Malware Expert Witnesses
Malware expert witnesses and consultants listed here may be able to form expert opinions, draft expert witness reports, provide expert witness testimony at deposition and/or trial as or serve as consulting (non-testifying) experts on malware. The malware expert witness listings on this page are typically from fields/areas of expertise such as: Computers, Cybersecurity, Digital Forensics , and Information Technology.
View Full Profile
Michael Nelson
Digital Forensics | eDiscovery | Incident Response
CYBIR
Lewes, Delaware
Digital Forensics, Cybersecurity
-
Computer Forensics, Ransomware, Hacking, Metadata Analysis, Mobile Forensics, Cloud Forensics, Phishing, Everlaw, Incident Response, eDiscovery, Spoofing, Cellebrite, Business Email Compromise, Data Recovery, Data Preservation, EnCase, cyber, breach, Malware, Threat Actor Negotiations
Founder of DFDR Consulting LLC, now doing business as, CYBIR. Over the course of eighteen years, Nelson has consulted on, examined and testified to digital evidence related to personal, corporate, criminal, civil and domestic cases, along with data breaches.
Acknowledged in “EnCE The Official EnCase Certified Examiner Study Guide” (Second and Third Editions) and “Mastering Windows Network Forensics and Investigation” (Second Edition), Nelson has also been published in eForensics Magazine for SQL investigation techniques. As a speaker, in addition to industry conferences and events, Nelson serves on the faculty of National Business Institute for CLEs and was a past Adjunct Professor of Digital Forensics.
Industry credentials include: AccessData Certified Examiner (ACE), AccessData Mobile Examiner (AME), Certified Computer Examiner (CCE), Cellebrite Certified Mobile Examiner (CCME), Certified Data Recovery Professional (CDRP), Certified Ethical Hacker (CEH), Certified Forensic Compute...
View Full Profile
Davin Darnt
Cybersecurity Witness – Risk, Breach, IT Failures
Union City, New Jersey
Cybersecurity, Information Technology
-
Technology Disputes, Data Breach, Computer Forensics, Hacking Investigations, Internet Fraud, Data Privacy, Information Security, Intellectual Property Theft, Cybercrime, Malware, Ransomware, Email Fraud, Social Engineering, Network Security, Cloud Security, IT Compliance, Ethical Hacking, Cyber Risk, Computer Systems, Firewalls
View Full Profile
Antonio Rega
Tech Forensics, Cybersecurity, eDiscovery Expert
Hillsdale, New Jersey
Digital Forensics, Cybersecurity
-
eDiscovery, Remediation, Spoliation, Compromise, Chain of Custody, Standard of Care, Digital Assets, Crypto, IP Theft, Trade Secrets, Misappropriation, Metadata, Exfiltration, BEC, Business Email Compromise, Malware, Digital Forensics, Breach, FINRA, Governance
Antonio Rega has over 22 years of experience providing expert
consulting, advisory, and subject matter expertise to global corporations
and law firms in digital forensics, information security/privacy, emerging
technology, cryptocurrency investigations and discovery. He leads complex investigations,
leveraging his expertise in proactive and reactive discovery and analysis, and
conducts in-depth examinations and remediation of electronically stored
information (ESI) across various repositories, including cloud, local
devices, web, and mobile. His advisory services span the entire
investigation and litigation lifecycle, including proactive compliance and
regulatory assessments, responses to government subpoenas & orders
issued by regulatory agencies. When called upon to do so, Antonio has
provided expert testimony and reporting within his areas of expertise. He
specializes in helping clients navigate the complexities of investigations
and litigation.
Antonio has presented written and...
View Full Profile
John Horst, CISSP®-ISSAP®
Cybersecurity Expert Witness -
Xanesti Technology Services, LLC
Seymour, Tennessee
Computers, Cybersecurity
-
Information Technology, IT, HIPAA, Privacy Act, NIST, Network Security, Data Breach, AI, Artificial Intelligence, Operating Systems, Data Privacy, Cloud Security, Malware, Ransomware, Data Recovery, ISO 27001, Cybersecurity Framework, Critical Infrastructure, Forensics, Contingency Planning
John Horst, CISSP®-ISSAP®, is the owner and Chief Technology Officer for Xanesti Technology Services, LLC.
Current Information System Security Officer (ISSO) providing security engineering compliance consultation to the U.S. Department of War. Experience with major cybersecurity standards (e.g., National Institute of Standards and Technology, ISSO 27001, CIS). 28 years’ experience in software development, secure software architectures and coding, systems integration and testing, and user support. Experience evaluating emerging Artificial Intelligence technologies and compliance frameworks. Substantial expert witness case history across State (including Family Court) and Federal jurisdictions. Active speaker. Certified Information Security Systems Professional. Top Secret National Security Clearance. Patent-Holder.
John has served in various information technology roles in the U.S. Defense Industrial Base for 20 years, including cybersecurity engineering, software development, inst...