Malware Expert Witnesses

Malware expert witnesses and consultants listed here may be able to form expert opinions, draft expert witness reports, provide expert witness testimony at deposition and/or trial as or serve as consulting (non-testifying) experts on malware. The malware expert witness listings on this page are typically from fields/areas of expertise such as: Computers, Cybersecurity, Digital Forensics , and Information Technology.

View Full Profile

Michael Nelson

Digital Forensics | eDiscovery | Incident Response

CYBIR

Lewes, Delaware
Digital Forensics, Cybersecurity - Computer Forensics, Ransomware, Hacking, Metadata Analysis, Mobile Forensics, Cloud Forensics, Phishing, Everlaw, Incident Response, eDiscovery, Spoofing, Cellebrite, Business Email Compromise, Data Recovery, Data Preservation, EnCase, cyber, breach, Malware, Threat Actor Negotiations
Founder of DFDR Consulting LLC, now doing business as, CYBIR. Over the course of eighteen years, Nelson has consulted on, examined and testified to digital evidence related to personal, corporate, criminal, civil and domestic cases, along with data breaches. Acknowledged in “EnCE The Official EnCase Certified Examiner Study Guide” (Second and Third Editions) and “Mastering Windows Network Forensics and Investigation” (Second Edition), Nelson has also been published in eForensics Magazine for SQL investigation techniques. As a speaker, in addition to industry conferences and events, Nelson serves on the faculty of National Business Institute for CLEs and was a past Adjunct Professor of Digital Forensics. Industry credentials include: AccessData Certified Examiner (ACE), AccessData Mobile Examiner (AME), Certified Computer Examiner (CCE), Cellebrite Certified Mobile Examiner (CCME), Certified Data Recovery Professional (CDRP), Certified Ethical Hacker (CEH), Certified Forensic Compute...
View Full Profile

Davin Darnt

Cybersecurity Witness – Risk, Breach, IT Failures

Union City, New Jersey
Cybersecurity, Information Technology - Technology Disputes, Data Breach, Computer Forensics, Hacking Investigations, Internet Fraud, Data Privacy, Information Security, Intellectual Property Theft, Cybercrime, Malware, Ransomware, Email Fraud, Social Engineering, Network Security, Cloud Security, IT Compliance, Ethical Hacking, Cyber Risk, Computer Systems, Firewalls
View Full Profile

Antonio Rega

Tech Forensics, Cybersecurity, eDiscovery Expert

Hillsdale, New Jersey
Digital Forensics, Cybersecurity - eDiscovery, Remediation, Spoliation, Compromise, Chain of Custody, Standard of Care, Digital Assets, Crypto, IP Theft, Trade Secrets, Misappropriation, Metadata, Exfiltration, BEC, Business Email Compromise, Malware, Digital Forensics, Breach, FINRA, Governance
Antonio Rega has over 22 years of experience providing expert consulting, advisory, and subject matter expertise to global corporations and law firms in digital forensics, information security/privacy, emerging technology, cryptocurrency investigations and discovery. He leads complex investigations, leveraging his expertise in proactive and reactive discovery and analysis, and conducts in-depth examinations and remediation of electronically stored information (ESI) across various repositories, including cloud, local devices, web, and mobile. His advisory services span the entire investigation and litigation lifecycle, including proactive compliance and regulatory assessments, responses to government subpoenas & orders issued by regulatory agencies. When called upon to do so, Antonio has provided expert testimony and reporting within his areas of expertise. He specializes in helping clients navigate the complexities of investigations and litigation. Antonio has presented written and...
View Full Profile

John Horst, CISSP®-ISSAP®

Cybersecurity Expert Witness -

Xanesti Technology Services, LLC

Seymour, Tennessee
Computers, Cybersecurity - Information Technology, IT, HIPAA, Privacy Act, NIST, Network Security, Data Breach, AI, Artificial Intelligence, Operating Systems, Data Privacy, Cloud Security, Malware, Ransomware, Data Recovery, ISO 27001, Cybersecurity Framework, Critical Infrastructure, Forensics, Contingency Planning
John Horst, CISSP®-ISSAP®, is the owner and Chief Technology Officer for Xanesti Technology Services, LLC. Current Information System Security Officer (ISSO) providing security engineering compliance consultation to the U.S. Department of War. Experience with major cybersecurity standards (e.g., National Institute of Standards and Technology, ISSO 27001, CIS). 28 years’ experience in software development, secure software architectures and coding, systems integration and testing, and user support. Experience evaluating emerging Artificial Intelligence technologies and compliance frameworks. Substantial expert witness case history across State (including Family Court) and Federal jurisdictions. Active speaker. Certified Information Security Systems Professional. Top Secret National Security Clearance. Patent-Holder. John has served in various information technology roles in the U.S. Defense Industrial Base for 20 years, including cybersecurity engineering, software development, inst...