Cyber security expert witness candidates typically have extensive experience in computer science, information security, electrical engineering, information technology, and/or computer forensics. Digital evidence has become ubiquitous in the context of a modern legal action. This electronic evidence, consisting of any stored or transmitted information that may be relied upon in court, often requires litigants to depend upon cyber security expertise to determine its authenticity and use. Representative cyber security matters that have required expert witness services have involved:
In addition to technical expertise, a cyber security expert witness must also possess the ability to explain the evidence to lay people, as well as withstand the scrutiny of a cross examination. In a high-profile case, or litigation involving a significant financial stake, law firms may request a security professional with prior expert witness testimony experience. Expert witnesses typically are current on industry happenings and technology trends, and are often members of an industry organization such as the Security Industry Association (SIA), the Center for Internet Security (CIS), the Cloud Security Alliance (CSA), Cybersecurity Advisors Network (CAN), The Internet Security Alliance (ISA), or the National Technology Security Association (NTSA).
Litigation support by a cyber security expert witness can include a review of the underlying technology, expert report preparation, and expert testimony in the courtroom. A law firm may request a computer scientist or IT security professional for pre-litigation consulting work. Cahn Litigation Services is frequently called upon by law firm clients to locate expert witnesses that can support cyber security matters.
Please Note: All Cahn Litigation expert witness searches are customized to attorneys' precise specifications and preferences. Attorneys are encouraged to discuss search parameters with a Cahn search specialist.
The below expert witness bios represent a small fraction of those Cyber Security experts known by Cahn Litigation Services. These bios are provided to give lawyers a sense of the Cyber Security landscape.
This expert holds a Ph.D. in Applied Mathematics and Scientific Computing and is a Professor in the Electrical and Computer Engineering Department at a research university. Further, this expert serves as Associate Director of a wireless network laboratory, where this expert directs research in wireless security. This expert is a Fellow of the IEEE for contributions to Information Security. This expert has focused research efforts on wireless network security, and led a large research group that has produced research that has appeared in numerous high-impact journals and premier networking, security and systems conferences. This expert has led several federally funded projects in the area of cybersecurity and communication systems, involving security and privacy for sensor networks, physical layer security for wireless systems, a security framework for cognitive radios, the development of wireless testbed resources, and new RFID technologies. This expert was involved in an NSF-funded project, which is a clean-slate effort to re-architect the Internet to support mobility and improved security. This expert has led a DARPA initiative into validating and prototyping physical layer security mechanisms, an Army Research Office project on the theory of physical layer security, and an Army project on cognitive radio networks and routing protocols. This expert has published over 150 papers, including six best papers awards (two in media security, one in Internet design, one in cognitive radio systems, one in mobile computing, and one in wireless security). This expert's experience in network security and wireless spans many years, and this expert has co-authored a popular textbook in security, as well as several notable monographs on wireless security.
This expert's activities in wireless security include the investigation of techniques to secure wireless sensor networks, which includes validating the authenticity and validity of sensor measurements using both cryptographic and non-cryptographic mechanisms. This expert has provided technical analysis to lawyers at the Federal Trade Commission in regards to an anti-trust case. This work involved analyzing defendant software and subpoenaed documents, and subsequently writing thorough reports in regards to the potential intent existing within the defendant's software. This expert has also written several patents.
This expert is founder and principal technologist at a leading cyber security firm. This expert has been in the computer technology industry for many years and has been a consultant to Fortune 500 firms. This expert is well-published and is a certified Computer Forensic Examiner. This expert has extensive expert witness experience, having provided expert services in cases involving major companies.