Computer Security Expert Witnesses

Start Computer Security Expert Search

Computer security expert witness candidates typically have a background in computer science, software development, information security, and/or computer forensics. A computer security expert witness needs to not only have substantive expertise, but must also possess the ability to explain computer technology and electronic evidence to a judge and jury. In a high-profile case, or litigation involving a significant financial stake, a law firm may request a computer security technology expert with prior expert witness testimony experience. Protecting computer systems from theft or harm to data, hardware, and software is the objective of a computer security specialist. Often, matters requiring a computer security or cyber security expert witness involve intellectual property, such as patent infringement litigation. There are many types of computer security incidents that call for legal action. Representative computer security matters that have required expert witness services involve legal issues pertaining to:

Litigation support by a computer security expert witness could include a review of underlying technology, network forensic analysis, expert witness report preparation, expert opinion, depositions, and courtroom testimony. In addition, clients may seek a computer forensics expert for pre-litigation consultant work. Cahn Litigation Services is frequently called upon by law firm clients to locate expert witnesses that can support computer security matters. The firm has an earned reputation for providing candidates with the right balance of technical expertise and testimony experience to get the job done.

Related Disciplines

Computer Security Expert Witness - Sample Bios

Please Note: All Cahn Litigation expert witness searches are customized to attorneys' precise specifications and preferences. Attorneys are encouraged to discuss search parameters with a Cahn search specialist.

Start Custom Search

The below expert witness bios represent a small fraction of those Computer Security experts known by Cahn Litigation Services. These bios are provided to give attorneys a sense of the Computer Security landscape.


Expert Witness #209092

This expert has many years of experience in Computer Science, Security network communications, Remote control, and monitoring systems. This expert has specialized in wireless and cloud based security applications monitored from mobile applications, and device controls configured by user profiles.

This expert has been an expert for over 25 cases including 12 remote control and security network communications and patent litigation cases. This expert has provided Expert Reports, IPR, CBM, Deposition, and Trial Testimony. This includes testifying in a technology patent suit for remote authorization from a mobile device, where the judge found for this expert’s client and cited this expert on all points of contention. This expert’s analysis also contributed to a $35 million settlement in a Network Transaction systems patent litigation.

Sample of Professional Experience

Designed computer control systems and user control panels for remote control of manufacturing equipment.

Implemented remote monitoring of telephone facilities including central office switch buildings. Application included remote control of X10 monitoring devices and alarm activation operating on local secure networks and external networks.

Development of remote monitoring applications for monitoring of utility buildings including powerline monitoring utilizing Network alarm notification. Also implemented system for remote meter reading and remote control of appliances.

Development of mobile applications (iPhone and Android), high speed wireless communications, WiFi security mesh networks, and performed evaluation of secure networks and telecommunication system.


Start Computer Security Expert Search


Expert Witness #232810

This expert holds a Ph.D. in Applied Mathematics and Scientific Computing and is a Professor in the Electrical and Computer Engineering Department at a research university. Further, this expert serves as Associate Director of a wireless network laboratory, where this expert directs research in wireless security. This expert is a Fellow of the IEEE for contributions to Information Security. This expert has focused research efforts on wireless network security, and led a large research group that has produced research that has appeared in numerous high-impact journals and premier networking, security and systems conferences. This expert has led several federally funded projects in the area of cybersecurity and communication systems, involving security and privacy for sensor networks, physical layer security for wireless systems, a security framework for cognitive radios, the development of wireless testbed resources, and new RFID technologies. This expert was involved in an NSF-funded project, which is a clean-slate effort to re-architect the Internet to support mobility and improved security. This expert has led a DARPA initiative into validating and prototyping physical layer security mechanisms, an Army Research Office project on the theory of physical layer security, and an Army project on cognitive radio networks and routing protocols. This expert has published over 150 papers, including six best papers awards (two in media security, one in Internet design, one in cognitive radio systems, one in mobile computing, and one in wireless security). This expert's experience in network security and wireless spans many years, and this expert has co-authored a popular textbook in security, as well as several notable monographs on wireless security.   

This expert's activities in wireless security include the investigation of techniques to secure wireless sensor networks, which includes validating the authenticity and validity of sensor measurements using both cryptographic and non-cryptographic mechanisms. This expert has provided technical analysis to lawyers at the Federal Trade Commission in regards to an anti-trust case. This work involved analyzing defendant software and subpoenaed documents, and subsequently writing thorough reports in regards to the potential intent existing within the defendant's software. This expert has also written several patents.  


Start Computer Security Expert Search


Expert Witness #211268

This expert is founder and principal technologist at a leading cyber security firm. This expert has been in the computer technology industry for many years and has been a consultant to Fortune 500 firms. This expert is well-published and is a certified Computer Forensic Examiner. This expert has extensive expert witness experience, having provided expert services in cases involving major companies.


Start Computer Security Expert Search


Expert Witness #221869

This expert is the Co-Founder of two successful security consulting firms specializing in network security and online fraud prevention. This expert has an extensive background in electronic payments and transactions, contributed to the very early Bluetooth specs, and published the first analysis of Bluetooth security vulnerabilities. This expert developed PoS related technologies and is highly knowledgeable when it comes to chip/stripe communication, having published on aspects of AIDC.

As a Principal Scientist this expert's mandate was to determine the impact of future fraud scenarios on commerce and authentication and developing intellectual property to address such problems. This expert is known throughout the industry as one of the more prominent computer scientists working in authentication, and user interfaces and payment systems. Along with being the named inventor on over one hundred issued and pending U.S. patents, this expert is one of the most cited authors in computer science. This expert has experience working as an expert witness in several patent litigation cases,

having been deposed ~30 times and testified in marksman hearings twice.


Start Computer Security Expert Search


Expert Witness #259850

This expert holds a PhD in Computer Science and specializes in Computer security and privacy, Internet and Web technologies, and software forensics. This expert has brought these skills to bear building a highly successful litigation support consultancy providing technical research and consulting services for software litigation and review, including:

-  Experienced expert investigation and exposition
-  Source code analysis: understanding software's technical purpose from its original design
-  Behavioral analysis: understanding software's behavior through live experiments
-  Security and privacy audits of Web sites and Internet-enabled software

Clients have engaged this expert in cases including trade secrets, patents, privacy, internal product reviews, and antitrust. This expert has testified at trial 8 times, had 19 depositions, and has served almost 10,000 pages of expert reports.

Web bugs (beacons) have been one of this expert's research areas and this expert has published in this area. This expert continues working in Web technologies and is quite comfortable with them.


Start Computer Security Expert Search


Expert Witness #259700

This expert holds a PhD in Computer Science, serves as an Associate Professor for a College of Information Systems as well as director of a Human-Computer Interaction Lab. Specializing in web, privacy and social media, this expert's work began professionally as a web designer. This expert started a web design company that built commercial websites. Since moving to academia, this expert has taught web design and web programming and written a textbook on web design.

This expert's work spans many areas, but core research interests are in understanding how people use social media to improve the way they interact with information. This expert approaches this from a computer science perspective and this expert's general research hits social networks, trust, web science, artificial intelligence, and human-computer interaction. This expert has done a lot of work looking at how to infer information about people (like personality and political preferences) and their relationships (like trust) from social media. This expert also works on usable security, bringing HCI to the design of security and privacy systems.

Areas of Expertise include:

-  Social Media
-  Social Networks
-  Information Organization
-  Web Sciences
-  Recommender Systems
-  Code analysis and review
-  Semantic Web and Big Data
-  Human-Computer Interaction
-  Online Privacy

This expert has extensive experience as an expert witness analyzing intellectual property issues, including patent validity and infringement and prior art. This expert has work as a technical expert, both pre-trial and in trial, on the workings of most major social media systems and recommender systems as well as the history and development of the web, web science, social networks, and social media.


Start Computer Security Expert Search


Expert Witness #222611

This expert received a Ph.D. in Computer Science. This expert joined a prestigious University and is Associate Director of its Applied Research Institute where this expert is working with projects related to national security. Specializing in network protocols, telemedicine, electronic commerce, medical data privacy and security, this expert was a National Lecturer, gave keynote addresses at several leading conferences, and is a Fellow of the IEEE. This expert has supervised over 130 funded research projects, advised 68 PhD and master's students, and co-authored two books, 14 book chapters, and 170 refereed journal and conference publications. This expert and colleagues developed a Transport Protocol (supporting multicast and knowledge of the multicast group members) for the US Navy, and then turned it into a commercial product. This expert's current research focuses on medical data privacy and security, implemented by supporting authentication, authorization, and federation across trust domains. This expert is also developing delta compression algorithms for diverse environments. This expert was a Founding Director of an Internet Technology Innovation Center, which provided technical and business strategy for e-business, and developed e-commerce software for corporate and government clients. Other projects include improving security for mobile devices, evaluating relational keyword search techniques, and writing software that can perform a scientometric analysis of scientific literature.  


Start Computer Security Expert Search


Expert Witness #263553

This expert is an internationally recognized Information and Communications Technology (ICT) architect with expertise in designing and deploying enterprise-class solutions in a wide range of technologies and business sectors. This expert's extensive experience spans industry, U.S. Government, and academia environments. This expert is also a practicing security and privacy professional, who has specialized in data protection and storage security, where this expert is recognized as one of the top experts in the world.

This expert is an Associate Member of the American Bar Association (ABA) and been active with the Section of Science and Technology Law (SciTech). In addition to speaking and publishing on behalf of the ABA, this expert has served in several SciTech leadership roles. This expert is also actively involved in the ABA's Internet of Things (IoT) National Institute and the Artificial Intelligence National Institute.

Additionally, this expert has actively contributed to the efforts and projects of key ICT-based standards development organizations and industry associations as part of a focus on advancing the state of various technologies. This expert's passion for technology has been recognized in the form of awards and leadership positions in organization such as ISO/IEC, the InterNational Committee for Information Technology Standards (INCITS), the IEEE Computer Society, the Cloud Security Alliance (CSA), and the Storage Networking Industry Association (SNIA). This expert is or has served in an editorship role on the following international standards projects: ISO/IEC 22123 (Cloud computing -- Concepts and terminology), ISO/IEC 27031 (ICT readiness for business continuity), ISO/IEC 27050 (Electronic discovery), ISO/IEC 27040 (Storage security), ISO/IEC PAS 16248 (TLS for Storage Systems), Rec. ITU-T 3500 | ISO/IEC 17788 (Cloud computing -- Overview and vocabulary), and IEEE 1619-2018 (XTS-AES).

This expert possesses a unique set of professional credentials that include the (ISC)2 CISSP-ISSAP, ISSMP, and ISSEP certifications as well as the ISACA CISA, IAPP CIPT, and CSA CCSK certifications.


Start Computer Security Expert Search


Expert Witness #248794

This expert is both an Independent Consultant and Expert Witness, as well as an Associate Professor of Engineering Practice. As part of this expert's academic responsibilities, this expert teaches courses on Internet of Things (IoT), Computer Networks, System-on-Chip, Special topics: Software Design and Optimization for Electrical Engineers, and System Verification where the focus is on various algorithms that directly relate to mobile transactions and the security issues associated with them. This expert also performs research on various security and safety aspects of systems, including those in IoT, cloud and data centers. Several of this expert's publications are related to security, verification and optimization of mobile/cloud/data center systems. This expert has been involved in several patent litigation matters related to cloud computing, mobile systems, edge computing, and secure software licensing transactions. This expert has given deposition testimony but has not yet testified at trial. This expert is well published and has presented at industry conferences.


Start Computer Security Expert Search


Expert Witness #238156

This expert brings to the table many years of experience and a global reputation for integrity, accuracy, and innovation, and is widely considered one of the world's leading authorities in information protection and risk management. This expert is CEO of an internationally recognized and trusted advisory firm specializing research and advisory services, litigation support, developing high demand graduate education programs, pathfinder studies, and business growth strategies.

This expert has extensive knowledge of issues related to digital forensics and the operation of computers, applications, devices, networks, and related mechanisms. This starts with experience designing, building, managing, operating, examining, and using computers and other devices and the Internet and its predecessor the ARPAnet, starting from when this expert was a computer operator for one of the early nodes in the ARPAnet. This expert has performed a wide variety of different functions associated with the Internet and systems connected thereto continuously, including without limit; specifically writing such software and analysis of such software; (2) examination and analysis of systems, mechanisms, claims, and asserted evidence for legal matters.

This expert has performed research over a period of years and published peer reviewed papers and two books as well as book chapters on issues of digital forensic evidence examination including specific work on examining digital traces for consistency, similarity, and a variety of closely related issues. This expert has testified at deposition and at trial in matters involving digital forensics including systems, mechanisms, and asserted evidence involving the Internet and related environments and systems, and has been qualified as an expert in Federal, State, and Local matters.

This expert earned and received a B.S. in Electrical Engineering, an M.S. in Information Science, and a Ph.D. in Electrical Engineering.

As a corporate consultant and industry analyst this expert has helped advise hundreds of the world's largest enterprises on security and risk management strategy and their information protection programs. As a consultant to and researcher for the U.S. government this expert was the principal investigator on seminal studies in defensive information operations. This expert has also worked in critical infrastructure protection, with law enforcement, and with the intelligence community to help improve their ability to deal with computer related crime and emerging threats to national security. This expert has worked on issues of digital forensics, including work for many large corporations, testimony in federal and state criminal and civil matters, and pro bono and state-funded work for indigent defendants.


Start Computer Security Expert Search