Ransomware Expert Witnesses

Ransomware expert witnesses and consultants listed here may be able to form expert opinions, draft expert witness reports, provide expert witness testimony at deposition and/or trial as or serve as consulting (non-testifying) experts on ransomware. The ransomware expert witness listings on this page are typically from fields/areas of expertise such as: Computers, Cryptocurrency, Cybersecurity, Digital Forensics , HIPAA, Information Technology, and Securities & Investments.

View Full Profile

Justin Maile

Industry leading cryptocurrency analyst/expert

CipherBlade

Anchorage, Alaska
Cryptocurrency - blockchain, bitcoin, ethereum, theft, fraud, SIM swap, NFT, investment, ponzi, smart contract, pig butchering, digital asset discovery, ransomware, compliance, crypto, solana, wallet, exchange, scam, USDT
Justin Maile is an expert in cryptocurrency investigations and forensic analysis. He has trained and led a team of the best cryptocurrency analysts in the world at Chainalysis before leading the team at CipherBlade. Over the last 8 years Justin has supported some of the most impactful cases to affect the crypto industry involving dozens of SIM swap cases, most of the crypto exchange hacks, numerous smart contract exploits, multiple ponzi schemes with total losses in the billions of dollars, multiple strains of ransomware, assisted international law enforcement with the takedown of illicit services including child abuse sites, darknet markets, money laundering, malware as a service, and others, and has lead the investigations into hundreds of "pig butchering" and other romance and investment scams. More recently Justin has focused on supporting civil litigation cases like digital asset discovery for divorce cases, bankruptcies, estate management cases involving crypto, and has been ...
View Full Profile

Michael Nelson

Digital Forensics | eDiscovery | Incident Response

CYBIR

Lewes, Delaware
Digital Forensics, Cybersecurity - Computer Forensics, Ransomware, Hacking, Metadata Analysis, Mobile Forensics, Cloud Forensics, Phishing, Everlaw, Incident Response, eDiscovery, Spoofing, Cellebrite, Business Email Compromise, Data Recovery, Data Preservation, EnCase, cyber, breach, Malware, Threat Actor Negotiations
Founder of DFDR Consulting LLC, now doing business as, CYBIR. Over the course of eighteen years, Nelson has consulted on, examined and testified to digital evidence related to personal, corporate, criminal, civil and domestic cases, along with data breaches. Acknowledged in “EnCE The Official EnCase Certified Examiner Study Guide” (Second and Third Editions) and “Mastering Windows Network Forensics and Investigation” (Second Edition), Nelson has also been published in eForensics Magazine for SQL investigation techniques. As a speaker, in addition to industry conferences and events, Nelson serves on the faculty of National Business Institute for CLEs and was a past Adjunct Professor of Digital Forensics. Industry credentials include: AccessData Certified Examiner (ACE), AccessData Mobile Examiner (AME), Certified Computer Examiner (CCE), Cellebrite Certified Mobile Examiner (CCME), Certified Data Recovery Professional (CDRP), Certified Ethical Hacker (CEH), Certified Forensic Compute...
View Full Profile

Bruce Schneier

Cambridge, Massachusetts
Cybersecurity, Information Technology - Cryptography, internet security, denial-of-service attacks, ransomware, internet-of-things security, privacy, surveillance, supply chain security, 5G security, blockchain, cryptocurrencies, artificial intelligence, LLMs, adversarial machine learning, election security, spyware, stalkerware
Bruce Schneier is an internationally renowned security technologist, called a “security guru” by the Economist. He is the New York Times best-selling author of 14 books -- ­including "A Hacker's Mind" -- ­as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and blog "Schneier on Security" are read by over 250,000 people. Schneier is a Lecturer in Public Policy at the Harvard Kennedy School, a fellow at the Berkman-Klein Center for Internet and Society at Harvard University, a board member of the Electronic Frontier Foundation and AccessNow, and an advisory board member of EPIC and VerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc.
View Full Profile

Davin Darnt

Cybersecurity Witness – Risk, Breach, IT Failures

Union City, New Jersey
Cybersecurity, Information Technology - Technology Disputes, Data Breach, Computer Forensics, Hacking Investigations, Internet Fraud, Data Privacy, Information Security, Intellectual Property Theft, Cybercrime, Malware, Ransomware, Email Fraud, Social Engineering, Network Security, Cloud Security, IT Compliance, Ethical Hacking, Cyber Risk, Computer Systems, Firewalls
View Full Profile

Paul Sibenik

Pittsburgh, Pennsylvania
Cryptocurrency, Securities & Investments - blockchain, bitcoin, blockchain forensics, hacks, theft, fraud, pig butchering, embezzlement, ransomware, ethereum, crypto, SIM Swaps, compliance, cybersecurity, cryptocurrency tracking, cryptocurrency tracing, staking, NFTs, ponzi schemes, smart contracts
Paul Sibenik is a blockchain forensics and cryptocurrency tracing expert. He frequently conducts investigations in a range of niches, including cryptocurrency hacks, exploits, vulnerabilities, thefts, fraud, SIM Hijacking, fraud, ransomware, embezzlement, and pig butchering scams. Tracking cryptocurrency such as Bitcoin and Ethereum often plays a critical role in his investigations. Additionally, Paul has been appointed as an expert in many civil disputes, including bankruptcy divorce matters, having worked on more than 100 cases involving cryptocurrency in divorce alone. He has also frequently been asked to open on matters related to Anti-money laundering (AML), compliance, cybersecurity, NFTs, and staking.
View Full Profile

John Horst, CISSP®-ISSAP®

Cybersecurity Expert Witness -

Xanesti Technology Services, LLC

Seymour, Tennessee
Computers, Cybersecurity - Information Technology, IT, HIPAA, Privacy Act, NIST, Network Security, Data Breach, AI, Artificial Intelligence, Operating Systems, Data Privacy, Cloud Security, Malware, Ransomware, Data Recovery, ISO 27001, Cybersecurity Framework, Critical Infrastructure, Forensics, Contingency Planning
John Horst, CISSP®-ISSAP®, is the owner and Chief Technology Officer for Xanesti Technology Services, LLC. Current Information System Security Officer (ISSO) providing security engineering compliance consultation to the U.S. Department of War. Experience with major cybersecurity standards (e.g., National Institute of Standards and Technology, ISSO 27001, CIS). 28 years’ experience in software development, secure software architectures and coding, systems integration and testing, and user support. Experience evaluating emerging Artificial Intelligence technologies and compliance frameworks. Substantial expert witness case history across State (including Family Court) and Federal jurisdictions. Active speaker. Certified Information Security Systems Professional. Top Secret National Security Clearance. Patent-Holder. John has served in various information technology roles in the U.S. Defense Industrial Base for 20 years, including cybersecurity engineering, software development, inst...
View Full Profile

Jonathan Fenner

Healthcare Cybersecurity & Data Breach Expert

Bristol, Vermont
HIPAA, Cybersecurity - Healthcare Data Breach, HIPAA Security, EHR System Failure, Ransomware, Remote Patient Monitoring, Medical Device Security, Healthcare SaaS, SOC 2 Compliance, Penetration Testing, Cloud Security AWS, Insurance Technology, Software Architecture, Data Privacy, IoT Security, AI Healthcare Systems, Technical Due Diligence, Healthcare
Jon Fenner is a technology executive with over 25 years of experience in healthcare systems architecture, cybersecurity, and enterprise software development. He specializes in healthcare data breaches, HIPAA security failures, EHR system integration, and insurance technology disputes. As CTO of Community Wellness, Mr. Fenner led the development of a Remote Patient Monitoring platform serving 100,000+ patients across 12 healthcare networks. He scaled the engineering team from 2 to 38 members, achieved SOC 2 compliance, and implemented EHR integrations with Epic, Meditech, and Cerner using HL7 and FHIR standards. Mr. Fenner served 11 years as Principal Infrastructure Architect at Guidewire Software, providing technical consulting to Fortune 500 insurance carriers including State Farm, Liberty Mutual, and QBE. His work included security analysis, penetration testing, and performance evaluation of customer-facing insurance applications. He holds a Certified Ethical Hacker (CEH) crede...