practical contributions in litigation consulting are as follows:
• Distinguishing useful ESI from non probative data
• Overcoming adverse party’s resistance to producing ESI
• Producing ESI with confidence it will be admissible
• Delivering concise written reports that clarify rather than confuse
• Incorporating digital evidence into the legal strategy
• Advising methods that ...
Gregory Bailey
Springfield, Illinois
Cybersecurity, Information Technology
-
Cyber, Cyber Security, Information Security, Infosec, IT, Incident Response, Hack, Red Team, Penetration Testing, Pentest, Ransomware, Threat Actor, Hacker
Principal Instructor at the SANS Institute with the following certifications: Offensive Security Certified Professional (OSCP), GIAC Penetration Tester (GPEN), GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), GIAC Certified Forensic Analyst (GCFA), among others.
Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC
Las Vegas, Nevada
Computers, Cybersecurity
-
Computer Forensics, Smartphone Forensics, Digital Forensics, Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR)
I work with attorneys to interpret digital evidence, and tell a powerful story. My technical expertise saves time and money: pre-discovery communications, forensically-sound data preservation, and reports that pack a punch. Expert analysis for electronic medical records, business espionage, employee misconduct, vehicle computer systems, video surveillance, cybercrime, divorce, probate and more (ask about your case -- initial consultation is free). I have more than two decades in the field. Court appearances in multiple states. A live person always answers the phone.
My most frequent practical contributions in litigation consulting are as follows:
• Distinguishing useful ESI from non probative data
• Overcoming adverse party’s resistance to producing ESI
• Producing ESI with confidence it will be admissible
• Delivering concise written reports that clarify rather than confuse
• Incorporating digital evidence into the legal strategy
• Advising methods that ...
C. Matthew Curtin, CISSP
Interhack Corporation
Columbus, Ohio
Computers, Cybersecurity
-
Data Breach, Security Incident, Information Security, Computer Science, Encryption
C. Matthew Curtin, CISSP is the Founder and CEO of Interhack Corporation. Curtin is Interhack’s lead computer scientist and cybersecurity expert. Curtin has been engaged in criminal, civil, administrative, and military processes by plaintiffs, defendants, and the courts directly. His opinion has been accepted by federal and state courts throughout the country in hearings, trials, and appeals.
Curtin and his team help attorneys and executives understand the meaning and context of data and how they affect business, operations, or a legal case. Curtin’s vast knowledge and experience in the field of computer science and cybersecurity enables him to convey the optimal path forward and offer an opinion within a degree of scientific certainty. Curtin’s experience in the field enables him to train his team to operate in specialized task forces organized to respond to high-stakes situations such as data breaches.
Curtin's work centers on the intersection of law and technology. The U.S. Cou...
Frederick Haggerty
Digital Forensics & Cybersecurity Expert
Datigent, LLC
Sterling, Virginia
Cybersecurity, Computers
-
Computer Forensics, Digital Forensics, Email Investigations, Business Email Compromise (BEC), Compromise Assessment, Cyber Breach, Security Standards, Cybersecurity, Malware Analysis, Memory Forensics, Information Security, Meta Data, Data Recovery, Mobile Forensics, Computer Investigations
Frederick Haggerty is an experienced expert witness who has built a solid reputation in the Information Technology (IT) industry over the last twenty-eight years. As a skilled Cybersecurity professional, he offers a wealth of knowledge and experience in performing digital forensic examinations, email investigations, and malware analysis in response to network intrusions. Mr. Haggerty has been trained and educated extensively in digital forensics, malware and reverse engineering, incident response, data recovery, compliance, risk management, and data privacy.
With a background in software development, he has developed mission-critical systems that have granted him the technical knowledge and insight needed to perform thorough examinations of computer information systems, personal computers, servers, and other digital media. His graduate studies at Albany Law School have expanded his breadth of knowledge with an understanding of current laws and practices that impact privacy rights a...